File: /var/www/sites/console.log
INFO [2022-12-06 10:49:17,864] defence360agent.simple_rpc: Executing ('rstatus',), params: {}
INFO [2022-12-06 10:49:18,214] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:49:21,377] defence360agent.simple_rpc: Executing ('rstatus',), params: {}
INFO [2022-12-06 10:49:21,840] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:49:30,910] defence360agent.migrate: Applying database migrations...
INFO [2022-12-06 10:49:30,911] peewee_migrate: Starting migrations
INFO [2022-12-06 10:49:30,930] peewee_migrate: Running "001_initial"
INFO [2022-12-06 10:49:30,932] peewee_migrate: Done 001_initial
INFO [2022-12-06 10:49:30,938] peewee_migrate: Running "002_infected_domain_list"
INFO [2022-12-06 10:49:30,939] peewee_migrate: Done 002_infected_domain_list
INFO [2022-12-06 10:49:30,945] peewee_migrate: Running "003_import_from_list"
INFO [2022-12-06 10:49:30,946] peewee_migrate: add_column ('iplist', 'imported_from', <peewee.CharField object at 0x7f89f25b2280>)
INFO [2022-12-06 10:49:30,947] peewee_migrate: add_column ('iplist', 'ctime', <peewee.IntegerField object at 0x7f89f25b25b0>)
INFO [2022-12-06 10:49:30,948] peewee_migrate: Done 003_import_from_list
INFO [2022-12-06 10:49:30,951] peewee_migrate: Running "004_add_username_to_infected_domain_list"
INFO [2022-12-06 10:49:30,951] peewee_migrate: add_column ('infected_domain_list', 'username', <peewee.CharField object at 0x7f89f25db310>)
INFO [2022-12-06 10:49:30,953] peewee_migrate: Done 004_add_username_to_infected_domain_list
INFO [2022-12-06 10:49:30,956] peewee_migrate: Running "005_timeout_in_iplist"
INFO [2022-12-06 10:49:30,956] peewee_migrate: add_column ('iplist', 'deep', <peewee.IntegerField object at 0x7f89f25db2b0>)
INFO [2022-12-06 10:49:30,957] peewee_migrate: Done 005_timeout_in_iplist
INFO [2022-12-06 10:49:30,960] peewee_migrate: Running "006_comment_in_plist"
INFO [2022-12-06 10:49:30,961] peewee_migrate: add_column ('iplist', 'comment', <peewee.CharField object at 0x7f89f2620bb0>)
INFO [2022-12-06 10:49:30,962] peewee_migrate: Done 006_comment_in_plist
INFO [2022-12-06 10:49:30,965] peewee_migrate: Running "007_add_country_code_fields"
INFO [2022-12-06 10:49:30,966] peewee_migrate: add_column ('iplist', 'country_id', <peewee.ForeignKeyField object at 0x7f89f25db130>)
INFO [2022-12-06 10:49:30,966] peewee_migrate: add_column ('incident', 'country_id', <peewee.ForeignKeyField object at 0x7f89f25db880>)
INFO [2022-12-06 10:49:30,967] peewee_migrate: add_index ('iplist', ['country_id'])
INFO [2022-12-06 10:49:30,967] peewee_migrate: add_index ('incident', ['country_id'])
INFO [2022-12-06 10:49:30,968] peewee_migrate: Done 007_add_country_code_fields
INFO [2022-12-06 10:49:30,972] peewee_migrate: Running "008_fill_countries"
INFO [2022-12-06 10:49:30,973] peewee_migrate: Done 008_fill_countries
INFO [2022-12-06 10:49:30,976] peewee_migrate: Running "009_drop_blocklist_history"
INFO [2022-12-06 10:49:30,984] peewee_migrate: Done 009_drop_blocklist_history
INFO [2022-12-06 10:49:30,988] peewee_migrate: Running "010_drop_country_entities"
INFO [2022-12-06 10:49:30,989] peewee_migrate: drop_index ('iplist', 'iplist_country_id')
INFO [2022-12-06 10:49:30,989] peewee_migrate: drop_index ('incident', 'incident_country_id')
INFO [2022-12-06 10:49:30,990] peewee_migrate: drop_column ('iplist', 'country_id')
INFO [2022-12-06 10:49:30,993] peewee_migrate: drop_column ('incident', 'country_id')
INFO [2022-12-06 10:49:30,996] peewee_migrate: Done 010_drop_country_entities
INFO [2022-12-06 10:49:31,002] peewee_migrate: Running "011_create_new_country_entities"
INFO [2022-12-06 10:49:31,003] peewee_migrate: add_column ('iplist', 'country_id', <peewee.ForeignKeyField object at 0x7f89f25f0e20>)
INFO [2022-12-06 10:49:31,003] peewee_migrate: add_column ('incident', 'country_id', <peewee.ForeignKeyField object at 0x7f89f25f0c70>)
INFO [2022-12-06 10:49:31,004] peewee_migrate: add_index ('iplist', ['country_id'])
INFO [2022-12-06 10:49:31,004] peewee_migrate: add_index ('incident', ['country_id'])
INFO [2022-12-06 10:49:31,006] peewee_migrate: Done 011_create_new_country_entities
INFO [2022-12-06 10:49:31,010] peewee_migrate: Running "012_fill_countries_and_subnets"
INFO [2022-12-06 10:49:31,011] peewee_migrate: Done 012_fill_countries_and_subnets
INFO [2022-12-06 10:49:31,013] peewee_migrate: Running "013_add_indexes_to_iplist"
INFO [2022-12-06 10:49:31,014] peewee_migrate: add_index ('iplist', ['listname'])
INFO [2022-12-06 10:49:31,015] peewee_migrate: Done 013_add_indexes_to_iplist
INFO [2022-12-06 10:49:31,021] peewee_migrate: Running "014_add_malware_hits"
INFO [2022-12-06 10:49:31,023] peewee_migrate: Done 014_add_malware_hits
INFO [2022-12-06 10:49:31,028] peewee_migrate: Running "015_add_iplist_expiration_index"
INFO [2022-12-06 10:49:31,028] peewee_migrate: add_index ('iplist', ['expiration'])
INFO [2022-12-06 10:49:31,029] peewee_migrate: Done 015_add_iplist_expiration_index
INFO [2022-12-06 10:49:31,037] peewee_migrate: Running "016_fix_autowhitelist_expiration"
INFO [2022-12-06 10:49:31,039] peewee_migrate: Done 016_fix_autowhitelist_expiration
INFO [2022-12-06 10:49:31,043] peewee_migrate: Running "017_remove_sensor_prefix"
INFO [2022-12-06 10:49:31,044] peewee_migrate: Done 017_remove_sensor_prefix
INFO [2022-12-06 10:49:31,053] peewee_migrate: Running "018_license_info"
INFO [2022-12-06 10:49:31,054] peewee_migrate: Done 018_license_info
INFO [2022-12-06 10:49:31,058] peewee_migrate: Running "019_purge_old_configs"
INFO [2022-12-06 10:49:31,059] peewee_migrate: Done 019_purge_old_configs
INFO [2022-12-06 10:49:31,062] peewee_migrate: Running "020_malware_scan_types"
INFO [2022-12-06 10:49:31,062] peewee_migrate: Done 020_malware_scan_types
INFO [2022-12-06 10:49:31,070] peewee_migrate: Running "021_add_testing_repo"
INFO [2022-12-06 10:49:31,071] peewee_migrate: Done 021_add_testing_repo
INFO [2022-12-06 10:49:31,081] peewee_migrate: Running "022_mod_security_vendors_migrations"
INFO [2022-12-06 10:49:31,082] peewee_migrate: Done 022_mod_security_vendors_migrations
INFO [2022-12-06 10:49:31,087] peewee_migrate: Running "023_add_default_rule_in_modsec_custom_conf"
INFO [2022-12-06 10:49:31,277] peewee_migrate: Done 023_add_default_rule_in_modsec_custom_conf
INFO [2022-12-06 10:49:31,281] peewee_migrate: Running "024_ignore_from_graylist"
INFO [2022-12-06 10:49:31,282] peewee_migrate: Done 024_ignore_from_graylist
INFO [2022-12-06 10:49:31,286] peewee_migrate: Running "025_malware_config_realtime"
INFO [2022-12-06 10:49:31,385] peewee_migrate: Done 025_malware_config_realtime
INFO [2022-12-06 10:49:31,389] peewee_migrate: Running "026_remove_old_temporary_file"
INFO [2022-12-06 10:49:31,393] peewee_migrate: Done 026_remove_old_temporary_file
INFO [2022-12-06 10:49:31,397] peewee_migrate: Running "027_disable_comdo_fp_rules"
INFO [2022-12-06 10:49:31,399] peewee_migrate: Done 027_disable_comdo_fp_rules
INFO [2022-12-06 10:49:31,402] peewee_migrate: Running "028_set_permanent_ttl_for_blacklist"
INFO [2022-12-06 10:49:31,407] peewee_migrate: Done 028_set_permanent_ttl_for_blacklist
INFO [2022-12-06 10:49:31,411] peewee_migrate: Running "029_custom_quarantine"
INFO [2022-12-06 10:49:31,412] peewee_migrate: Done 029_custom_quarantine
INFO [2022-12-06 10:49:31,416] peewee_migrate: Running "030_rename_max_incident_repetition"
INFO [2022-12-06 10:49:31,487] peewee_migrate: Done 030_rename_max_incident_repetition
INFO [2022-12-06 10:49:31,491] peewee_migrate: Running "031_add_mode_field"
INFO [2022-12-06 10:49:31,491] peewee_migrate: add_column ('malware_hits', 'mode', <peewee.IntegerField object at 0x7f89f2564190>)
INFO [2022-12-06 10:49:31,493] peewee_migrate: Done 031_add_mode_field
INFO [2022-12-06 10:49:31,496] peewee_migrate: Running "031_modsec_config_for_plesk_include"
INFO [2022-12-06 10:49:31,498] peewee_migrate: Done 031_modsec_config_for_plesk_include
INFO [2022-12-06 10:49:31,501] peewee_migrate: Running "032_chmod_quarantine"
INFO [2022-12-06 10:49:31,502] peewee_migrate: Done 032_chmod_quarantine
INFO [2022-12-06 10:49:31,506] peewee_migrate: Running "033_disable_cphulk"
INFO [2022-12-06 10:49:31,507] peewee_migrate: Done 033_disable_cphulk
INFO [2022-12-06 10:49:31,510] peewee_migrate: Running "034_hits_extras"
INFO [2022-12-06 10:49:31,513] peewee_migrate: Done 034_hits_extras
INFO [2022-12-06 10:49:31,518] peewee_migrate: Running "035_add_dos_expiration_field"
INFO [2022-12-06 10:49:31,519] peewee_migrate: add_column ('iplist', 'dos_expiration', <peewee.IntegerField object at 0x7f89f2564880>)
INFO [2022-12-06 10:49:31,520] peewee_migrate: Done 035_add_dos_expiration_field
INFO [2022-12-06 10:49:31,524] peewee_migrate: Running "036_add_block_port"
INFO [2022-12-06 10:49:31,526] peewee_migrate: add_column ('iplist', 'full_access', <peewee.BooleanField object at 0x7f89f2564dc0>)
INFO [2022-12-06 10:49:31,528] peewee_migrate: Done 036_add_block_port
INFO [2022-12-06 10:49:31,536] peewee_migrate: Running "037_disabled_rules"
INFO [2022-12-06 10:49:31,540] peewee_migrate: Done 037_disabled_rules
INFO [2022-12-06 10:49:31,545] peewee_migrate: Running "038_disabled_rules_import"
WARNING [2022-12-06 10:49:31,603] builtins: Error during syncing disabled rules: Integration config is missing server_type field
INFO [2022-12-06 10:49:31,636] peewee_migrate: Done 038_disabled_rules_import
INFO [2022-12-06 10:49:31,640] peewee_migrate: Running "039_fix_malware_hits"
INFO [2022-12-06 10:49:31,641] peewee_migrate: sql ('\n CREATE TABLE "malware_hits_new" (\n "id" INTEGER NOT NULL PRIMARY KEY,\n "scanid_id" VARCHAR(255) NOT NULL,\n "user" VARCHAR(255) NOT NULL,\n "orig_file" VARCHAR(255) NOT NULL,\n "type" VARCHAR(255) NOT NULL,\n "restored" INTEGER NOT NULL,\n "mode" INTEGER,\n FOREIGN KEY ("scanid_id") REFERENCES "malware_scans" ("scanid"))\n ',)
INFO [2022-12-06 10:49:31,642] peewee_migrate: sql ('INSERT INTO malware_hits_new SELECT * FROM malware_hits',)
INFO [2022-12-06 10:49:31,643] peewee_migrate: sql ('DROP TABLE malware_hits',)
INFO [2022-12-06 10:49:31,643] peewee_migrate: sql ('ALTER TABLE malware_hits_new RENAME TO malware_hits',)
INFO [2022-12-06 10:49:31,646] peewee_migrate: Done 039_fix_malware_hits
INFO [2022-12-06 10:49:31,655] peewee_migrate: Running "040_ignore_mod_sec_rule_214920"
INFO [2022-12-06 10:49:31,656] peewee_migrate: Done 040_ignore_mod_sec_rule_214920
INFO [2022-12-06 10:49:31,661] peewee_migrate: Running "041_fix_invalid_ignore_filed"
INFO [2022-12-06 10:49:31,663] peewee_migrate: Done 041_fix_invalid_ignore_filed
INFO [2022-12-06 10:49:31,679] peewee_migrate: Running "042_rebuildinstalledssldb"
INFO [2022-12-06 10:49:31,681] peewee_migrate: Done 042_rebuildinstalledssldb
INFO [2022-12-06 10:49:31,685] peewee_migrate: Running "043_disable_dos_scan_by_default"
INFO [2022-12-06 10:49:31,735] defence360agent.contracts.config_provider: CachedConfigReader <'/etc/sysconfig/imunify360/imunify360-merged.config', modified at 0.0, 0.0 bytes> modified: removed={}, added={"ADMIN_CONTACTS": {"emails": [], "enable_icontact_notifications": true}, "AUTO_WHITELIST": {"after_unblock_timeout": 1440, "timeout": 1440}, "BACKUP_RESTORE": {"cl_backup_allowed": true, "cl_on_premise_backup_allowed": false, "max_days_in_backup": 90}, "BLOCKED_PORTS": {"default_mode": "allowed"}, "CAPTCHA": {"cert_refresh_timeout": 3600}, "CAPTCHA_DOS": {"enabled": true, "max_count": 100, "time_frame": 21600, "timeout": 864000}, "CSF_INTEGRATION": {"catch_lfd_events": false}, "DOS": {"default_limit": 250, "enabled": true, "interval": 30, "port_limits": {}}, "ERROR_REPORTING": {"enable": true}, "FIREWALL": {"TCP_IN_IPv4": ["20", "21", "22", "25", "53", "80", "110", "443", "465", "587", "993", "995"], "TCP_OUT_IPv4": ["20", "21", "22", "25", "53", "80", "110", "113", "443", "587", "993", "995"], "UDP_IN_IPv4": ["20", "21", "53", "443"], "UDP_OUT_IPv4": ["20", "21", "53", "113", "123"], "internal_use_remote_iplist": false, "port_blocking_mode": "ALLOW"}, "INCIDENT_LOGGING": {"limit": 100000, "min_log_level": 4, "num_days": 100, "ui_autorefresh_timeout": 10}, "KERNELCARE": {"edf": false}, "LOGGER": {"backup_count": 5, "max_log_file_size": 62914560, "syscall_monitor": false}, "MALWARE_CLEANUP": {"keep_original_files_days": 14, "trim_file_instead_of_removal": true}, "MALWARE_DATABASE_SCAN": {"enable": false}, "MALWARE_SCANNING": {"cloud_assisted_scan": true, "default_action": "cleanup", "detect_elf": true, "enable_scan_cpanel": true, "enable_scan_inotify": true, "enable_scan_modsec": true, "enable_scan_pure_ftpd": true, "hyperscan": false, "max_cloudscan_size_to_scan": 10485760, "max_mrs_upload_file": 10485760, "max_signature_size_to_scan": 1048576, "notify_on_detect": false, "optimize_realtime_scan": true, "rapid_scan": true, "rapid_scan_rescan_unchanging_files_frequency": null, "scan_modified_files": null, "sends_file_for_analysis": true, "try_restore_from_backup_first": false}, "MALWARE_SCAN_INTENSITY": {"cpu": 2, "io": 2, "ram": 2048, "user_scan_cpu": 2, "user_scan_io": 2, "user_scan_ram": 1024}, "MALWARE_SCAN_SCHEDULE": {"day_of_month": 1, "day_of_week": 0, "hour": 3, "interval": "week"}, "MOD_SEC": {"app_specific_ruleset": true, "cms_account_compromise_prevention": false, "prev_settings": "", "ruleset": "FULL"}, "MOD_SEC_BLOCK_BY_CUSTOM_RULE": {"33332": {"check_period": 120, "max_incidents": 10}, "33339": {"check_period": 120, "max_incidents": 10}}, "MOD_SEC_BLOCK_BY_SEVERITY": {"check_period": 120, "denied_num_limit": 2, "enable": true, "max_incidents": 2, "severity_limit": 2}, "NETWORK_INTERFACE": {"eth6_device": null, "eth_device": null, "eth_device_skip": []}, "OSSEC": {"active_response": false}, "PAM": {"enable": true, "exim_dovecot_native": false, "exim_dovecot_protection": true, "ftp_protection": false}, "PERMISSIONS": {"advisor": true, "allow_malware_scan": false, "support_form": true, "upgrade_button": true, "user_ignore_list": false, "user_override_malware_actions": false, "user_override_proactive_defense": false}, "PROACTIVE_DEFENCE": {"blamer": true, "mode": "LOG", "php_immunity": false}, "RESOURCE_MANAGEMENT": {"cpu_limit": 2, "io_limit": 2, "ram_limit": 500}, "SEND_ADDITIONAL_DATA": {"enable": true}, "SMTP_BLOCKING": {"allow_groups": ["mail"], "allow_local": false, "allow_users": [], "enable": false, "ports": [25, 587, 465], "redirect": false}, "STOP_MANAGING": {"modsec_directives": false}, "WEBSHIELD": {"captcha_secret_key": "", "captcha_site_key": "", "enable": true, "invisible_captcha": false, "known_proxies_support": true, "splash_screen": true}, "WEB_SERVICES": {"http_ports": [], "https_ports": []}}, changed={}
INFO [2022-12-06 10:49:31,859] peewee_migrate: Done 043_disable_dos_scan_by_default
INFO [2022-12-06 10:49:31,863] peewee_migrate: Running "044_ignore_virtfs_on_cpanel"
INFO [2022-12-06 10:49:31,866] peewee_migrate: Done 044_ignore_virtfs_on_cpanel
INFO [2022-12-06 10:49:31,877] peewee_migrate: Running "045_ignore_vdserver_dir_in_csf"
INFO [2022-12-06 10:49:31,880] peewee_migrate: Done 045_ignore_vdserver_dir_in_csf
INFO [2022-12-06 10:49:31,884] peewee_migrate: Running "046_foreign_key_fix"
INFO [2022-12-06 10:49:31,885] peewee_migrate: sql ('\n CREATE TABLE "malware_hit_extras_new" (\n "id" INTEGER NOT NULL PRIMARY KEY,\n "hit_id" INTEGER NOT NULL,\n "name" VARCHAR(255) NOT NULL,\n "value" VARCHAR(255) NOT NULL,\n FOREIGN KEY ("hit_id")\n REFERENCES "malware_hits" ("id") ON DELETE CASCADE\n )\n ',)
INFO [2022-12-06 10:49:31,887] peewee_migrate: sql ('INSERT INTO malware_hit_extras_new SELECT * FROM malware_hit_extras',)
INFO [2022-12-06 10:49:31,887] peewee_migrate: sql ('DROP TABLE malware_hit_extras',)
INFO [2022-12-06 10:49:31,888] peewee_migrate: sql ('ALTER TABLE malware_hit_extras_new RENAME TO malware_hit_extras',)
INFO [2022-12-06 10:49:31,891] peewee_migrate: Done 046_foreign_key_fix
INFO [2022-12-06 10:49:31,896] peewee_migrate: Running "047_license_in_file"
INFO [2022-12-06 10:49:31,900] peewee_migrate: Done 047_license_in_file
INFO [2022-12-06 10:49:31,905] peewee_migrate: Running "048_malware_hits_vendor_field"
INFO [2022-12-06 10:49:31,906] peewee_migrate: add_column ('malware_hits', 'vendor', <peewee.CharField object at 0x7f89f25db790>)
INFO [2022-12-06 10:49:31,913] peewee_migrate: Done 048_malware_hits_vendor_field
INFO [2022-12-06 10:49:31,920] peewee_migrate: Running "049_add_auto_added_field_to_iplist"
INFO [2022-12-06 10:49:31,921] peewee_migrate: add_column ('iplist', 'auto_whitelisted', <peewee.BooleanField object at 0x7f89f25f0880>)
INFO [2022-12-06 10:49:31,923] peewee_migrate: Done 049_add_auto_added_field_to_iplist
INFO [2022-12-06 10:49:31,927] peewee_migrate: Running "050_fill_auto_whitelisted"
INFO [2022-12-06 10:49:31,928] peewee_migrate: Done 050_fill_auto_whitelisted
INFO [2022-12-06 10:49:31,935] peewee_migrate: Running "051_cleanup_vd_license"
INFO [2022-12-06 10:49:31,936] peewee_migrate: Done 051_cleanup_vd_license
INFO [2022-12-06 10:49:31,941] peewee_migrate: Running "052_whitelisted_crawlers"
INFO [2022-12-06 10:49:31,944] peewee_migrate: Done 052_whitelisted_crawlers
INFO [2022-12-06 10:49:31,948] peewee_migrate: Running "053_populate_whitelisted_crawlers"
INFO [2022-12-06 10:49:31,952] peewee_migrate: Done 053_populate_whitelisted_crawlers
INFO [2022-12-06 10:49:31,956] peewee_migrate: Running "054_add_malicious_and_added_date_fileds"
INFO [2022-12-06 10:49:31,957] peewee_migrate: add_column ('malware_hits', 'malicious', <peewee.BooleanField object at 0x7f89f25f0c10>)
INFO [2022-12-06 10:49:31,962] peewee_migrate: add_column ('malware_ignore_path', 'added_date', <peewee.IntegerField object at 0x7f89f2567910>)
INFO [2022-12-06 10:49:31,967] peewee_migrate: Done 054_add_malicious_and_added_date_fileds
INFO [2022-12-06 10:49:31,974] peewee_migrate: Running "055_migrate_move_to_quar_option"
INFO [2022-12-06 10:49:32,031] peewee_migrate: Done 055_migrate_move_to_quar_option
INFO [2022-12-06 10:49:32,034] peewee_migrate: Running "056_populate_malicious_with_quarantined"
INFO [2022-12-06 10:49:32,036] peewee_migrate: Done 056_populate_malicious_with_quarantined
INFO [2022-12-06 10:49:32,039] peewee_migrate: Running "057_filename_is_blob"
INFO [2022-12-06 10:49:32,040] peewee_migrate: sql ('\n CREATE TABLE "malware_hits_new" (\n "id" INTEGER NOT NULL PRIMARY KEY,\n "scanid_id" VARCHAR(255) NOT NULL,\n "user" VARCHAR(255) NOT NULL,\n "orig_file" BLOB NOT NULL,\n "type" VARCHAR(255) NOT NULL,\n "restored" INTEGER NOT NULL,\n "mode" INTEGER,\n "vendor" VARCHAR(255) NOT NULL,\n "malicious" INTEGER NOT NULL,\n FOREIGN KEY ("scanid_id") REFERENCES "malware_scans" ("scanid"))\n ',)
INFO [2022-12-06 10:49:32,041] peewee_migrate: sql ('INSERT INTO malware_hits_new SELECT * FROM malware_hits',)
INFO [2022-12-06 10:49:32,042] peewee_migrate: sql ('DROP TABLE malware_hits',)
INFO [2022-12-06 10:49:32,042] peewee_migrate: sql ('ALTER TABLE malware_hits_new RENAME TO malware_hits',)
INFO [2022-12-06 10:49:32,046] peewee_migrate: Done 057_filename_is_blob
INFO [2022-12-06 10:49:32,050] peewee_migrate: Running "058_convert_license_last_attempt"
INFO [2022-12-06 10:49:32,052] peewee_migrate: Done 058_convert_license_last_attempt
INFO [2022-12-06 10:49:32,055] peewee_migrate: Running "059_scans_error_field"
INFO [2022-12-06 10:49:32,056] peewee_migrate: add_column ('malware_scans', 'error', <peewee.TextField object at 0x7f89f2575970>)
INFO [2022-12-06 10:49:32,058] peewee_migrate: Done 059_scans_error_field
INFO [2022-12-06 10:49:32,062] peewee_migrate: Running "060_migrate_invisible_captcha_conf"
INFO [2022-12-06 10:49:32,159] peewee_migrate: Done 060_migrate_invisible_captcha_conf
INFO [2022-12-06 10:49:32,164] peewee_migrate: Running "061_migrate_backup_system_conf"
INFO [2022-12-06 10:49:32,224] peewee_migrate: Done 061_migrate_backup_system_conf
INFO [2022-12-06 10:49:32,227] peewee_migrate: Running "062_drop_malware_extra_data"
INFO [2022-12-06 10:49:32,229] peewee_migrate: Done 062_drop_malware_extra_data
INFO [2022-12-06 10:49:32,232] peewee_migrate: Running "062_fix_null_expiration"
INFO [2022-12-06 10:49:32,234] peewee_migrate: Done 062_fix_null_expiration
INFO [2022-12-06 10:49:32,237] peewee_migrate: Running "063_fix_graylist_doslist_expiration_discrepancy"
INFO [2022-12-06 10:49:32,238] peewee_migrate: Done 063_fix_graylist_doslist_expiration_discrepancy
INFO [2022-12-06 10:49:32,241] peewee_migrate: Running "064_chmod_i360deploy_log"
INFO [2022-12-06 10:49:32,242] peewee_migrate: Done 064_chmod_i360deploy_log
INFO [2022-12-06 10:49:32,245] peewee_migrate: Running "065_remove_capture_csf_lock_from_config"
INFO [2022-12-06 10:49:32,269] peewee_migrate: Done 065_remove_capture_csf_lock_from_config
INFO [2022-12-06 10:49:32,273] peewee_migrate: Running "066_eula_table"
INFO [2022-12-06 10:49:32,274] peewee_migrate: Done 066_eula_table
INFO [2022-12-06 10:49:32,278] peewee_migrate: Running "067_drop_fields_from_modsec_conf"
INFO [2022-12-06 10:49:32,331] peewee_migrate: Done 067_drop_fields_from_modsec_conf
INFO [2022-12-06 10:49:32,335] peewee_migrate: Running "068_remove_rules_check_interval_from_config"
INFO [2022-12-06 10:49:32,337] peewee_migrate: Done 068_remove_rules_check_interval_from_config
INFO [2022-12-06 10:49:32,339] peewee_migrate: Running "069_incidents_domain_field"
INFO [2022-12-06 10:49:32,340] peewee_migrate: add_column ('incident', 'domain', <peewee.TextField object at 0x7f89f254cc40>)
INFO [2022-12-06 10:49:32,341] peewee_migrate: Done 069_incidents_domain_field
INFO [2022-12-06 10:49:32,345] peewee_migrate: Running "070_modsec_incident_names"
INFO [2022-12-06 10:49:32,347] peewee_migrate: Done 070_modsec_incident_names
INFO [2022-12-06 10:49:32,350] peewee_migrate: Running "071_malware_hits_hash_size_fields"
INFO [2022-12-06 10:49:32,351] peewee_migrate: add_column ('malware_hits', 'size', <peewee.CharField object at 0x7f89f2511430>)
INFO [2022-12-06 10:49:32,352] peewee_migrate: add_column ('malware_hits', 'hash', <peewee.CharField object at 0x7f89f25112e0>)
INFO [2022-12-06 10:49:32,353] peewee_migrate: Done 071_malware_hits_hash_size_fields
INFO [2022-12-06 10:49:32,357] peewee_migrate: Running "072_add_malware_history_table"
INFO [2022-12-06 10:49:32,358] peewee_migrate: Done 072_add_malware_history_table
INFO [2022-12-06 10:49:32,363] peewee_migrate: Running "072_captcha_stat"
INFO [2022-12-06 10:49:32,365] peewee_migrate: Done 072_captcha_stat
INFO [2022-12-06 10:49:32,370] peewee_migrate: Running "072_extend_last_synclist"
INFO [2022-12-06 10:49:32,371] peewee_migrate: sql ('\n CREATE TABLE "last_synclist_new" (\n "timestamp" REAL,\n "name" VARCHAR(255) NOT NULL PRIMARY KEY\n )',)
INFO [2022-12-06 10:49:32,372] peewee_migrate: sql ('INSERT INTO last_synclist_new SELECT timestamp, "ip" AS name FROM last_synclist LIMIT 1',)
INFO [2022-12-06 10:49:32,372] peewee_migrate: sql ('DROP TABLE last_synclist',)
INFO [2022-12-06 10:49:32,373] peewee_migrate: sql ('ALTER TABLE last_synclist_new RENAME TO last_synclist',)
INFO [2022-12-06 10:49:32,376] peewee_migrate: Done 072_extend_last_synclist
INFO [2022-12-06 10:49:32,382] peewee_migrate: Running "073_drop_dos_expiration"
INFO [2022-12-06 10:49:32,383] peewee_migrate: add_column ('iplist', 'no_captcha', <peewee.BooleanField object at 0x7f89f25db100>)
INFO [2022-12-06 10:49:32,389] peewee_migrate: sql ("UPDATE iplist SET no_captcha=1 WHERE listname='GRAY' AND dos_expiration",)
INFO [2022-12-06 10:49:32,390] peewee_migrate: drop_column ('iplist', 'dos_expiration')
INFO [2022-12-06 10:49:32,399] peewee_migrate: Done 073_drop_dos_expiration
INFO [2022-12-06 10:49:32,405] peewee_migrate: Running "074_ip_as_int"
INFO [2022-12-06 10:49:32,410] peewee_migrate: Done 074_ip_as_int
INFO [2022-12-06 10:49:32,416] peewee_migrate: Running "075_ips_as_int"
INFO [2022-12-06 10:49:32,417] peewee_migrate: sql ('DROP TABLE iplist',)
INFO [2022-12-06 10:49:32,418] peewee_migrate: sql ('ALTER TABLE iplist_new RENAME TO iplist',)
INFO [2022-12-06 10:49:32,420] peewee_migrate: sql ('CREATE INDEX "iplist_listname" ON "iplist" ("listname")',)
INFO [2022-12-06 10:49:32,421] peewee_migrate: sql ('CREATE INDEX "iplist_expiration" ON "iplist" ("expiration")',)
INFO [2022-12-06 10:49:32,422] peewee_migrate: sql ('CREATE INDEX "iplist_ip" ON "iplist" ("ip")',)
INFO [2022-12-06 10:49:32,423] peewee_migrate: Done 075_ips_as_int
INFO [2022-12-06 10:49:32,427] peewee_migrate: Running "076_hash_model"
INFO [2022-12-06 10:49:32,428] peewee_migrate: Done 076_hash_model
INFO [2022-12-06 10:49:32,432] peewee_migrate: Running "077_alter_malware_scan"
INFO [2022-12-06 10:49:32,434] peewee_migrate: change_column ('malware_scans', 'path', <peewee.CharField object at 0x7f89f25b2490>)
INFO [2022-12-06 10:49:32,438] peewee_migrate: change_column ('malware_scans', 'type', <peewee.CharField object at 0x7f89f2505e20>)
INFO [2022-12-06 10:49:32,444] peewee_migrate: Done 077_alter_malware_scan
INFO [2022-12-06 10:49:32,449] peewee_migrate: Running "078_fix_signatures_permissions"
INFO [2022-12-06 10:49:32,450] peewee_migrate: Done 078_fix_signatures_permissions
INFO [2022-12-06 10:49:32,453] peewee_migrate: Running "079_add_uid_gid_fields"
INFO [2022-12-06 10:49:32,453] peewee_migrate: add_column ('malware_hits', 'uid', <peewee.IntegerField object at 0x7f89f25646a0>)
INFO [2022-12-06 10:49:32,454] peewee_migrate: add_column ('malware_hits', 'gid', <peewee.IntegerField object at 0x7f89f2564e50>)
INFO [2022-12-06 10:49:32,456] peewee_migrate: Done 079_add_uid_gid_fields
INFO [2022-12-06 10:49:32,459] peewee_migrate: Running "080_populate_uid_gid_size_hash_fields"
INFO [2022-12-06 10:49:32,460] peewee_migrate: Done 080_populate_uid_gid_size_hash_fields
INFO [2022-12-06 10:49:32,463] peewee_migrate: Running "081_fix_clamscan_broken_symlink"
INFO [2022-12-06 10:49:32,464] peewee_migrate: Done 081_fix_clamscan_broken_symlink
INFO [2022-12-06 10:49:32,467] peewee_migrate: Running "082_add_cl_on_premise_backup_option"
INFO [2022-12-06 10:49:32,468] peewee_migrate: Done 082_add_cl_on_premise_backup_option
INFO [2022-12-06 10:49:32,474] peewee_migrate: Running "082_add_manual_flag"
INFO [2022-12-06 10:49:32,475] peewee_migrate: add_column ('iplist', 'manual', <peewee.BooleanField object at 0x7f89f25b2af0>)
INFO [2022-12-06 10:49:32,482] peewee_migrate: Done 082_add_manual_flag
INFO [2022-12-06 10:49:32,486] peewee_migrate: Running "083_drop_no_captcha_field"
INFO [2022-12-06 10:49:32,487] peewee_migrate: sql ("UPDATE iplist SET manual=0 WHERE listname='GRAY'",)
INFO [2022-12-06 10:49:32,488] peewee_migrate: sql ("UPDATE iplist SET manual=1 WHERE listname='WHITE'",)
INFO [2022-12-06 10:49:32,488] peewee_migrate: sql ("UPDATE iplist SET manual=1 WHERE listname='BLACK'",)
INFO [2022-12-06 10:49:32,489] peewee_migrate: sql ("UPDATE iplist SET listname='BLACK'WHERE listname='GRAY' AND no_captcha=1",)
INFO [2022-12-06 10:49:32,489] peewee_migrate: sql ("UPDATE iplist SET comment='Automatically blocked due to distributed attack', imported_from='Imunify360' WHERE listname='BLACK' AND manual=0",)
INFO [2022-12-06 10:49:32,490] peewee_migrate: drop_column ('iplist', 'no_captcha')
INFO [2022-12-06 10:49:32,495] peewee_migrate: Done 083_drop_no_captcha_field
INFO [2022-12-06 10:49:32,505] peewee_migrate: Running "084_country_subnets_fields"
INFO [2022-12-06 10:49:32,506] peewee_migrate: rename_column ('country_subnets', 'ip_net', 'ip')
INFO [2022-12-06 10:49:32,510] peewee_migrate: add_column ('country_subnets', 'network_address', <peewee.IntegerField object at 0x7f89f2511190>)
INFO [2022-12-06 10:49:32,511] peewee_migrate: add_column ('country_subnets', 'netmask', <peewee.IntegerField object at 0x7f89f2511ac0>)
INFO [2022-12-06 10:49:32,512] peewee_migrate: add_column ('country_subnets', 'version', <peewee.IntegerField object at 0x7f89f2511a00>)
INFO [2022-12-06 10:49:32,513] peewee_migrate: Done 084_country_subnets_fields
INFO [2022-12-06 10:49:32,517] peewee_migrate: Running "085_country_subnets_fields"
INFO [2022-12-06 10:49:32,518] peewee_migrate: sql ('DELETE FROM country_subnets',)
INFO [2022-12-06 10:49:32,519] peewee_migrate: add_not_null ('country_subnets', 'network_address')
INFO [2022-12-06 10:49:32,522] peewee_migrate: add_not_null ('country_subnets', 'netmask')
INFO [2022-12-06 10:49:32,526] peewee_migrate: add_not_null ('country_subnets', 'version')
INFO [2022-12-06 10:49:32,530] peewee_migrate: Done 085_country_subnets_fields
INFO [2022-12-06 10:49:32,534] peewee_migrate: Running "086_ignored_by_port_fields"
INFO [2022-12-06 10:49:32,534] peewee_migrate: add_column ('ignored_by_port_proto', 'network_address', <peewee.IntegerField object at 0x7f89f25640d0>)
INFO [2022-12-06 10:49:32,535] peewee_migrate: add_column ('ignored_by_port_proto', 'netmask', <peewee.IntegerField object at 0x7f89f2564880>)
INFO [2022-12-06 10:49:32,536] peewee_migrate: add_column ('ignored_by_port_proto', 'version', <peewee.IntegerField object at 0x7f89f2564310>)
INFO [2022-12-06 10:49:32,537] peewee_migrate: add_column ('ignored_by_port_proto', 'country_id', <peewee.ForeignKeyField object at 0x7f89f2564340>)
INFO [2022-12-06 10:49:32,538] peewee_migrate: Done 086_ignored_by_port_fields
INFO [2022-12-06 10:49:32,542] peewee_migrate: Running "087_ignored_by_port_fields"
INFO [2022-12-06 10:49:32,543] peewee_migrate: add_not_null ('ignored_by_port_proto', 'network_address')
INFO [2022-12-06 10:49:32,549] peewee_migrate: add_not_null ('ignored_by_port_proto', 'netmask')
INFO [2022-12-06 10:49:32,554] peewee_migrate: add_not_null ('ignored_by_port_proto', 'version')
INFO [2022-12-06 10:49:32,559] peewee_migrate: Done 087_ignored_by_port_fields
INFO [2022-12-06 10:49:32,563] peewee_migrate: Running "088_add_malware_i360_clamd_scan_option"
INFO [2022-12-06 10:49:32,564] peewee_migrate: Done 088_add_malware_i360_clamd_scan_option
INFO [2022-12-06 10:49:32,568] peewee_migrate: Running "089_proactive_tables"
INFO [2022-12-06 10:49:32,572] peewee_migrate: Done 089_proactive_tables
INFO [2022-12-06 10:49:32,578] peewee_migrate: Running "090_safe_user_config"
INFO [2022-12-06 10:49:32,585] peewee_migrate: Done 090_safe_user_config
INFO [2022-12-06 10:49:32,590] peewee_migrate: Running "091_compress_old_logs"
INFO [2022-12-06 10:49:32,593] peewee_migrate: Done 091_compress_old_logs
INFO [2022-12-06 10:49:32,597] peewee_migrate: Running "092_ignore_proc_sys_dirs"
INFO [2022-12-06 10:49:32,599] peewee_migrate: Done 092_ignore_proc_sys_dirs
INFO [2022-12-06 10:49:32,608] peewee_migrate: Running "092_remove_old_disabled_rules"
INFO [2022-12-06 10:49:32,610] peewee_migrate: Done 092_remove_old_disabled_rules
INFO [2022-12-06 10:49:32,614] peewee_migrate: Running "093_make_quarantined_files_immutable"
INFO [2022-12-06 10:49:32,616] peewee_migrate: Done 093_make_quarantined_files_immutable
INFO [2022-12-06 10:49:32,621] peewee_migrate: Running "094_ignore_cagefs_proc"
INFO [2022-12-06 10:49:32,625] peewee_migrate: Done 094_ignore_cagefs_proc
INFO [2022-12-06 10:49:32,629] peewee_migrate: Running "095_add_total_malicious_field"
INFO [2022-12-06 10:49:32,631] peewee_migrate: add_column ('malware_scans', 'total_malicious', <peewee.IntegerField object at 0x7f89f25e8220>)
INFO [2022-12-06 10:49:32,640] peewee_migrate: Done 095_add_total_malicious_field
INFO [2022-12-06 10:49:32,646] peewee_migrate: Running "096_populate_total_malicious_field"
INFO [2022-12-06 10:49:32,649] peewee_migrate: Done 096_populate_total_malicious_field
INFO [2022-12-06 10:49:32,654] peewee_migrate: Running "097_remove_uid_and_gid"
INFO [2022-12-06 10:49:32,655] peewee_migrate: drop_column ('malware_hits', 'uid')
INFO [2022-12-06 10:49:32,659] peewee_migrate: drop_column ('malware_hits', 'gid')
INFO [2022-12-06 10:49:32,664] peewee_migrate: Done 097_remove_uid_and_gid
INFO [2022-12-06 10:49:32,669] peewee_migrate: Running "098_remote_proxy_tables"
INFO [2022-12-06 10:49:32,673] peewee_migrate: Done 098_remote_proxy_tables
INFO [2022-12-06 10:49:32,678] peewee_migrate: Running "099_remove_old_disabled_rules"
INFO [2022-12-06 10:49:32,680] peewee_migrate: Done 099_remove_old_disabled_rules
INFO [2022-12-06 10:49:32,683] peewee_migrate: Running "100_remove_captcha_ports_from_csf"
INFO [2022-12-06 10:49:32,684] peewee_migrate: Done 100_remove_captcha_ports_from_csf
INFO [2022-12-06 10:49:32,687] peewee_migrate: Running "101_remove_unneeded_acronis_ports_from_csf"
INFO [2022-12-06 10:49:32,688] peewee_migrate: Done 101_remove_unneeded_acronis_ports_from_csf
INFO [2022-12-06 10:49:32,692] peewee_migrate: Running "102_proactive_ignore_list"
INFO [2022-12-06 10:49:32,694] peewee_migrate: add_column ('proactive', 'rule_id', <peewee.IntegerField object at 0x7f89f2520880>)
INFO [2022-12-06 10:49:32,695] peewee_migrate: rename_column ('proactive', 'reason', 'rule_name')
INFO [2022-12-06 10:49:32,700] peewee_migrate: Done 102_proactive_ignore_list
INFO [2022-12-06 10:49:32,705] peewee_migrate: Running "102_replace_comodo"
INFO [2022-12-06 10:49:32,706] peewee_migrate: sql ("UPDATE incident SET name=replace(name, 'COMODO WAF', 'IM360 WAF'), description=replace(description, 'COMODO WAF', 'IM360 WAF')",)
INFO [2022-12-06 10:49:32,706] peewee_migrate: sql ("UPDATE disabled_rules SET name=replace(name, 'COMODO WAF', 'IM360 WAF')",)
INFO [2022-12-06 10:49:32,707] peewee_migrate: Done 102_replace_comodo
INFO [2022-12-06 10:49:32,710] peewee_migrate: Running "103_remove_vd_license"
INFO [2022-12-06 10:49:32,711] peewee_migrate: Done 103_remove_vd_license
INFO [2022-12-06 10:49:32,714] peewee_migrate: Running "104_add_feature_management_permissions"
INFO [2022-12-06 10:49:32,715] peewee_migrate: Done 104_add_feature_management_permissions
INFO [2022-12-06 10:49:32,724] peewee_migrate: Running "105_populate_default_feature_management_permissions"
INFO [2022-12-06 10:49:32,728] peewee_migrate: Done 105_populate_default_feature_management_permissions
INFO [2022-12-06 10:49:32,732] peewee_migrate: Running "106_add_malware_cleanup_in_config"
INFO [2022-12-06 10:49:32,827] peewee_migrate: Done 106_add_malware_cleanup_in_config
INFO [2022-12-06 10:49:32,832] peewee_migrate: Running "106_malware_hit_status_field_add"
INFO [2022-12-06 10:49:32,833] peewee_migrate: add_column ('malware_hits', 'status', <peewee.CharField object at 0x7f89f2511250>)
INFO [2022-12-06 10:49:32,838] peewee_migrate: add_column ('malware_hits', 'cleaned_at', <peewee.FloatField object at 0x7f89f2567280>)
INFO [2022-12-06 10:49:32,839] peewee_migrate: Done 106_malware_hit_status_field_add
INFO [2022-12-06 10:49:32,844] peewee_migrate: Running "107_add_bruteforce_rule_33339"
INFO [2022-12-06 10:49:32,951] peewee_migrate: Done 107_add_bruteforce_rule_33339
INFO [2022-12-06 10:49:32,955] peewee_migrate: Running "107_malware_hit_status_field_populate"
INFO [2022-12-06 10:49:32,956] peewee_migrate: drop_column ('malware_hits', 'restored')
INFO [2022-12-06 10:49:32,960] peewee_migrate: Done 107_malware_hit_status_field_populate
INFO [2022-12-06 10:49:32,964] peewee_migrate: Running "108_feature_management_cleanup_add"
INFO [2022-12-06 10:49:32,965] peewee_migrate: add_column ('feature_management_permissions', 'cleanup', <peewee.BooleanField object at 0x7f89f25647c0>)
INFO [2022-12-06 10:49:32,972] peewee_migrate: Done 108_feature_management_cleanup_add
INFO [2022-12-06 10:49:32,975] peewee_migrate: Running "108_validate_config"
INFO [2022-12-06 10:49:33,052] peewee_migrate: Done 108_validate_config
INFO [2022-12-06 10:49:33,057] peewee_migrate: Running "109_dos_detector"
INFO [2022-12-06 10:49:33,157] peewee_migrate: Done 109_dos_detector
INFO [2022-12-06 10:49:33,161] peewee_migrate: Running "110_ignore_list_ip_as_int"
INFO [2022-12-06 10:49:33,163] peewee_migrate: Done 110_ignore_list_ip_as_int
INFO [2022-12-06 10:49:33,167] peewee_migrate: Running "111_ignore_list_ip_as_int"
INFO [2022-12-06 10:49:33,168] peewee_migrate: sql ('DROP TABLE ignore_list',)
INFO [2022-12-06 10:49:33,169] peewee_migrate: sql ('ALTER TABLE ignore_list_new RENAME TO ignore_list',)
INFO [2022-12-06 10:49:33,172] peewee_migrate: Done 111_ignore_list_ip_as_int
INFO [2022-12-06 10:49:33,177] peewee_migrate: Running "112_hardened_php"
INFO [2022-12-06 10:49:33,178] peewee_migrate: Done 112_hardened_php
INFO [2022-12-06 10:49:33,182] peewee_migrate: Running "113_move_quarantined_files"
INFO [2022-12-06 10:49:33,182] peewee_migrate: Done 113_move_quarantined_files
INFO [2022-12-06 10:49:33,185] peewee_migrate: Running "114_disable_auto-quarantine"
INFO [2022-12-06 10:49:33,187] peewee_migrate: Done 114_disable_auto-quarantine
INFO [2022-12-06 10:49:33,190] peewee_migrate: Running "115_feature_management_fields"
INFO [2022-12-06 10:49:33,191] peewee_migrate: add_column ('feature_management_permissions', 'proactive_new', <peewee.TextField object at 0x7f89f250a610>)
INFO [2022-12-06 10:49:33,197] peewee_migrate: add_column ('feature_management_permissions', 'av', <peewee.TextField object at 0x7f89f2524910>)
INFO [2022-12-06 10:49:33,203] peewee_migrate: sql ('UPDATE feature_management_permissions SET av=? WHERE cleanup=1', 'full')
INFO [2022-12-06 10:49:33,203] peewee_migrate: sql ('UPDATE feature_management_permissions SET av=? WHERE cleanup=0', 'report')
INFO [2022-12-06 10:49:33,204] peewee_migrate: sql ('UPDATE feature_management_permissions SET proactive_new=? WHERE proactive=1', 'full')
INFO [2022-12-06 10:49:33,204] peewee_migrate: sql ('UPDATE feature_management_permissions SET proactive_new=? WHERE proactive=0', 'na')
INFO [2022-12-06 10:49:33,205] peewee_migrate: drop_column ('feature_management_permissions', 'proactive')
INFO [2022-12-06 10:49:33,209] peewee_migrate: drop_column ('feature_management_permissions', 'cleanup')
INFO [2022-12-06 10:49:33,215] peewee_migrate: Done 115_feature_management_fields
INFO [2022-12-06 10:49:33,219] peewee_migrate: Running "116_feature_management_fields"
INFO [2022-12-06 10:49:33,220] peewee_migrate: rename_column ('feature_management_permissions', 'proactive_new', 'proactive')
INFO [2022-12-06 10:49:33,230] peewee_migrate: Done 116_feature_management_fields
INFO [2022-12-06 10:49:33,235] peewee_migrate: Running "117_remove_incorrect_fields"
INFO [2022-12-06 10:49:33,339] peewee_migrate: Done 117_remove_incorrect_fields
INFO [2022-12-06 10:49:33,343] peewee_migrate: Running "118_add_malware_user_infected"
INFO [2022-12-06 10:49:33,344] peewee_migrate: Done 118_add_malware_user_infected
INFO [2022-12-06 10:49:33,349] peewee_migrate: Running "118_remove_country_subnets"
INFO [2022-12-06 10:49:33,350] peewee_migrate: Done 118_remove_country_subnets
INFO [2022-12-06 10:49:33,354] peewee_migrate: Running "119_populate_malware_user_infected"
INFO [2022-12-06 10:49:33,356] peewee_migrate: Done 119_populate_malware_user_infected
INFO [2022-12-06 10:49:33,361] peewee_migrate: Running "120_scheduled_scan"
INFO [2022-12-06 10:49:33,584] peewee_migrate: change_column ('malware_scans', 'type', <peewee.CharField object at 0x7f89f2567190>)
INFO [2022-12-06 10:49:33,598] peewee_migrate: Done 120_scheduled_scan
INFO [2022-12-06 10:49:33,605] peewee_migrate: Running "121_drop_captcha_stat"
INFO [2022-12-06 10:49:33,607] peewee_migrate: Done 121_drop_captcha_stat
INFO [2022-12-06 10:49:33,611] peewee_migrate: Running "122_cagefs_unmount"
INFO [2022-12-06 10:49:33,612] peewee_migrate: Done 122_cagefs_unmount
INFO [2022-12-06 10:49:33,617] peewee_migrate: Running "123_add_last_user_scan"
INFO [2022-12-06 10:49:33,618] peewee_migrate: Done 123_add_last_user_scan
INFO [2022-12-06 10:49:33,622] peewee_migrate: Running "123_disable_scheduled_scan"
INFO [2022-12-06 10:49:33,624] peewee_migrate: Done 123_disable_scheduled_scan
INFO [2022-12-06 10:49:33,629] peewee_migrate: Running "123_rename_plesk_vendor"
INFO [2022-12-06 10:49:33,631] peewee_migrate: Done 123_rename_plesk_vendor
INFO [2022-12-06 10:49:33,636] peewee_migrate: Running "124_add_hook_management_functionality"
INFO [2022-12-06 10:49:33,638] peewee_migrate: Done 124_add_hook_management_functionality
INFO [2022-12-06 10:49:33,643] peewee_migrate: Running "124_add_infected_domains_vendor"
INFO [2022-12-06 10:49:33,644] peewee_migrate: add_column ('infected_domain_list', 'vendor', <peewee.TextField object at 0x7f89f25059a0>)
INFO [2022-12-06 10:49:33,650] peewee_migrate: Done 124_add_infected_domains_vendor
INFO [2022-12-06 10:49:33,655] peewee_migrate: Running "125_rescan_scan_type"
INFO [2022-12-06 10:49:33,658] peewee_migrate: sql ('DELETE FROM "malware_scans" WHERE ("started" < ?)', 1667724573)
INFO [2022-12-06 10:49:33,658] peewee_migrate: change_column ('malware_scans', 'type', <peewee.CharField object at 0x7f89f24a6760>)
INFO [2022-12-06 10:49:33,672] peewee_migrate: Done 125_rescan_scan_type
INFO [2022-12-06 10:49:33,678] peewee_migrate: Running "126_add_malware_scan_modified_files_option"
INFO [2022-12-06 10:49:33,791] peewee_migrate: Done 126_add_malware_scan_modified_files_option
INFO [2022-12-06 10:49:33,796] peewee_migrate: Running "126_move_malware_hits_list"
INFO [2022-12-06 10:49:33,799] peewee_migrate: Done 126_move_malware_hits_list
INFO [2022-12-06 10:49:33,804] peewee_migrate: Running "127_remove_malware_hit_mode"
INFO [2022-12-06 10:49:33,805] peewee_migrate: drop_column ('malware_hits', 'mode')
INFO [2022-12-06 10:49:33,814] peewee_migrate: Done 127_remove_malware_hit_mode
INFO [2022-12-06 10:49:33,827] peewee_migrate: Running "128_move_cleanup_storage_files"
INFO [2022-12-06 10:49:33,829] peewee_migrate: Done 128_move_cleanup_storage_files
INFO [2022-12-06 10:49:33,834] peewee_migrate: Running "129_fixed_cagefs_unmount"
INFO [2022-12-06 10:49:33,835] peewee_migrate: Done 129_fixed_cagefs_unmount
INFO [2022-12-06 10:49:33,839] peewee_migrate: Running "130_add_messages_to_send"
INFO [2022-12-06 10:49:33,842] peewee_migrate: Done 130_add_messages_to_send
INFO [2022-12-06 10:49:33,845] peewee_migrate: Running "131_incident_timestamp_index"
INFO [2022-12-06 10:49:33,846] peewee_migrate: sql ('CREATE INDEX IF NOT EXISTS incident_timestamp ON incident (timestamp)',)
INFO [2022-12-06 10:49:33,848] peewee_migrate: Done 131_incident_timestamp_index
INFO [2022-12-06 10:49:33,852] peewee_migrate: Running "132_add_timestamp_field"
INFO [2022-12-06 10:49:33,853] peewee_migrate: add_column ('malware_hits', 'timestamp', <peewee.FloatField object at 0x7f89f2564e50>)
INFO [2022-12-06 10:49:33,856] peewee_migrate: Done 132_add_timestamp_field
INFO [2022-12-06 10:49:33,860] peewee_migrate: Running "133_add_scope_field_to_iplist"
INFO [2022-12-06 10:49:33,860] peewee_migrate: add_column ('iplist', 'scope', <peewee.CharField object at 0x7f89f250a520>)
INFO [2022-12-06 10:49:33,863] peewee_migrate: Done 133_add_scope_field_to_iplist
INFO [2022-12-06 10:49:33,867] peewee_migrate: Running "134_change_default_of_intensity_ram"
INFO [2022-12-06 10:49:34,213] peewee_migrate: Done 134_change_default_of_intensity_ram
INFO [2022-12-06 10:49:34,218] peewee_migrate: Running "135_export_proactive"
INFO [2022-12-06 10:49:34,221] peewee_migrate: Done 135_export_proactive
INFO [2022-12-06 10:49:34,226] peewee_migrate: Running "135_make_completed_nullable"
INFO [2022-12-06 10:49:34,227] peewee_migrate: change_column ('malware_scans', 'completed', <peewee.IntegerField object at 0x7f89f2505d90>)
INFO [2022-12-06 10:49:34,236] peewee_migrate: Done 135_make_completed_nullable
INFO [2022-12-06 10:49:34,240] peewee_migrate: Running "136_drop_proactive"
INFO [2022-12-06 10:49:34,243] peewee_migrate: Done 136_drop_proactive
INFO [2022-12-06 10:49:34,248] peewee_migrate: Running "137_swap_initiator_and_cause"
INFO [2022-12-06 10:49:34,250] peewee_migrate: Done 137_swap_initiator_and_cause
INFO [2022-12-06 10:49:34,254] peewee_migrate: Running "138_move_rapid_scan_dir"
WARNING [2022-12-06 10:49:34,273] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 10:49:34,274] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
INFO [2022-12-06 10:49:34,279] peewee_migrate: Done 138_move_rapid_scan_dir
INFO [2022-12-06 10:49:34,283] peewee_migrate: Running "139_generic_modsec_config"
INFO [2022-12-06 10:49:34,285] peewee_migrate: Done 139_generic_modsec_config
INFO [2022-12-06 10:49:34,289] peewee_migrate: Running "140_cast_malware_hit_orig_file_as_blob"
INFO [2022-12-06 10:49:34,289] peewee_migrate: sql ('UPDATE malware_hits SET orig_file = CAST(orig_file AS BLOB) WHERE typeof(orig_file) != "blob";',)
INFO [2022-12-06 10:49:34,291] peewee_migrate: Done 140_cast_malware_hit_orig_file_as_blob
INFO [2022-12-06 10:49:34,297] peewee_migrate: Running "141_drop_last_user_scans"
INFO [2022-12-06 10:49:34,299] peewee_migrate: Done 141_drop_last_user_scans
INFO [2022-12-06 10:49:34,307] peewee_migrate: Running "143_malware_hit_cascade_delete"
INFO [2022-12-06 10:49:34,307] peewee_migrate: sql ('ALTER TABLE malware_hits RENAME TO malware_hits_old;',)
INFO [2022-12-06 10:49:34,313] peewee_migrate: sql ('INSERT INTO malware_hits (id,scanid_id,user,orig_file,type,malicious,vendor,hash,size,timestamp,status,cleaned_at) SELECT id,scanid_id,user,orig_file,type,malicious,vendor,hash,size,timestamp,status,cleaned_at FROM malware_hits_old;',)
INFO [2022-12-06 10:49:34,313] peewee_migrate: sql ('DROP TABLE malware_hits_old;',)
INFO [2022-12-06 10:49:34,314] peewee_migrate: Done 143_malware_hit_cascade_delete
INFO [2022-12-06 10:49:34,320] peewee_migrate: Running "144_remove_clamav_config_options"
INFO [2022-12-06 10:49:34,364] peewee_migrate: Done 144_remove_clamav_config_options
INFO [2022-12-06 10:49:34,368] peewee_migrate: Running "144_remove_hash_table"
INFO [2022-12-06 10:49:34,369] peewee_migrate: sql ('DROP TABLE IF EXISTS malware_hash;',)
INFO [2022-12-06 10:49:34,371] peewee_migrate: Done 144_remove_hash_table
INFO [2022-12-06 10:49:34,374] peewee_migrate: Running "145_move_quarantine"
INFO [2022-12-06 10:49:34,376] peewee_migrate: Done 145_move_quarantine
INFO [2022-12-06 10:49:34,379] peewee_migrate: Running "146_malware_user_infected_cascade_delete"
INFO [2022-12-06 10:49:34,380] peewee_migrate: Done 146_malware_user_infected_cascade_delete
INFO [2022-12-06 10:49:34,384] peewee_migrate: Running "147_remove_vendor_field"
INFO [2022-12-06 10:49:34,384] peewee_migrate: drop_column ('malware_hits', 'vendor')
INFO [2022-12-06 10:49:34,392] peewee_migrate: Done 147_remove_vendor_field
INFO [2022-12-06 10:49:34,398] peewee_migrate: Running "147_user_scan_type"
INFO [2022-12-06 10:49:34,399] peewee_migrate: change_column ('malware_scans', 'type', <peewee.CharField object at 0x7f89f25f0ca0>)
INFO [2022-12-06 10:49:34,412] peewee_migrate: Done 147_user_scan_type
INFO [2022-12-06 10:49:34,416] peewee_migrate: Running "148_reconstruct_pickled_scan_queue"
INFO [2022-12-06 10:49:34,418] peewee_migrate: Done 148_reconstruct_pickled_scan_queue
INFO [2022-12-06 10:49:34,421] peewee_migrate: Running "148_remove_malware_user_infected"
INFO [2022-12-06 10:49:34,422] peewee_migrate: sql ('DROP TABLE IF EXISTS malware_user_infected',)
INFO [2022-12-06 10:49:34,423] peewee_migrate: Done 148_remove_malware_user_infected
INFO [2022-12-06 10:49:34,427] peewee_migrate: Running "149_add_captcha_passed_field_to_iplist"
INFO [2022-12-06 10:49:34,428] peewee_migrate: add_column ('iplist', 'captcha_passed', <peewee.BooleanField object at 0x7f89f2524700>)
INFO [2022-12-06 10:49:34,439] peewee_migrate: Done 149_add_captcha_passed_field_to_iplist
INFO [2022-12-06 10:49:34,444] peewee_migrate: Running "149_make_config_inactive"
INFO [2022-12-06 10:49:34,456] peewee_migrate: Done 149_make_config_inactive
INFO [2022-12-06 10:49:34,462] peewee_migrate: Running "150_update_captcha_passed_field_for_iplist_entries"
INFO [2022-12-06 10:49:34,465] peewee_migrate: Done 150_update_captcha_passed_field_for_iplist_entries
INFO [2022-12-06 10:49:34,468] peewee_migrate: Running "151_change_constraint_for_iplist"
INFO [2022-12-06 10:49:34,469] peewee_migrate: change_column ('iplist', 'listname', <peewee.CharField object at 0x7f89f25f05e0>)
INFO [2022-12-06 10:49:34,488] peewee_migrate: Done 151_change_constraint_for_iplist
INFO [2022-12-06 10:49:34,494] peewee_migrate: Running "152_add_listname_to_primary_key"
INFO [2022-12-06 10:49:34,497] peewee_migrate: sql ('INSERT INTO tmpiplist (ip,listname,expiration,imported_from,ctime,deep,comment,captcha_passed,manual,full_access,auto_whitelisted,network_address,netmask,version,scope,country_id) SELECT ip,listname,expiration,imported_from,ctime,deep,comment,captcha_passed,manual,full_access,auto_whitelisted,network_address,netmask,version,scope,country_id FROM iplist',)
INFO [2022-12-06 10:49:34,498] peewee_migrate: sql ('DROP TABLE iplist',)
INFO [2022-12-06 10:49:34,498] peewee_migrate: sql ('ALTER TABLE tmpiplist RENAME TO iplist',)
INFO [2022-12-06 10:49:34,500] peewee_migrate: add_index ('iplist', ['listname'])
INFO [2022-12-06 10:49:34,501] peewee_migrate: add_index ('iplist', ['expiration'])
INFO [2022-12-06 10:49:34,501] peewee_migrate: add_index ('iplist', ['ip'])
INFO [2022-12-06 10:49:34,502] peewee_migrate: Done 152_add_listname_to_primary_key
INFO [2022-12-06 10:49:34,509] peewee_migrate: Running "153_migrate_config_default_action"
INFO [2022-12-06 10:49:34,511] peewee_migrate: Done 153_migrate_config_default_action
INFO [2022-12-06 10:49:34,515] peewee_migrate: Running "153_update_incident_name"
INFO [2022-12-06 10:49:34,515] peewee_migrate: sql ("UPDATE incident SET name='Login Blocked by cpHulk' where plugin='cphulk' and name=''",)
INFO [2022-12-06 10:49:34,517] peewee_migrate: Done 153_update_incident_name
INFO [2022-12-06 10:49:34,522] peewee_migrate: Running "154_migrate_config_user_override_malware_actions"
INFO [2022-12-06 10:49:34,556] peewee_migrate: Done 154_migrate_config_user_override_malware_actions
INFO [2022-12-06 10:49:34,560] peewee_migrate: Running "155_migrate_config_user_override_proactive_defense"
INFO [2022-12-06 10:49:34,607] peewee_migrate: Done 155_migrate_config_user_override_proactive_defense
INFO [2022-12-06 10:49:34,611] peewee_migrate: Running "156_remove_default_values_from_config"
INFO [2022-12-06 10:49:34,613] peewee_migrate: Done 156_remove_default_values_from_config
INFO [2022-12-06 10:49:34,617] peewee_migrate: Running "157_move_i360_modsec_disable_conf"
INFO [2022-12-06 10:49:34,618] peewee_migrate: Done 157_move_i360_modsec_disable_conf
INFO [2022-12-06 10:49:34,622] peewee_migrate: Running "158_move_i360_modsec_disable_conf_symlink"
INFO [2022-12-06 10:49:34,623] peewee_migrate: Done 158_move_i360_modsec_disable_conf_symlink
INFO [2022-12-06 10:49:34,627] peewee_migrate: Running "159_remove_defaults_from_local_config"
INFO [2022-12-06 10:49:34,738] peewee_migrate: Done 159_remove_defaults_from_local_config
INFO [2022-12-06 10:49:34,743] peewee_migrate: Running "160_remove_quarantine"
INFO [2022-12-06 10:49:34,745] peewee_migrate: Done 160_remove_quarantine
INFO [2022-12-06 10:49:34,749] peewee_migrate: Running "160_unmount_sigs_v1"
INFO [2022-12-06 10:49:34,751] peewee_migrate: Done 160_unmount_sigs_v1
INFO [2022-12-06 10:49:34,759] peewee_migrate: Running "161_remove_ea4_main_local_conf"
INFO [2022-12-06 10:49:34,760] peewee_migrate: Done 161_remove_ea4_main_local_conf
INFO [2022-12-06 10:49:34,764] peewee_migrate: Running "162_add_resource_type"
INFO [2022-12-06 10:49:34,765] peewee_migrate: add_column ('malware_hits', 'resource_type', <peewee.CharField object at 0x7f89f2567700>)
INFO [2022-12-06 10:49:34,771] peewee_migrate: add_column ('malware_hits', 'app_name', <peewee.CharField object at 0x7f89f2567190>)
INFO [2022-12-06 10:49:34,772] peewee_migrate: add_column ('malware_hits', 'db_host', <peewee.CharField object at 0x7f89f2567cd0>)
INFO [2022-12-06 10:49:34,773] peewee_migrate: add_column ('malware_hits', 'db_port', <peewee.CharField object at 0x7f89f2463f10>)
INFO [2022-12-06 10:49:34,774] peewee_migrate: add_column ('malware_hits', 'db_name', <peewee.CharField object at 0x7f89f2463d00>)
INFO [2022-12-06 10:49:34,775] peewee_migrate: add_column ('malware_scans', 'resource_type', <peewee.CharField object at 0x7f89f2479220>)
INFO [2022-12-06 10:49:34,784] peewee_migrate: rename_column ('malware_scans', 'total_files', 'total_resources')
INFO [2022-12-06 10:49:34,790] peewee_migrate: Done 162_add_resource_type
INFO [2022-12-06 10:49:35,078] peewee_migrate: Running "163_drop_malware_scanned_stat"
INFO [2022-12-06 10:49:35,080] peewee_migrate: Done 163_drop_malware_scanned_stat
INFO [2022-12-06 10:49:35,085] peewee_migrate: Running "164_add_resource_type_to_ignore"
INFO [2022-12-06 10:49:35,087] peewee_migrate: sql ("INSERT INTO tmp_malware_ignore_path(path,added_date,resource_type) SELECT path,added_date,'file' FROM malware_ignore_path",)
INFO [2022-12-06 10:49:35,087] peewee_migrate: sql ('DROP TABLE malware_ignore_path',)
INFO [2022-12-06 10:49:35,088] peewee_migrate: sql ('ALTER TABLE tmp_malware_ignore_path RENAME TO malware_ignore_path',)
INFO [2022-12-06 10:49:35,090] peewee_migrate: add_index ('malware_ignore_path', ['resource_type'])
INFO [2022-12-06 10:49:35,091] peewee_migrate: Done 164_add_resource_type_to_ignore
INFO [2022-12-06 10:49:35,096] peewee_migrate: Running "165_add_db_fields_to_malware_history"
INFO [2022-12-06 10:49:35,097] peewee_migrate: add_column ('malware_history', 'app_name', <peewee.CharField object at 0x7f89f27fdeb0>)
INFO [2022-12-06 10:49:35,099] peewee_migrate: add_column ('malware_history', 'resource_type', <peewee.CharField object at 0x7f89f25644c0>)
INFO [2022-12-06 10:49:35,105] peewee_migrate: Done 165_add_db_fields_to_malware_history
INFO [2022-12-06 10:49:35,113] peewee_migrate: Running "166_add_id_field_to_malware_ignore_path"
INFO [2022-12-06 10:49:35,113] peewee_migrate: sql ('ALTER TABLE malware_ignore_path RENAME TO malware_ignore_path_old;',)
INFO [2022-12-06 10:49:35,119] peewee_migrate: sql ("INSERT INTO malware_ignore_path(path,added_date,resource_type) SELECT path,added_date,'file' FROM malware_ignore_path_old",)
INFO [2022-12-06 10:49:35,120] peewee_migrate: sql ('DROP TABLE malware_ignore_path_old;',)
INFO [2022-12-06 10:49:35,121] peewee_migrate: Done 166_add_id_field_to_malware_ignore_path
INFO [2022-12-06 10:49:35,130] peewee_migrate: Running "167_remote_iplist"
INFO [2022-12-06 10:49:35,132] peewee_migrate: Done 167_remote_iplist
INFO [2022-12-06 10:49:35,137] peewee_migrate: Running "168_add_icontact_throttle"
INFO [2022-12-06 10:49:35,139] peewee_migrate: Done 168_add_icontact_throttle
INFO [2022-12-06 10:49:35,143] peewee_migrate: Running "169_add_record_to_throttle_scan_not_schedule_events"
INFO [2022-12-06 10:49:35,144] peewee_migrate: Done 169_add_record_to_throttle_scan_not_schedule_events
INFO [2022-12-06 10:49:35,149] peewee_migrate: Running "170_add_db_fields_to_malware_history"
INFO [2022-12-06 10:49:35,150] peewee_migrate: add_column ('malware_history', 'db_host', <peewee.CharField object at 0x7f89f2447760>)
INFO [2022-12-06 10:49:35,151] peewee_migrate: add_column ('malware_history', 'db_port', <peewee.CharField object at 0x7f89f2505250>)
INFO [2022-12-06 10:49:35,152] peewee_migrate: add_column ('malware_history', 'db_name', <peewee.CharField object at 0x7f89f27fd310>)
INFO [2022-12-06 10:49:35,153] peewee_migrate: Done 170_add_db_fields_to_malware_history
INFO [2022-12-06 10:49:35,157] peewee_migrate: Running "180_move_captcha_configs"
INFO [2022-12-06 10:49:35,158] peewee_migrate: Done 180_move_captcha_configs
INFO [2022-12-06 10:49:35,162] peewee_migrate: Running "181_move_invisible_captcha"
WARNING [2022-12-06 10:49:35,163] builtins: invisible-captcha.conf exists, skipping...
INFO [2022-12-06 10:49:35,164] peewee_migrate: Done 181_move_invisible_captcha
INFO [2022-12-06 10:49:35,168] peewee_migrate: Running "182_remove_constraints_from_icontact_throttle"
INFO [2022-12-06 10:49:35,168] peewee_migrate: sql ('ALTER TABLE icontact_throttle RENAME TO icontact_throttle_old',)
INFO [2022-12-06 10:49:35,171] peewee_migrate: sql ('INSERT INTO icontact_throttle(message_type,timestamp) SELECT message_type,timestamp FROM icontact_throttle_old',)
INFO [2022-12-06 10:49:35,172] peewee_migrate: sql ('DROP TABLE icontact_throttle_old',)
INFO [2022-12-06 10:49:35,173] peewee_migrate: Done 182_remove_constraints_from_icontact_throttle
INFO [2022-12-06 10:49:35,177] defence360agent.migrate: Starting main process...
INFO [2022-12-06 10:49:37,963] defence360agent.utils.check_db: Database /var/imunify360/imunify360.db integrity check...
INFO [2022-12-06 10:49:37,967] defence360agent.utils.check_db: Database integrity check succeeded.
ERROR [2022-12-06 10:49:38,240] defence360agent.internals.iaid: need to register first
INFO [2022-12-06 10:49:38,425] defence360agent.api.server: Performed request for url=https://api.imunify360.com/api/auth/agent/register method=POST body=None status=200
INFO [2022-12-06 10:49:38,425] defence360agent.api.server: Response=b'{"iaid":"8fab579b95ee4f119a1d4b06723cb8ba","passwo' ...
ERROR [2022-12-06 10:49:38,515] defence360agent.internals.iaid: something went wrong on activate APIError('request failed, reason: HTTP Error 400: Bad Request', 400) attempt 1
INFO [2022-12-06 10:49:38,538] defence360agent.files: Updating all files
INFO [2022-12-06 10:49:38,539] defence360agent.files: Updating ossec files via all.zip
INFO [2022-12-06 10:49:38,882] defence360agent.files: Validating [ossec]: /var/imunify360/files/ossec/v1_2022-12-06T084938.539558Z
WARNING [2022-12-06 10:49:38,890] defence360agent.files: Fixing wrong permission to file/dir /var/imunify360/files/ossec [0o777] expected [0o770] (not symlink)
INFO [2022-12-06 10:49:38,892] defence360agent.files: Updated ossec using all.zip
INFO [2022-12-06 10:49:38,909] im360.subsys.ossec: Selecting 3.1.0-101l version of OSSEC configuration
INFO [2022-12-06 10:49:41,263] defence360agent.files: ossec files update finished
INFO [2022-12-06 10:49:41,263] defence360agent.files: Updating static-whitelist files via all.zip
INFO [2022-12-06 10:49:41,619] defence360agent.files: Validating [static-whitelist]: /var/imunify360/files/whitelist/v2_2022-12-06T084941.264329Z
WARNING [2022-12-06 10:49:41,640] defence360agent.files: Fixing wrong permission to file/dir /var/imunify360/files/whitelist [0o777] expected [0o770] (not symlink)
INFO [2022-12-06 10:49:41,643] defence360agent.files: Updated static-whitelist using all.zip
INFO [2022-12-06 10:49:41,643] im360.subsys.webshield: Updating webshield internal whitelist using imunify360-webshield-compose-lists script
INFO [2022-12-06 10:49:41,832] defence360agent.contracts.config_provider: CachedConfigReader <'/etc/sysconfig/imunify360/imunify360-merged.config', modified at 1670316570.9236832, 3901 bytes> modified: removed={}, added={}, changed={"LOGGER": {"+": {}, "-": {}, "?": {"syscall_monitor": [false, true]}}, "MALWARE_SCANNING": {"+": {}, "-": {}, "?": {"hyperscan": [false, true]}}, "PROACTIVE_DEFENCE": {"+": {}, "-": {}, "?": {"mode": ["LOG", "KILL"], "php_immunity": [false, true]}}}
INFO [2022-12-06 10:49:41,898] defence360agent.files: static-whitelist files update finished
INFO [2022-12-06 10:49:41,899] defence360agent.files: Updating realtime-av-conf files via file by file download
INFO [2022-12-06 10:49:42,475] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:42 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:27 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2814FEEFA01A'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#615651714/gid:10192/mode:33204/mtime:1664438297#0/uid:1001'), ('x-amz-version-id', '51e7f9bb-ac2f-4167-a129-014925f9ae63'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/realtime-av-conf/v1/cpanel/watched.txt'
INFO [2022-12-06 10:49:42,995] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:42 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:27 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28151DFB5724'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#615651714/gid:10192/mode:33204/mtime:1664438297#0/uid:1001'), ('x-amz-version-id', '61807276-fe91-43dc-b963-9ce2c030f5a7'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/realtime-av-conf/v1/plesk/watched.txt'
INFO [2022-12-06 10:49:43,326] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:43 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '119'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"7ede7b980a2a10ed096ee57abef1939a"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:27 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281531A263D6'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#615651714/gid:10192/mode:33204/mtime:1664438297#0/uid:1001'), ('x-amz-version-id', 'ebd2146b-2ef3-43eb-abac-a1d79484b99a'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/realtime-av-conf/v1/common/watched.txt'
INFO [2022-12-06 10:49:43,586] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:43 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '443'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"c4c904dcf80b733c2c735eaecc2aecfb"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:27 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2815413018C6'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#615651714/gid:10192/mode:33204/mtime:1664438297#0/uid:1001'), ('x-amz-version-id', 'e4ae36af-54d3-4b2e-8faf-a3d28a1cabb6'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/realtime-av-conf/v1/cpanel/ignored.txt'
INFO [2022-12-06 10:49:43,840] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:43 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '124'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"5a3c918fc17ae607dacef2b97cb96a3e"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:27 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2815504EFD3C'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#615651714/gid:10192/mode:33204/mtime:1664438297#0/uid:1001'), ('x-amz-version-id', '6413d3d4-cce8-4cdd-aa21-c5a8780dfa91'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/realtime-av-conf/v1/directadmin/ignored.txt'
INFO [2022-12-06 10:49:44,094] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:44 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:27 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28155F7E616E'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#615651714/gid:10192/mode:33204/mtime:1664438297#0/uid:1001'), ('x-amz-version-id', '6e8c286f-208d-4cdd-9e10-20da970f8930'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/realtime-av-conf/v1/directadmin/watched.txt'
INFO [2022-12-06 10:49:44,179] defence360agent.simple_rpc: Executing ('update',), params: {'subj': 'modsec-rules', 'force': False}
INFO [2022-12-06 10:49:44,409] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:44 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '238'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"a12bb3c27c3ec721db3a7e09e9d620b4"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:27 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E28157232F331'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#615651714/gid:10192/mode:33204/mtime:1664438297#0/uid:1001'), ('x-amz-version-id', 'c3ca844b-c046-4bc2-b53c-e06f21443397'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/realtime-av-conf/v1/plesk/ignored.txt'
INFO [2022-12-06 10:49:44,411] defence360agent.files: Validating [realtime-av-conf]: /var/imunify360/files/realtime-av-conf/v1_2022-12-06T084942.157347Z
WARNING [2022-12-06 10:49:44,413] defence360agent.files: Fixing wrong permission to file/dir /var/imunify360/files/realtime-av-conf [0o777] expected [0o770] (not symlink)
INFO [2022-12-06 10:49:44,414] defence360agent.files: Updated realtime-av-conf using file by file download
INFO [2022-12-06 10:49:44,415] im360.malwarelib.subsys.aibolit: ai-bolit service will be restarted
INFO [2022-12-06 10:49:44,447] defence360agent.files: realtime-av-conf files update finished
INFO [2022-12-06 10:49:44,448] defence360agent.files: Updating modsec-rules files via all.zip
INFO [2022-12-06 10:49:44,629] defence360agent.files: Updating modsec-rules files via all.zip
INFO [2022-12-06 10:49:45,192] defence360agent.files: Validating [modsec-rules]: /var/imunify360/files/modsec/v2_2022-12-06T084944.448655Z
WARNING [2022-12-06 10:49:45,205] defence360agent.files: Fixing wrong permission to file/dir /var/imunify360/files/modsec [0o777] expected [0o770] (not symlink)
INFO [2022-12-06 10:49:45,208] defence360agent.files: Updated modsec-rules using all.zip
ERROR [2022-12-06 10:49:45,231] defence360agent.files: hook <function update_vendors at 0x7f80fa94ae50> error: Integration config is missing server_type field
Traceback (most recent call last):
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 376, in _get_web_server_type
web_server = IntegrationConfig.to_dict()["web_server"]["server_type"]
File "/opt/alt/python38/lib/python3.8/configparser.py", line 960, in __getitem__
raise KeyError(key)
KeyError: 'web_server'
The above exception was the direct cause of the following exception:
Traceback (most recent call last):
File "/opt/alt/python38/lib/python3.8/dist-packages/defence360agent/files/__init__.py", line 946, in _run_hooks
await hook(self, is_updated)
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/update_hooks.py", line 32, in update_vendors
await hp.apply_modsec_files_update()
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/base.py", line 311, in apply_modsec_files_update
await cls._apply_modsec_files_update()
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 196, in _apply_modsec_files_update
await GenericFilesVendorList.install_or_update()
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/base.py", line 556, in install_or_update
compatible_name = cls._get_compatible_name(installed_vendors)
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 363, in _get_compatible_name
web_server = _get_web_server_type()
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 378, in _get_web_server_type
raise GenericPanelModSecException(
im360.subsys.panels.generic.mod_security.GenericPanelModSecException: Integration config is missing server_type field
INFO [2022-12-06 10:49:45,269] defence360agent.files: modsec-rules files update finished
INFO [2022-12-06 10:49:45,270] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 10:49:45,333] defence360agent.files: Validating [modsec-rules]: /var/imunify360/files/modsec/v2_2022-12-06T084944.629983Z
INFO [2022-12-06 10:49:45,358] defence360agent.files: Removing old path on all.zip update: /var/imunify360/files/modsec/v2_2022-12-06T084944.448655Z
INFO [2022-12-06 10:49:45,363] defence360agent.files: Updated modsec-rules using all.zip
ERROR [2022-12-06 10:49:45,386] defence360agent.files: hook <function update_vendors at 0x7fb49ab0f0d0> error: Integration config is missing server_type field
Traceback (most recent call last):
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 376, in _get_web_server_type
web_server = IntegrationConfig.to_dict()["web_server"]["server_type"]
File "/opt/alt/python38/lib/python3.8/configparser.py", line 960, in __getitem__
raise KeyError(key)
KeyError: 'web_server'
The above exception was the direct cause of the following exception:
Traceback (most recent call last):
File "/opt/alt/python38/lib/python3.8/dist-packages/defence360agent/files/__init__.py", line 946, in _run_hooks
await hook(self, is_updated)
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/update_hooks.py", line 32, in update_vendors
await hp.apply_modsec_files_update()
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/base.py", line 311, in apply_modsec_files_update
await cls._apply_modsec_files_update()
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 196, in _apply_modsec_files_update
await GenericFilesVendorList.install_or_update()
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/base.py", line 556, in install_or_update
compatible_name = cls._get_compatible_name(installed_vendors)
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 363, in _get_compatible_name
web_server = _get_web_server_type()
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 378, in _get_web_server_type
raise GenericPanelModSecException(
im360.subsys.panels.generic.mod_security.GenericPanelModSecException: Integration config is missing server_type field
INFO [2022-12-06 10:49:45,413] defence360agent.files: modsec-rules files update finished
INFO [2022-12-06 10:49:45,530] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:45 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2815B4FFEAC2'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 10:49:45,531] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 10:49:45,531] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 10:49:45,531] defence360agent.files: Updating sigs files via all.zip
INFO [2022-12-06 10:49:47,755] defence360agent.files: Validating [sigs]: /var/imunify360/files/sigs/v1_2022-12-06T084945.532268Z
WARNING [2022-12-06 10:49:47,944] defence360agent.files: Fixing wrong permission to file/dir /var/imunify360/files/sigs [0o777] expected [0o775] (not symlink)
INFO [2022-12-06 10:49:47,951] defence360agent.files: Updated sigs using all.zip
INFO [2022-12-06 10:49:47,952] im360.malwarelib.subsys.aibolit: ai-bolit service will be restarted
INFO [2022-12-06 10:49:48,007] defence360agent.files: sigs files update finished
INFO [2022-12-06 10:49:48,008] defence360agent.files: Updating ip-record files via all.zip
INFO [2022-12-06 10:49:48,363] defence360agent.files: Validating [ip-record]: /var/imunify360/files/ip-record/v1_2022-12-06T084948.031876Z
WARNING [2022-12-06 10:49:48,365] defence360agent.files: Fixing wrong permission to file/dir /var/imunify360/files/ip-record [0o777] expected [0o770] (not symlink)
INFO [2022-12-06 10:49:48,366] defence360agent.files: Updated ip-record using all.zip
WARNING [2022-12-06 10:49:48,367] im360.subsys.panels.update_hooks: Can't update ip-record.db, reason: No vendors installed
INFO [2022-12-06 10:49:48,367] defence360agent.files: ip-record files update finished
INFO [2022-12-06 10:49:48,368] defence360agent.files: Updating eula files via file by file download
INFO [2022-12-06 10:49:49,319] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:49 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '44'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"b67a1a512e70da6bd4e1ba5b41ac86ec"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:52:12 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281696D7E97C'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418913#152723130/gid:1000/mode:33261/mtime:1624969185#0/uid:1001'), ('x-amz-version-id', 'f215965b-707e-420f-8aa3-7427b387a56d'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/eula/v1/message.txt'
INFO [2022-12-06 10:49:49,886] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:49 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '43'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"c9da36176dae139594e1e66a5683822c"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:52:12 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2816B8B4A0BD'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418913#152723130/gid:1000/mode:33261/mtime:1624969185#0/uid:1001'), ('x-amz-version-id', '29e6914f-e53f-4481-b1e4-dcfb91b1d8be'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/eula/v1/message-av.txt'
INFO [2022-12-06 10:49:50,200] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:50 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '11'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"7c3dc601067ce4875317e6f17046b5f8"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:52:12 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2816CB707D70'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418913#152723130/gid:1000/mode:33261/mtime:1624969185#0/uid:1001'), ('x-amz-version-id', '73c02f55-dc24-4e36-aeb1-3831dd43f03d'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/eula/v1/updated.txt'
INFO [2022-12-06 10:49:50,454] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:50 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '11'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"7c3dc601067ce4875317e6f17046b5f8"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:52:12 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2816DA9BCB6B'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418913#152723130/gid:1000/mode:33261/mtime:1624969185#0/uid:1001'), ('x-amz-version-id', '8cc09e54-1a62-48cd-92f0-68e17dc51aaa'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/eula/v1/updated-av.txt'
INFO [2022-12-06 10:49:50,456] defence360agent.files: Validating [eula]: /var/imunify360/files/eula/v1_2022-12-06T084948.692593Z
WARNING [2022-12-06 10:49:50,458] defence360agent.files: Fixing wrong permission to file/dir /var/imunify360/files/eula [0o777] expected [0o770] (not symlink)
INFO [2022-12-06 10:49:50,459] defence360agent.files: Updated eula using file by file download
INFO [2022-12-06 10:49:50,464] defence360agent.files: eula files update finished
INFO [2022-12-06 10:49:50,465] defence360agent.files: Updating proactive files via file by file download
INFO [2022-12-06 10:49:50,974] defence360agent.simple_rpc: Executing ('rstatus',), params: {}
INFO [2022-12-06 10:49:51,312] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:51 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:31 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28170DB28EAA'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '9013ad72-29e5-4e06-95ad-aad1f4ae5677'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.5/suspicious_files_list'
INFO [2022-12-06 10:49:51,543] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:49:51,574] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:51 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:00 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28171D4DD487'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '0cdf4a4d-7e43-4616-a497-14e1aea4bd1a'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.2/params_pattern_list'
INFO [2022-12-06 10:49:51,829] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:51 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:00:59 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28172C84A757'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '894003cc-7835-4a58-ae61-bdc596661f3e'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.1/params_pattern_list'
INFO [2022-12-06 10:49:52,396] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:52 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E28174E491539'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '9034b22c-f3cb-4eb0-9d13-87f43a1b1139'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.2/config.ini'
INFO [2022-12-06 10:49:52,712] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:52 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E28176119B187'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'dff0de1d-f374-4f87-b7b6-c560f82a926b'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.4/suspicious_files_list.0'
INFO [2022-12-06 10:49:53,024] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:52 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:06:03 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281773AD972F'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'cf2cf262-718f-49d0-b133-915ff88b7383'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.3/suspicious_files_list.0'
INFO [2022-12-06 10:49:53,335] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:53 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:36 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281786424808'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '70348077-b8ac-4d35-b246-c2f9ae5d0a5e'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.2/suspicious_files_list.1'
INFO [2022-12-06 10:49:54,145] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:54 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:11:06 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2817B613A93A'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '5a63df4d-2fb9-401a-bf59-e4c56d28cabd'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.2/suspicious_files_list.0'
INFO [2022-12-06 10:49:54,257] defence360agent.simple_rpc: Executing ('register',), params: {'regkey': 'IPL'}
INFO [2022-12-06 10:49:54,415] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:54 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:33 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2817C67723E4'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '0f7a1d44-33d4-4b05-ad5e-d6343a5d99de'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.3/test_patch.patch'
INFO [2022-12-06 10:49:54,937] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:54 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '87'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"ea882a4a506df5253f35d0283c3d312b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:00 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2817E5CA63AB'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'ead4d63a-a07b-472b-8893-c8db4222cf39'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.2/rce_patterns_list'
INFO [2022-12-06 10:49:55,192] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:55 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:33 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2817F4F5905C'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '0651f807-955f-42ea-ad8c-6f74b229d9a0'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.3/params_pattern_list.ini'
WARNING [2022-12-06 10:49:55,217] defence360agent.internals.cln: CLN.post(url='https://cln.cloudlinux.com/api/im/register', data=b'key=IPL', headers=None): 400 Bad Request
WARNING [2022-12-06 10:49:55,219] defence360agent.simple_rpc.endpoints: Can't register 'IPL' as imunify360 key. Trying to register it as a web panel key instead
WARNING [2022-12-06 10:49:55,220] defence360agent.simple_rpc.endpoints: Registration with web panel's key doesn't supported
INFO [2022-12-06 10:49:55,460] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:55 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:11:07 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281804F496CD'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '1e90ca25-b191-4f53-85e9-94d7deb21edf'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.2/module.ini'
INFO [2022-12-06 10:49:55,713] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:55 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:59:29 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2818140FAA0D'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '81a31d80-2f0b-47e8-b1d1-219c832cb8ec'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.0/test_patch.patch'
INFO [2022-12-06 10:49:55,980] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:55 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:06:03 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281823DCFB18'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b66e8c05-3d70-467c-bbee-d88efaa1db78'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.3/module.ini'
INFO [2022-12-06 10:49:56,232] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:56 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:00:59 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281832FF01E1'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'e581047b-d1a4-4d20-9c90-84e115a02657'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.1/suspicious_files_list.0'
INFO [2022-12-06 10:49:56,553] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:56 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '655'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"8f237af8543e286bc3d7e1f7187a8da2"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:06 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281845C2B06C'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '44ac87e6-87d3-4001-9cc5-76a5179eec89'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.6/params_pattern_list.ini'
INFO [2022-12-06 10:49:56,807] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:56 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:59:29 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281855480D2E'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b67cc0d5-c692-47d9-9230-57bf715f7811'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.0/nightly_wp_list.txt'
INFO [2022-12-06 10:49:57,126] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:57 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '525'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"404ae0b22687b865bb9dcffed240edf9"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:59:59 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E28186832339B'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '3dbd9354-93fd-43a8-8227-97aae663a54e'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.0/rce_patterns_list'
INFO [2022-12-06 10:49:57,384] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:57 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '525'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"404ae0b22687b865bb9dcffed240edf9"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:07:04 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2818778E27A5'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'c565a210-68d7-4532-903d-fa5253913d46'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.1/rce_patterns_list'
INFO [2022-12-06 10:49:57,874] defence360agent.simple_rpc: Executing ('3rdparty', 'list'), params: {}
INFO [2022-12-06 10:49:58,015] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:57 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:59:28 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E28189D307588'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'e7b641c9-c87c-4d4d-822c-841c99465276'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.0/params_pattern_list.ini'
INFO [2022-12-06 10:49:58,589] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:58 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:32 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2818BF413334'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '34c328db-9462-448a-96ea-d4f4840dbe80'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.2/suspicious_files_list'
INFO [2022-12-06 10:49:58,842] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:58 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:36 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2818CE80768A'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '48c62506-eade-4306-8f6f-13a802b1bd59'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.2/params_pattern_list.ini'
INFO [2022-12-06 10:49:59,163] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:59 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2818E19F9B36'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '5fca7c8d-671c-4257-ad1b-a76bfee38307'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.1/suspicious_files_list'
INFO [2022-12-06 10:49:59,419] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:59 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:07:34 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2818F0E80515'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'd8b53dd6-686e-4863-b40c-49f05885bc0c'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.8/test_patch.patch'
INFO [2022-12-06 10:49:59,673] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:59 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:07:04 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2819000ADF3B'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '08b4a85c-2433-4115-8ad2-45045c1167df'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.1/module.ini'
INFO [2022-12-06 10:49:59,933] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:49:59 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28190F82C9B9'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b87578df-6f12-4b1f-a1ab-11beed6648ac'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.4/config.ini'
INFO [2022-12-06 10:50:00,249] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:00 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '525'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"404ae0b22687b865bb9dcffed240edf9"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2819225DC247'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '76270a0d-f386-4df3-829e-4d2beb69a8e0'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.1/rce_patterns_list'
INFO [2022-12-06 10:50:00,868] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:00 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:33 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E28194743BE8D'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '5dc21219-2846-4197-a186-d9b6b874e298'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.3/nightly_wp_list.txt'
INFO [2022-12-06 10:50:02,079] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:02 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:01 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28198F2C55E3'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '8720a50b-02bb-465c-93f3-e971dcbc86eb'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.3/suspicious_files_list.0'
INFO [2022-12-06 10:50:02,378] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:02 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:01 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2819A0878270'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '2e28a685-2295-405c-8147-dddbfe10cb59'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.3/test_patch.patch'
INFO [2022-12-06 10:50:02,750] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:02 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '6'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"38811edf18bd08449f2ffd10e05e3d91"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:07:34 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2819B74C1278'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b8cd0185-08ad-4097-a4e6-ebc3b181628e'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.8/VERSION'
INFO [2022-12-06 10:50:03,016] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:02 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:08:04 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2819C746EB5A'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b757e984-f5e2-4a7f-909a-214050013acc'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.8/module.ini'
INFO [2022-12-06 10:50:03,282] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:03 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '685'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"3f9322695cadacb62d28393a6e91f5f5"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:01 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2819D6C481A6'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '37e9ec1a-4c04-4477-9399-780182fb7218'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.7/params_pattern_list'
INFO [2022-12-06 10:50:03,543] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:03 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:11:06 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2819E6A87E2A'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b071da82-a15c-401a-a838-b03e800505dd'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.2/params_pattern_list'
INFO [2022-12-06 10:50:03,861] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:03 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:32 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2819F99F873B'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '556c8610-c0c1-4eef-a95c-a625c2ff2b07'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.1/config.ini'
INFO [2022-12-06 10:50:04,741] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:04 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:32 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281A2E216B11'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '872bd447-69ca-4d85-82ac-baf57d2d1560'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.7/config.ini'
INFO [2022-12-06 10:50:04,991] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:04 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:32 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281A3D0D4D16'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '753bb9ea-8575-49e8-89aa-441de2399dfa'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.2/test_patch.patch'
INFO [2022-12-06 10:50:05,306] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:05 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:01:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281A4F8B3B96'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '8c0ab9ea-931a-4a5a-9a34-a591ead5ab75'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.1/config.ini'
INFO [2022-12-06 10:50:05,831] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:05 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '6'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"734f1d67184010e35ae64d86427207d6"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:33 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281A6F141199'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '4edcc5c4-5fe3-4b2f-9e35-aa2bef716845'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.3/VERSION'
INFO [2022-12-06 10:50:06,088] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:06 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:06:33 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281A7E625134'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '22bf60fd-b177-4488-9494-21d2402463e2'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.1/test_patch.patch'
INFO [2022-12-06 10:50:06,341] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:06 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:07:34 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281A8D864BE6'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '9fcbb0c7-ca02-4803-b835-394f593f7e48'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.8/nightly_wp_list.txt'
INFO [2022-12-06 10:50:06,655] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:06 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:06 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281AA02B2812'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'eb678cbe-64d3-4697-a0d7-8abea8e29dcc'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.6/suspicious_files_list.0'
INFO [2022-12-06 10:50:07,479] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:07 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281AD15953A5'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '56b727d3-37d3-4abe-900c-79e1d3ae7e5a'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.4/test_patch.patch'
INFO [2022-12-06 10:50:07,741] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:07 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '525'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"404ae0b22687b865bb9dcffed240edf9"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:06 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281AE0D68FFB'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '300611a9-c492-4fe2-afb3-cc16996c9712'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.6/rce_patterns_list'
INFO [2022-12-06 10:50:07,999] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:07 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:33 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281AF040DE18'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'db56d5da-0259-438e-b7b6-776a1d37fca0'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.3/suspicious_files_list.1'
INFO [2022-12-06 10:50:08,313] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:08 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:59:59 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281B02FED7EC'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'f9a245ae-0c9b-4c96-bd7e-60312140b2fe'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.0/module.ini'
INFO [2022-12-06 10:50:08,996] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:08 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:58:28 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281B2BBB1146'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'd5868550-5389-4d8a-a6fa-7f6f053339dd'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.0/params_pattern_list.ini'
INFO [2022-12-06 10:50:09,573] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:09 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:06:03 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281B4DA04E9F'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '9f11b5dc-fb76-40b1-97d0-02970c3d5f51'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.3/suspicious_files_list'
INFO [2022-12-06 10:50:09,831] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:09 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281B5D7BDED0'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'f96113d9-104a-4b2a-861d-6d042dcee25a'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.1/module.ini'
INFO [2022-12-06 10:50:10,086] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:10 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:08:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281B6CB72299'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b06a2e02-d16b-4305-b34a-c834f8d77c18'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.4/suspicious_files_list.1'
INFO [2022-12-06 10:50:11,091] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:11 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:01:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281BA88E0D83'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '68100daa-f99f-4756-b005-2dfed2fbc8a4'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.2/test_patch.patch'
INFO [2022-12-06 10:50:11,913] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:11 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:58:58 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281BD992D9E1'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'bd4b5a5e-802b-4559-92f1-250a0d88188f'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.0/params_pattern_list'
INFO [2022-12-06 10:50:12,170] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:12 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '57'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"00f5b9c86fe2a4a4edda010a1833cd5b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281BE8EBDFA1'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '5e7592e0-4a30-416a-9bb0-7e3373e38c26'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.5/VERSION'
INFO [2022-12-06 10:50:12,427] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:12 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '87'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"ea882a4a506df5253f35d0283c3d312b"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:58:58 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281BF830934D'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'f84350ff-beb8-4153-9c59-cbf28730cce2'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.0/rce_patterns_list'
INFO [2022-12-06 10:50:12,744] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:12 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:11:07 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281C0B232C09'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '6358e398-9af4-45c8-926b-674e002097a5'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.2/suspicious_files_list'
INFO [2022-12-06 10:50:13,331] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:13 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '685'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"3f9322695cadacb62d28393a6e91f5f5"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281C2E088F53'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'a20e271e-79d2-47c7-a257-d16b848e743b'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.5/params_pattern_list'
INFO [2022-12-06 10:50:13,970] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:13 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:01 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281C5425A3CF'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'db2db7ec-7ac7-4b25-b86c-5aa5bff702b6'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.3/module.ini'
INFO [2022-12-06 10:50:14,543] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:14 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281C7656732B'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '51f159cd-b8f1-40d0-b865-4875a51b285a'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.7/suspicious_files_list'
INFO [2022-12-06 10:50:15,063] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:15 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:58:58 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281C95522668'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '7f81f911-5f0a-45f1-bc8a-2f58e72db809'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.0/suspicious_files_list.0'
INFO [2022-12-06 10:50:15,578] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:15 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '525'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"404ae0b22687b865bb9dcffed240edf9"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:01 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281CB4030DAF'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '7ebdc513-eaf1-42ec-a177-c971d75e377b'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.3/rce_patterns_list'
INFO [2022-12-06 10:50:15,841] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:15 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:58:58 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281CC3B3BCB9'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '9036f470-0c1b-4a5d-a48a-a533be590cb7'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.0/module.ini'
INFO [2022-12-06 10:50:16,466] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:16 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:05 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281CE8FBAF52'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '3a918aba-4da2-4e7b-9f64-0f13c223d722'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.4/params_pattern_list'
INFO [2022-12-06 10:50:17,348] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:17 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:01:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281D1D88E818'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '3ca9dd43-b835-45cb-bf67-9e73ac4be643'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.2/params_pattern_list.ini'
INFO [2022-12-06 10:50:17,977] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:17 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:08:04 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281D4307C5AC'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '5a652652-1bd0-4b81-9dfe-7d564a49dd5f'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.8/suspicious_files_list.0'
INFO [2022-12-06 10:50:18,094] defence360agent.simple_rpc: Executing ('rstatus',), params: {}
INFO [2022-12-06 10:50:18,883] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:18 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:00:29 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281D7912994F'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'f993c6e0-b786-45cc-ba9f-01d8e5467094'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.1/params_pattern_list.ini'
INFO [2022-12-06 10:50:18,955] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:50:19,208] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:19 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:00:59 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281D8C74E2D6'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '05178153-d591-4990-968d-cb33d995ff3a'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.1/module.ini'
INFO [2022-12-06 10:50:19,468] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:19 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '34'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"cc5424cacb2a41a0afecbf895a9f864e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281D9BE697A2'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b823c694-f55c-4e9b-853a-0613c645303b'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.1/black_urls_list'
INFO [2022-12-06 10:50:20,096] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:20 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:01:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281DC165DA65'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '248a1320-9d18-4156-bf2b-8eb7eb9c81c7'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.2/nightly_wp_list.txt'
INFO [2022-12-06 10:50:20,724] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:20 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:08:04 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281DE660A64C'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '0187cd82-618f-412b-9b55-456ad564329c'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.8/params_pattern_list'
INFO [2022-12-06 10:50:21,033] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:21 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '655'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"8f237af8543e286bc3d7e1f7187a8da2"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:01 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281DF933CA1F'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '2e77b5b9-c580-41d4-aed6-cd588a8416ac'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.3/params_pattern_list'
INFO [2022-12-06 10:50:21,293] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:21 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:08:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281E08AE9A6A'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'a670e38d-26fc-4643-953f-f029691b858d'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.4/nightly_wp_list.txt'
INFO [2022-12-06 10:50:21,551] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:21 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:32 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281E1809C126'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '8730f863-488c-45ea-ac5d-1e30d293f0fe'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.2/suspicious_files_list.1'
INFO [2022-12-06 10:50:21,862] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:21 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '621'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58cde253918ae6d375a5bed8a288d427"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:32 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281E2AA12755'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'ccf6a7ac-e3d8-4775-848d-5c840a8b378e'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.2/params_pattern_list.ini'
INFO [2022-12-06 10:50:22,118] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:22 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:11:37 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281E39DB1547'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'dfd9b59b-5c32-4afd-8667-eeb209bf101d'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.2/config.ini'
INFO [2022-12-06 10:50:22,247] defence360agent.simple_rpc: Executing ('rstatus',), params: {}
INFO [2022-12-06 10:50:22,378] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:22 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:01:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281E495957AE'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b766987a-d6ee-449d-ab86-9266f34bc4eb'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.2/suspicious_files_list.1'
INFO [2022-12-06 10:50:22,694] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:22 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '655'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"8f237af8543e286bc3d7e1f7187a8da2"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:31 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281E5C1E29BE'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '6e4c259d-3ef6-400a-918c-c138b41589f3'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.7/params_pattern_list.ini'
INFO [2022-12-06 10:50:22,720] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:50:23,270] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:23 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:59:59 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281E7E7F0D34'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '1a43200a-8269-41b5-9d66-ef1c16771d10'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.0/suspicious_files_list'
INFO [2022-12-06 10:50:23,532] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:23 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '6'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"8dd877cbb3b6a77a849a54b5e3f53aa6"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:08:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281E8DB04B4C'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '8f261fc3-8d2d-40b2-98cb-7933527484f4'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.4/VERSION'
INFO [2022-12-06 10:50:23,788] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:23 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:00:29 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281E9D65BE78'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'e0998e56-b2e0-4239-ae65-475172b70dd6'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.0/config.ini'
INFO [2022-12-06 10:50:24,047] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:24 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:01 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281EACD5594F'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '0255e584-58ba-484e-b483-2bd508b3a9e9'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.3/suspicious_files_list'
INFO [2022-12-06 10:50:24,624] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:24 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '621'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58cde253918ae6d375a5bed8a288d427"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281ECF3514CE'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '42e781c7-b91b-49d8-8038-72902d250399'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.1/params_pattern_list'
INFO [2022-12-06 10:50:24,938] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:24 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:05 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281EE1E407FE'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '86ce095b-d2b9-4790-abfa-11d6609e09a4'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.4/suspicious_files_list'
INFO [2022-12-06 10:50:25,254] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:25 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:31 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281EF4C863C8'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'ae5fee1d-7a11-430c-ad90-adf204ea63e6'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.3/config.ini'
INFO [2022-12-06 10:50:25,821] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:25 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:07:34 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281F168EF3E0'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'd0204396-2334-4f36-80f7-65977506deaf'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.8/suspicious_files_list.1'
INFO [2022-12-06 10:50:26,451] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:26 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281F3C3255A0'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '2a0066d5-9a8f-46bb-bc1c-7babe20d0cab'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.5/test_patch.patch'
INFO [2022-12-06 10:50:26,707] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:26 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:07:04 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281F4B66E89F'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '2066fae2-bc38-4b40-8211-fc97cf58a12e'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.1/params_pattern_list'
INFO [2022-12-06 10:50:27,021] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:26 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:08:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281F5E110713'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '7455e5bf-501c-4323-b2a1-06e2593b01ae'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.4/params_pattern_list.ini'
INFO [2022-12-06 10:50:27,270] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:27 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281F6CFADD97'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'bd855b0f-e906-42ef-839e-9fa99abc6789'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.5/suspicious_files_list.0'
INFO [2022-12-06 10:50:27,528] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:27 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:58:28 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281F7C593896'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'ce952445-fda4-44d7-894b-b000895b3a58'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.0/test_patch.patch'
INFO [2022-12-06 10:50:28,104] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:28 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:36 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281F9EA8383B'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '45758d3b-7237-4f90-a817-22f2fb3053d3'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.2/test_patch.patch'
INFO [2022-12-06 10:50:28,419] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:28 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:31 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281FB15DD0FF'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '47cdb7db-2f79-40d9-82c0-0e23a0e179ed'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.5/module.ini'
INFO [2022-12-06 10:50:28,675] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:28 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:00 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281FC0AF66B5'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '218bc9b5-db0e-4ae6-8896-a360bf60b634'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.2/module.ini'
INFO [2022-12-06 10:50:28,993] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:28 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:00 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E281FD3340525'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '79ca7939-41d0-4c14-9f0d-5e01a5a405ac'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.2/suspicious_files_list'
INFO [2022-12-06 10:50:29,249] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:29 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '87'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"ea882a4a506df5253f35d0283c3d312b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:06:03 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281FE2E6FDB4'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '98c09f01-5a6a-41a8-8b14-5c541885e33e'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.3/rce_patterns_list'
INFO [2022-12-06 10:50:29,504] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:29 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:05 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E281FF215B32E'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '0228174b-19a9-4fd9-92f4-4d0f1f83c295'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.4/suspicious_files_list.0'
INFO [2022-12-06 10:50:30,016] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:29 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '655'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"8f237af8543e286bc3d7e1f7187a8da2"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:01 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2820109CEC4A'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'd3922ba7-f999-4333-b764-2cee09d2937f'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.3/params_pattern_list.ini'
INFO [2022-12-06 10:50:30,524] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:30 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:06 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28202EE482FF'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b85bcbce-ddd5-4011-8bd5-4f6226f54061'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.6/test_patch.patch'
INFO [2022-12-06 10:50:31,099] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:31 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '6'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"b929c585508cab51d778d20e408d49bf"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:00:29 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E282050B46A40'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '04a8557e-d3b7-4ea8-8d0d-c2cd1ad12d06'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.1/VERSION'
INFO [2022-12-06 10:50:31,417] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:31 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '655'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"8f237af8543e286bc3d7e1f7187a8da2"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E282063A7A907'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '45186143-de8e-4b71-a8a4-8f1e80af91c5'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.4/params_pattern_list.ini'
INFO [2022-12-06 10:50:31,978] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:31 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:07:04 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2820859E9E57'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '5cd690cf-ba65-49e7-9c75-0e6bc1468b57'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.1/suspicious_files_list'
INFO [2022-12-06 10:50:32,238] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:32 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '6'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"89e3554e085c8e9fa1f1433e7e6e4507"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:58:28 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28209502813F'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'f34ea475-3fe1-4719-a260-c8c12612585b'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.0/VERSION'
INFO [2022-12-06 10:50:32,548] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:32 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2820A786CC64'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'c7ffb0c6-b75a-4457-ab86-60f6cb60f861'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.4/suspicious_files_list'
INFO [2022-12-06 10:50:32,801] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:32 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:59:59 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2820B699A1FF'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '9083b56e-fbe7-456b-a69f-051438cce924'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.0/suspicious_files_list.0'
INFO [2022-12-06 10:50:33,425] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:33 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:58:28 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2820DBD6E42D'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'ba389ce0-5368-4b87-9669-635ce68452aa'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.0/nightly_wp_list.txt'
INFO [2022-12-06 10:50:33,745] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:33 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:00:29 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2820EE5E0DC3'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '383ecfbb-00c5-473b-9d44-f2f100914204'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.1/suspicious_files_list.1'
INFO [2022-12-06 10:50:34,685] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:34 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '525'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"404ae0b22687b865bb9dcffed240edf9"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2821267CB18A'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '7d1f6265-4c0a-4df3-9170-4702171b8bbc'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.4/rce_patterns_list'
INFO [2022-12-06 10:50:34,937] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:34 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '525'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"404ae0b22687b865bb9dcffed240edf9"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:08:04 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E282135EC4CC0'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'a7d3e61c-219b-4364-988d-6f9ce12832a2'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.8/rce_patterns_list'
INFO [2022-12-06 10:50:35,199] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:35 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '6'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"bb21c11e7b548837faf2ee9c90f0286d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:01:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E282145651EC2'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'afc3c48d-97d1-499e-9046-3e94b4e0a7e1'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.2/VERSION'
INFO [2022-12-06 10:50:36,274] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:36 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:58:58 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E282185AAC397'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '87852c78-adaf-4f0f-9cd4-2c90b02642c3'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.0/suspicious_files_list'
INFO [2022-12-06 10:50:36,531] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:36 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:08:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E282194EFB40A'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '156cd544-c288-47ee-bd84-28e52ebf7af9'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.4/test_patch.patch'
INFO [2022-12-06 10:50:36,842] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:36 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '6'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"06d0293a224884f2cc467d67f3b39573"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:06:33 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2821A772BF86'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '77805c92-990b-40fe-be11-48ed8d35eef4'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.1/VERSION'
INFO [2022-12-06 10:50:37,155] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:37 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2821BA111901'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '2152d0c3-fe2d-4294-a56e-fae03c45ac91'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.2/config.ini'
INFO [2022-12-06 10:50:37,464] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:37 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:06:33 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2821CC8AC675'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'ff405d75-75ab-49a9-93d7-e5cca7a5a330'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.1/params_pattern_list.ini'
INFO [2022-12-06 10:50:38,293] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:38 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '54'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"77e6ab5afa798f9ed1e7841718f31d1c"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:31 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2821FDF1FA44'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '639d9a9f-4500-4046-8f28-b641dae88d29'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.7/VERSION'
INFO [2022-12-06 10:50:38,604] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:38 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E282210740D60'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '0c83ee60-bc0d-4927-ba95-9111ee776ab2'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.1/suspicious_files_list.1'
INFO [2022-12-06 10:50:38,917] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:38 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:36 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2822231D596E'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'd38bc95d-607c-4a11-9a34-75a2f2a79487'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.6/config.ini'
INFO [2022-12-06 10:50:39,235] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:39 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:58:28 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E282235A7C996'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'a257ec77-7985-45ce-b141-b7a32bff16ea'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.0/suspicious_files_list.1'
INFO [2022-12-06 10:50:39,552] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:39 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '87'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"ea882a4a506df5253f35d0283c3d312b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:05 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E282248FE7D92'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'dd9bb9ac-41d2-4edb-a576-f6cf16623eec'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.4/rce_patterns_list'
INFO [2022-12-06 10:50:39,810] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:39 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28225859D046'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '87bb1956-128d-4aad-9d07-0059c23bbd6f'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.7/suspicious_files_list.0'
INFO [2022-12-06 10:50:40,062] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:40 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:00:29 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2822676DADBF'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'e631df59-7333-49f4-9a61-916991c2f7a6'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.1/test_patch.patch'
INFO [2022-12-06 10:50:40,319] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:40 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:00 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E282276AB3A70'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '07b112c3-72ba-46f9-af9f-6a68a22217ba'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.2/suspicious_files_list.0'
INFO [2022-12-06 10:50:40,833] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:40 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '685'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"3f9322695cadacb62d28393a6e91f5f5"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:06 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2822955CFBAE'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'bbe7a011-dd3b-43fc-b542-b88fdf631bd1'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.6/params_pattern_list'
INFO [2022-12-06 10:50:42,487] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:42 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:59:28 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2822F7FBAC04'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '81bcd6b0-5a6a-48b2-84ba-b1b10fe0cdcd'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.0/config.ini'
INFO [2022-12-06 10:50:42,806] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:42 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:01 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E28230A890A9E'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '4d5b5500-f495-42dc-ba60-2f36c64d0b74'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.5/config.ini'
INFO [2022-12-06 10:50:43,121] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:43 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '6'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e48425f4892a90bc1fb649395d960887"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:59:28 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E28231D6044A1'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '96664820-1aec-44ef-95d6-43401ffe1f7b'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.0/VERSION'
INFO [2022-12-06 10:50:43,432] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:43 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:36 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E282330456C15'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'af02a065-1d37-407d-a3cb-0724abbdc74e'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.2/nightly_wp_list.txt'
INFO [2022-12-06 10:50:44,253] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:44 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:06 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28236136FE82'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'daea1bd0-d962-40c3-855f-8b674973f39c'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.6/suspicious_files_list'
INFO [2022-12-06 10:50:44,510] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:44 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:01 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28237063AF83'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '09558784-a3df-412f-8cb6-ae91637189e8'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.3/suspicious_files_list.1'
INFO [2022-12-06 10:50:44,818] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:44 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:00:29 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E282382E32FCA'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '66549f71-eff2-45b3-b120-0a019b822eba'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.1/nightly_wp_list.txt'
INFO [2022-12-06 10:50:45,387] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:45 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '525'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"404ae0b22687b865bb9dcffed240edf9"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:32 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2823A4C79B90'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '4f88cf24-5027-4f84-936c-80c50ff5f75f'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.2/rce_patterns_list'
INFO [2022-12-06 10:50:45,700] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:45 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '655'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"8f237af8543e286bc3d7e1f7187a8da2"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:07:34 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2823B7756F33'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '5889c113-a004-45b3-bae2-9c081301f484'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.8/params_pattern_list.ini'
INFO [2022-12-06 10:50:45,949] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:45 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:06:33 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2823C6563D8D'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '34346eb1-5dd3-479e-99e1-412035c7b0d1'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.1/nightly_wp_list.txt'
INFO [2022-12-06 10:50:46,207] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:46 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '87'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"ea882a4a506df5253f35d0283c3d312b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:00:59 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2823D5ABBBA6'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'ed22db4a-d444-4076-b4c3-32aca89f88ee'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.1/rce_patterns_list'
INFO [2022-12-06 10:50:46,828] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:46 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2823FAB43C52'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'ae3cf7a8-f61d-4ffd-94d6-1473372554a2'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.1/suspicious_files_list.0'
INFO [2022-12-06 10:50:47,457] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:47 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '57'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"00f5b9c86fe2a4a4edda010a1833cd5b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:06 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E282420369DB9'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '4cf906f2-dc8c-4365-964e-e0eed751495d'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.6/VERSION'
INFO [2022-12-06 10:50:48,028] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:47 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:59:59 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2824423598AF'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '947c7464-9036-4722-aa24-1602514726ea'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.0/params_pattern_list'
INFO [2022-12-06 10:50:48,354] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:48 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '34'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"cc5424cacb2a41a0afecbf895a9f864e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:32 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2824552FADC4'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '05cb7602-7828-416d-8417-15f7edc710ec'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.2/black_urls_list'
INFO [2022-12-06 10:50:48,606] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:48 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:31 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E282464B03414'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'e8bfe44f-74b3-4f2f-b555-4bfe25ee755e'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.7/test_patch.patch'
INFO [2022-12-06 10:50:48,863] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:48 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '655'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"8f237af8543e286bc3d7e1f7187a8da2"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E282473FB3A13'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '12401c2c-2fed-40ca-a2b2-69ab21cb070d'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.4/params_pattern_list'
INFO [2022-12-06 10:50:49,811] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:49 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '87'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"ea882a4a506df5253f35d0283c3d312b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:11:07 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2824AC01DA79'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'aa7ad8fd-6a78-49a0-8cab-e3656bf110ff'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.2/rce_patterns_list'
INFO [2022-12-06 10:50:50,135] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:50 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2824BF59CBC0'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'd2edb25c-60b8-4974-8a2d-5ada9afa03b7'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.5/suspicious_files_list.1'
INFO [2022-12-06 10:50:50,387] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:50 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:06 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2824CEC8C4EC'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b06aac96-e438-42b9-9295-08bad610935f'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.4/config.ini'
INFO [2022-12-06 10:50:50,905] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:50 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '34'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"cc5424cacb2a41a0afecbf895a9f864e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:01 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2824EDBBFD6D'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'cc2637bc-a6e9-4e96-86ba-562fd6639eee'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.3/black_urls_list'
INFO [2022-12-06 10:50:51,159] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:51 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:06 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2824FCDEBD49'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '2ac0f6b2-bcdc-40bc-881f-2961e5d5541b'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.6/suspicious_files_list.1'
INFO [2022-12-06 10:50:51,417] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:51 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '525'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"404ae0b22687b865bb9dcffed240edf9"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28250C39581A'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '0dcb300d-d802-4560-8f82-dc639f70f134'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.7/rce_patterns_list'
INFO [2022-12-06 10:50:51,669] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:51 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 13:59:29 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28251B3B5FA7'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '51f02054-103c-4c79-bc19-1e645ffd06ac'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.0/suspicious_files_list.1'
INFO [2022-12-06 10:50:51,933] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:51 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:31 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28252AFDE493'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '1b9f3e21-646e-43f4-8406-2febd0f96202'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.7/suspicious_files_list.1'
INFO [2022-12-06 10:50:52,189] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:52 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '621'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58cde253918ae6d375a5bed8a288d427"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28253A2D5186'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'a96e1545-90c4-4ca4-a4ec-f21b7ea45356'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.1/params_pattern_list.ini'
INFO [2022-12-06 10:50:53,014] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:52 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '706'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"0712e7fcaa180b2833a4663cee9efe1b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:06:03 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28256B7479A9'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '0c1e22fd-abc8-466e-8e91-5d5f2418aa8c'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.3/params_pattern_list'
INFO [2022-12-06 10:50:53,272] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:53 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:32 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28257AC4D73E'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'ecfc7219-b9c3-442b-8ebe-4f2ec27a08ef'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.2/module.ini'
INFO [2022-12-06 10:50:53,527] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:53 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:07:04 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E282589FEFFE8'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '2e12b7cc-bb5e-4987-8b7b-cd801766658c'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.1/suspicious_files_list.0'
INFO [2022-12-06 10:50:53,776] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:53 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:03:31 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E282598DEC84C'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '80e8416c-0229-49bc-afe0-26ce19cabeea'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.7/nightly_wp_list.txt'
INFO [2022-12-06 10:50:54,036] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:54 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '525'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"404ae0b22687b865bb9dcffed240edf9"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:31 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2825A84D7270'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '41c0e992-f091-4dea-b5c2-2b23b9fd5fd3'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.5/rce_patterns_list'
INFO [2022-12-06 10:50:54,287] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:54 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:05 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2825B7432EB6'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b9f7fb20-7566-4380-99f4-8a97104b4533'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.4/module.ini'
INFO [2022-12-06 10:50:54,806] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:54 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:06 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2825D5EB7125'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b3b9c2df-da83-467a-ac4b-2ae17e4042db'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.6/module.ini'
INFO [2022-12-06 10:50:55,057] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:55 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:08:34 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2825E5241F11'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '32a33483-63b5-462d-bc49-f48d2c821b02'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.8/config.ini'
INFO [2022-12-06 10:50:55,882] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:55 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E282616460C6D'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'a7082456-563f-4d33-9d16-1c735fad9cf6'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.4/suspicious_files_list.1'
INFO [2022-12-06 10:50:56,445] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:56 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '6'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"734f1d67184010e35ae64d86427207d6"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:10:36 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E282637F1E003'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'bf7ad792-08c2-4652-ada0-0ca261cb19e5'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.2/VERSION'
INFO [2022-12-06 10:50:57,014] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:56 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '57'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"00f5b9c86fe2a4a4edda010a1833cd5b"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E282659D534E9'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '9db4457f-a686-4bee-9da7-8a22c4592791'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.4/VERSION'
INFO [2022-12-06 10:50:57,331] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:57 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E28266CAB2DFC'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '802ea1a2-03b6-482b-af50-3b3b1d8c5e39'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.7/module.ini'
INFO [2022-12-06 10:50:57,590] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:57 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '621'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58cde253918ae6d375a5bed8a288d427"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:32 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28267C1D87F4'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'fa4e5e89-73a0-4184-9948-25c9b5af7e9b'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.2/params_pattern_list'
INFO [2022-12-06 10:50:57,908] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:57 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '293'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"4fe27b6c40f18c0e634a2be61bb62d4e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:09:35 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E28268EA6C691'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'e1b366aa-d05f-476c-acda-9874a67930a0'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.4/module.ini'
INFO [2022-12-06 10:50:58,425] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:58 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '40'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"9e469a2c19d4aea380eca22e69c7a411"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:06:33 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2826ADCDB398'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '700e0249-5acd-44f0-9c2b-5b536b1b1a2a'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.1/suspicious_files_list.1'
INFO [2022-12-06 10:50:58,683] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:58 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '655'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"8f237af8543e286bc3d7e1f7187a8da2"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:02:30 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2826BD4C0DD3'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '72062f4b-58c3-4e09-849f-95d26ff02ad3'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.5/params_pattern_list.ini'
INFO [2022-12-06 10:50:58,938] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:58 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '10'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"66f60f9cef1da05afb119e3f372a6281"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:04:32 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2826CC7C7CEE'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'e330f83d-bfc3-414d-987e-201d1681ea9f'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.2/suspicious_files_list.0'
INFO [2022-12-06 10:50:59,189] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:59 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:07:34 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2826DB83DABE'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '1b10dffd-6933-478f-aec4-4854a2910eb5'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.1/config.ini'
INFO [2022-12-06 10:50:59,953] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:50:59 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '265'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"58d610bb9036f57dc0cb78ffb461ff9d"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:06:33 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2827090AD8BE'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'affd6741-4059-49a9-a123-85a8f7fe38b3'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/6.3/config.ini'
INFO [2022-12-06 10:51:00,463] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:51:00 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:00:59 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2827276C93BB'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'cc09f601-3ded-4278-9c3c-8c9891e7cf3c'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/7.1/suspicious_files_list'
INFO [2022-12-06 10:51:00,775] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:51:00 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '0'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"d41d8cd98f00b204e9800998ecf8427e"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:08:04 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E282739A583A4'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'ddcf4c66-5499-48b7-bfbe-56d20a64b7c1'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.8/suspicious_files_list'
INFO [2022-12-06 10:51:01,084] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:51:01 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '722'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fd9e9b700d1cc5cb9a3309e969241485"'), ('Last-Modified', 'Tue, 29 Nov 2022 14:05:02 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E28274C634DEB'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '44996e12-5b31-4a25-bb45-2e6febe3ec7d'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/proactive/rules/5.1/test_patch.patch'
INFO [2022-12-06 10:51:01,089] defence360agent.files: Validating [proactive]: /var/imunify360/files/proactive/rules_2022-12-06T084950.781258Z
WARNING [2022-12-06 10:51:01,189] defence360agent.files: Fixing wrong permission to file/dir /var/imunify360/files/proactive [0o777] expected [0o770] (not symlink)
INFO [2022-12-06 10:51:01,200] defence360agent.files: Updated proactive using file by file download
INFO [2022-12-06 10:51:13,719] defence360agent.simple_rpc: Executing ('rstatus',), params: {}
INFO [2022-12-06 10:51:14,137] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:51:17,863] defence360agent.simple_rpc: Executing ('rstatus',), params: {}
INFO [2022-12-06 10:51:18,255] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:51:20,745] defence360agent.simple_rpc: Executing ('rstatus',), params: {}
INFO [2022-12-06 10:51:21,095] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:51:38,609] defence360agent.files: proactive files update finished
INFO [2022-12-06 10:51:38,611] defence360agent.files: Updating geo files via all.zip
INFO [2022-12-06 10:51:39,812] defence360agent.files: Validating [geo]: /var/imunify360/files/geo/v1_2022-12-06T085138.612760Z
WARNING [2022-12-06 10:51:39,912] defence360agent.files: Fixing wrong permission to file/dir /var/imunify360/files/geo [0o777] expected [0o770] (not symlink)
INFO [2022-12-06 10:51:39,919] defence360agent.files: Updated geo using all.zip
INFO [2022-12-06 10:51:39,995] defence360agent.files: geo files update finished
INFO [2022-12-06 10:51:40,015] defence360agent.malwarelib.plugins.schedule_watcher: Update background scan schedule
INFO [2022-12-06 10:51:40,017] defence360agent.server: Creating sink im360.plugins.aggregate.Aggregate
INFO [2022-12-06 10:51:40,023] defence360agent.server: Creating sink im360.plugins.cache_clear.CacheClear
INFO [2022-12-06 10:51:40,024] defence360agent.server: Creating sink im360.plugins.cagefs.CageFS
INFO [2022-12-06 10:51:40,025] defence360agent.server: Creating sink im360.plugins.captcha_dos_detect.CaptchaDosDetect
INFO [2022-12-06 10:51:40,026] defence360agent.server: Creating sink im360.malwarelib.plugins.cleanup.CleanupDb
INFO [2022-12-06 10:51:40,030] defence360agent.server: Creating sink im360.malwarelib.plugins.cleanup.RestoreOriginalDb
INFO [2022-12-06 10:51:40,033] defence360agent.server: Creating sink im360.malwarelib.plugins.cleanup.ResultProcessor
INFO [2022-12-06 10:51:40,034] defence360agent.server: Creating sink im360.plugins.client360.Client360
INFO [2022-12-06 10:51:40,035] im360.plugins.client360: imunify360 connection server: <imunify360.cloudlinux.com:443>, ssl=True
INFO [2022-12-06 10:51:40,036] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 10:51:40,037] defence360agent.server: Creating sink im360.plugins.config_set.ConfigSet
INFO [2022-12-06 10:51:40,040] defence360agent.server: Creating sink im360.plugins.conflicts.Conflicts
INFO [2022-12-06 10:51:40,041] defence360agent.server: Creating sink im360.plugins.cpanel_uploader.CpanelUploadHookManager
INFO [2022-12-06 10:51:40,042] defence360agent.server: Creating sink im360.plugins.db_auto_cleanup.DbCleanup
INFO [2022-12-06 10:51:40,046] im360.plugins.db_auto_cleanup: Deleted 0 records from table 'incident' during auto cleanup
INFO [2022-12-06 10:51:40,049] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 10:51:40,052] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 10:51:40,053] defence360agent.server: Creating sink im360.malwarelib.plugins.detached_scan.DetachedScanPlugin
INFO [2022-12-06 10:51:40,055] defence360agent.server: Creating sink im360.plugins.sensor.dos_detector.DOSSensor
INFO [2022-12-06 10:51:40,056] defence360agent.server: Creating sink im360.plugins.fix_ip_address.FixIPAddress
INFO [2022-12-06 10:51:40,058] defence360agent.server: Creating sink im360.plugins.group_ip_sync.GroupIPSyncPlugin
INFO [2022-12-06 10:51:40,060] defence360agent.server: Creating sink im360.plugins.graylist.ManageGrayList
INFO [2022-12-06 10:51:40,062] defence360agent.server: Creating sink im360.plugins.sensor.ignore_alert_with_whitelisted_ip.IgnoreWhitelisted
INFO [2022-12-06 10:51:40,063] defence360agent.server: Creating sink im360.plugins.sensor.ignore_alert_with_whitelisted_ip.IgnoreWhitelistedCSF
INFO [2022-12-06 10:51:40,064] defence360agent.server: Creating sink im360.plugins.ignored_rules.FilterIgnoredRules
INFO [2022-12-06 10:51:40,065] defence360agent.server: Creating sink im360.plugins.protector.import_wblist.ExportWBList
INFO [2022-12-06 10:51:40,169] defence360agent.server: Creating sink im360.plugins.protector.lazy_init.RealProtector
INFO [2022-12-06 10:51:40,184] defence360agent.server: Creating sink im360.plugins.protector.lfd.LFD
INFO [2022-12-06 10:51:40,187] defence360agent.server: Creating sink im360.plugins.mod_sec_blocker.ModSecBlockBySeverity
INFO [2022-12-06 10:51:40,198] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 10:51:40,199] defence360agent.server: Creating sink im360.plugins.modsec_ruleset_checker.ModsecRulesetChecker
INFO [2022-12-06 10:51:40,200] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 10:51:40,200] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 10:51:40,203] im360.plugins.modsec_ruleset_checker: Installed i360 vendor None does not match expected type of ruleset: FULL
Trying to reinstall modsec ruleset
INFO [2022-12-06 10:51:40,224] defence360agent.server: Creating sink im360.plugins.ossec_alert.OssecAlert
INFO [2022-12-06 10:51:40,226] defence360agent.server: Creating sink im360.plugins.pam.PAM
ERROR [2022-12-06 10:51:40,228] im360.plugins.modsec_ruleset_checker: Something went wrong during reinstalling modsec ruleset: Integration config is missing server_type field
INFO [2022-12-06 10:51:40,376] defence360agent.server: Creating sink im360.plugins.webshield_captcha_keys.WebshieldCaptchaKeys
INFO [2022-12-06 10:51:40,402] defence360agent.server: Creating sink im360.plugins.persistent_storage.PersistentStorage
INFO [2022-12-06 10:51:40,406] defence360agent.server: Creating sink im360.plugins.post_action.PostAction
INFO [2022-12-06 10:51:40,407] defence360agent.server: Creating sink im360.plugins.remoteip_install.RemoteIpInstall
ERROR [2022-12-06 10:51:40,412] im360.plugins.remoteip_install: Automatic mod_remoteip installation is not supported on this server
INFO [2022-12-06 10:51:40,487] defence360agent.server: Creating sink im360.plugins.restore_from_backup.RestoreFromBackupPlugin
INFO [2022-12-06 10:51:40,498] defence360agent.server: Creating sink im360.plugins.restrict_graylisted.SuppressGraylistedProcessing
INFO [2022-12-06 10:51:40,500] defence360agent.server: Creating sink im360.plugins.sensor.search_bots.WhitelistSearchBots
INFO [2022-12-06 10:51:40,500] defence360agent.server: Creating sink im360.plugins.send_server_config.SendServerConfig
INFO [2022-12-06 10:51:40,501] defence360agent.server: Creating sink im360.plugins.server_pull.ServerPullFileSender
INFO [2022-12-06 10:51:40,501] defence360agent.server: Creating sink im360.plugins.serverpush_to_synclist.ServerPushToSynclist
INFO [2022-12-06 10:51:40,502] defence360agent.server: Creating sink im360.plugins.smtp_blocking.SMTPBlocker
INFO [2022-12-06 10:51:40,542] im360.plugins.protector.lazy_init: Rules status for ipv6 [rules: bad], [ipset: bad]
INFO [2022-12-06 10:51:40,543] im360.plugins.protector.lazy_init: Destroying rules for ipv6
INFO [2022-12-06 10:51:40,867] im360.plugins.protector.lazy_init: Recreating ip sets for ipv6
INFO [2022-12-06 10:51:41,093] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-06 10:51:42,367] im360.internals.core: IP sets content restored from database
INFO [2022-12-06 10:51:42,368] im360.internals.core: Fill ipsets took 1.39 second(s)
INFO [2022-12-06 10:51:42,368] im360.plugins.protector.lazy_init: Recreating firewall rules for ipv6
INFO [2022-12-06 10:51:42,552] im360.plugins.protector.lazy_init: Rules status for ipv4 [rules: bad], [ipset: bad]
INFO [2022-12-06 10:51:42,553] im360.plugins.protector.lazy_init: Destroying rules for ipv4
INFO [2022-12-06 10:51:42,841] im360.plugins.protector.lazy_init: Recreating ip sets for ipv4
INFO [2022-12-06 10:51:43,114] defence360agent.api.server: Performed request for url=https://api.imunify360.com/api/ip method=None body=None status=200
INFO [2022-12-06 10:51:43,115] defence360agent.api.server: Response=b'{"ip":"31.131.20.181","status":"ok"}' ...
INFO [2022-12-06 10:51:44,652] im360.internals.core: IP sets content restored from database
INFO [2022-12-06 10:51:44,652] im360.internals.core: Fill ipsets took 1.75 second(s)
INFO [2022-12-06 10:51:44,653] im360.plugins.protector.lazy_init: Recreating firewall rules for ipv4
INFO [2022-12-06 10:51:44,742] im360.plugins.protector.lazy_init: Rules and sets successfully recreated for enabled ip versions
INFO [2022-12-06 10:51:44,899] defence360agent.server: Creating sink im360.plugins.startup_actions.StartupActions
INFO [2022-12-06 10:51:44,955] defence360agent.server: Creating sink im360.malwarelib.plugins.store.StoreMalwareHits
WARNING [2022-12-06 10:51:45,178] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 10:51:45,180] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 10:51:45,180] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 10:51:45,180] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 10:51:45,181] im360.malwarelib.subsys.malware: No vendors installed
INFO [2022-12-06 10:51:45,181] defence360agent.utils.common: Satisfy the call request soon: graceful_restart(). No calls in more than 300 seconds since the start
WARNING [2022-12-06 10:51:45,182] im360.malwarelib.subsys.malware: No vendors installed
INFO [2022-12-06 10:51:45,183] defence360agent.utils.common: Schedule call graceful_restart()
INFO [2022-12-06 10:51:45,183] defence360agent.server: Creating sink im360.plugins.protector.synclist.SynclistPlugin
INFO [2022-12-06 10:51:45,184] im360.subsys.web_server: Performing web server graceful restart, from _run
WARNING [2022-12-06 10:51:45,206] im360.subsys.web_server: Integration config is missing graceful_restart_script field
INFO [2022-12-06 10:51:45,345] im360.subsys.web_server: Can't determine apache bin path: [Errno 2] No such file or directory: '/usr/sbin/httpd'
WARNING [2022-12-06 10:51:45,346] im360.subsys.web_server: Could not restart a Web server: Could not detect a web server
INFO [2022-12-06 10:51:45,347] defence360agent.server: Creating sink im360.plugins.ttl_graylist.GraylistTimeout
INFO [2022-12-06 10:51:45,409] defence360agent.server: Creating sink im360.plugins.update_files.UpdateFilesOnServerRequest
INFO [2022-12-06 10:51:45,413] defence360agent.server: Creating sink im360.plugins.waf_rules_configurator.WAFRuleSetConfigurator
INFO [2022-12-06 10:51:45,417] im360.plugins.waf_rules_configurator: Updating AppVersionDetector version cron
INFO [2022-12-06 10:51:45,419] defence360agent.server: Creating sink im360.plugins.webshield_manager.WebShieldManager
INFO [2022-12-06 10:51:47,045] defence360agent.api.server: Performed request for url=https://api.imunify360.com/api/ip method=None body=None status=200
INFO [2022-12-06 10:51:47,046] defence360agent.api.server: Response=b'{"ip":"31.131.20.181","status":"ok"}' ...
INFO [2022-12-06 10:51:53,054] defence360agent.server: Creating sink im360.plugins.whitelist_current_user.WhitelistCurrentUser
INFO [2022-12-06 10:51:53,060] defence360agent.server: Creating sink im360.plugins.whitelist_panels_login.WhitelistPanelsLogin
INFO [2022-12-06 10:51:53,060] defence360agent.server: Creating sink im360.plugins.php_immunity.PhpImmunityPlugin
INFO [2022-12-06 10:51:53,061] defence360agent.server: Creating sink im360.plugins.malware_ignore_paths.MalwareIgnorePath
INFO [2022-12-06 10:51:53,093] defence360agent.server: Creating sink defence360agent.plugins.accumulate.Accumulate
INFO [2022-12-06 10:51:53,095] defence360agent.server: Creating sink defence360agent.malwarelib.plugins.cleanup.Cleanup
INFO [2022-12-06 10:51:53,096] defence360agent.server: Creating sink defence360agent.malwarelib.plugins.cleanup.StorageController
INFO [2022-12-06 10:51:53,099] defence360agent.server: Creating sink defence360agent.plugins.config_merger.ConfigMerger
INFO [2022-12-06 10:51:53,100] defence360agent.server: Creating sink defence360agent.plugins.config_watcher.ConfigWatcher
INFO [2022-12-06 10:51:53,100] defence360agent.server: Creating sink defence360agent.plugins.event_hook_executor.EventHookExecutor
INFO [2022-12-06 10:51:53,101] defence360agent.server: Creating sink defence360agent.plugins.event_hooks.EventHooks
INFO [2022-12-06 10:51:53,101] defence360agent.server: Creating sink defence360agent.plugins.idle_time_out.IdleTimeOutCheck
INFO [2022-12-06 10:51:53,102] defence360agent.server: Creating sink defence360agent.plugins.lve_utils_install.LveUtilsAutoInstaller
INFO [2022-12-06 10:51:53,103] defence360agent.server: Creating sink defence360agent.malwarelib.plugins.malware_response.MalwareResponsePlugin
INFO [2022-12-06 10:51:53,103] defence360agent.server: Creating sink defence360agent.malwarelib.plugins.mrs_suspicious_uploader.SuspiciousToMRSUploader
INFO [2022-12-06 10:51:53,104] defence360agent.server: Creating sink defence360agent.plugins.ping.SendPing
INFO [2022-12-06 10:51:53,104] defence360agent.server: Creating sink defence360agent.malwarelib.plugins.scan_queue.QueueSupervisor
INFO [2022-12-06 10:51:53,105] defence360agent.server: Creating sink defence360agent.malwarelib.plugins.scanner.Scanner
INFO [2022-12-06 10:51:53,105] defence360agent.server: Creating sink defence360agent.malwarelib.plugins.schedule_watcher.ScheduleWatcher
INFO [2022-12-06 10:51:53,107] defence360agent.server: Creating source im360.plugins.sensor.webshield.WebshieldSensor
INFO [2022-12-06 10:51:53,108] defence360agent.server: Creating source im360.plugins.aggregate.Aggregate
INFO [2022-12-06 10:51:53,109] defence360agent.server: Creating source im360.plugins.aibolit_result_scan.AibolitResultsScan
INFO [2022-12-06 10:51:53,110] defence360agent.malwarelib.subsys.ainotify: Watching b'/var/imunify360/aibolit/resident/out'
INFO [2022-12-06 10:51:53,110] defence360agent.server: Creating source im360.plugins.backup_info_sender.BackupInfoSender
INFO [2022-12-06 10:51:53,111] defence360agent.server: Creating source im360.plugins.captcha_dos_detect.CaptchaDosDetect
INFO [2022-12-06 10:51:53,111] defence360agent.server: Creating source im360.malwarelib.plugins.cleanup.ResultProcessor
INFO [2022-12-06 10:51:53,111] defence360agent.server: Creating source im360.plugins.client360.Client360
INFO [2022-12-06 10:51:53,112] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 10:51:53,112] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 10:51:53,112] defence360agent.server: Creating source im360.plugins.config_set.ConfigSet
INFO [2022-12-06 10:51:53,113] defence360agent.server: Creating source im360.plugins.conflicts.Conflicts
INFO [2022-12-06 10:51:53,114] defence360agent.server: Creating source im360.plugins.sensor.cphulk.cpHulkSensor
INFO [2022-12-06 10:51:53,115] im360.plugins.sensor.cphulk: '/usr/local/cpanel/logs/cphulkd.log' won't be monitored: '/usr/local/cpanel/logs' doesn't exist
INFO [2022-12-06 10:51:53,115] defence360agent.server: Creating source im360.malwarelib.plugins.detached_scan.DetachedScanPlugin
INFO [2022-12-06 10:51:53,130] defence360agent.server: Creating source im360.plugins.sensor.dos_detector.DOSSensor
INFO [2022-12-06 10:51:53,131] defence360agent.server: Creating source im360.plugins.sensor.generic.GenericSensor
INFO [2022-12-06 10:51:53,134] defence360agent.server: Creating source im360.plugins.graylist.ManageGrayList
INFO [2022-12-06 10:51:53,135] defence360agent.server: Creating source im360.plugins.sensor.ignore_alert_with_whitelisted_ip.IgnoreWhitelistedCSF
INFO [2022-12-06 10:51:53,135] defence360agent.server: Creating source im360.plugins.inotify.InotifyScan
INFO [2022-12-06 10:51:53,203] defence360agent.server: Creating source im360.plugins.protector.lfd.LFD
INFO [2022-12-06 10:51:53,203] defence360agent.server: Creating source im360.plugins.mod_sec_blocker.ModSecBlockBySeverity
INFO [2022-12-06 10:51:53,204] defence360agent.server: Creating source im360.plugins.sensor.modsec.ModsecSensor
WARNING [2022-12-06 10:51:53,206] im360.plugins.sensor.modsec: <bound method GenericPanelModSecurity.get_audit_log_path of <class 'im360.subsys.panels.generic.panel.GenericPanel'>> failed: Integration config is missing modsec_audit_log field
WARNING [2022-12-06 10:51:53,207] im360.plugins.sensor.modsec: <bound method GenericPanelModSecurity.get_audit_logdir_path of <class 'im360.subsys.panels.generic.panel.GenericPanel'>> failed: Integration config is missing modsec_audit_logdir field
INFO [2022-12-06 10:51:53,207] defence360agent.server: Creating source im360.plugins.sensor.ossec.JsonAlertReader
INFO [2022-12-06 10:51:53,218] defence360agent.server: Creating source im360.plugins.ossec_alert.OssecAlert
INFO [2022-12-06 10:51:53,219] defence360agent.server: Creating source im360.plugins.persistent_storage.PersistentStorage
INFO [2022-12-06 10:51:53,220] defence360agent.server: Creating source im360.plugins.post_action.PostAction
INFO [2022-12-06 10:51:53,221] defence360agent.server: Creating source im360.plugins.remote_iplist.RemoteIPListPlugin
WARNING [2022-12-06 10:51:53,223] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 10:51:53,224] defence360agent.server: Creating source im360.plugins.restore_from_backup.RestoreFromBackupPlugin
INFO [2022-12-06 10:51:53,224] defence360agent.server: Creating source im360.plugins.send_server_config.SendServerConfig
WARNING [2022-12-06 10:51:53,228] defence360agent.subsys.panels.generic.panel: panel_info not found neither in /etc/sysconfig/imunify360/integration.conf nor in /opt/cpvendor/etc/integration.ini.
INFO [2022-12-06 10:51:53,237] defence360agent.server: Creating source im360.plugins.serverpush_to_synclist.ServerPushToSynclist
INFO [2022-12-06 10:51:53,238] defence360agent.server: Creating source im360.malwarelib.plugins.store.StoreMalwareHits
INFO [2022-12-06 10:51:53,239] defence360agent.server: Creating source im360.plugins.strategy_checker.IDSSensor
INFO [2022-12-06 10:51:53,242] im360.plugins.strategy_checker: Strategy changed: UNKNOWN -> PRIMARY_IDS
INFO [2022-12-06 10:51:53,243] defence360agent.server: Creating source im360.plugins.protector.synclist.SynclistPlugin
INFO [2022-12-06 10:51:53,244] defence360agent.server: Creating source defence360agent.plugins.accumulate.Accumulate
INFO [2022-12-06 10:51:53,244] defence360agent.server: Creating source defence360agent.plugins.check_license.CheckLicense
WARNING [2022-12-06 10:51:53,245] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 10:51:53,245] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
INFO [2022-12-06 10:51:53,258] defence360agent.plugins.check_license: Checkin IAID token
INFO [2022-12-06 10:51:53,259] defence360agent.plugins.check_license: Checking token
INFO [2022-12-06 10:51:53,269] defence360agent.server: Creating source defence360agent.malwarelib.plugins.cleanup.Cleanup
INFO [2022-12-06 10:51:53,274] defence360agent.server: Creating source defence360agent.plugins.config_watcher.ConfigWatcher
INFO [2022-12-06 10:51:53,278] defence360agent.server: Creating source defence360agent.plugins.event_hook_executor.EventHookExecutor
INFO [2022-12-06 10:51:53,280] defence360agent.server: Creating source defence360agent.feature_management.plugins.watcher.PasswdWatcher
INFO [2022-12-06 10:51:53,283] defence360agent.malwarelib.subsys.ainotify: Watching b'/etc'
WARNING [2022-12-06 10:51:53,294] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 10:51:53,295] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
WARNING [2022-12-06 10:51:53,311] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 10:51:53,311] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
INFO [2022-12-06 10:51:53,313] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:51:53,313] defence360agent.plugins.check_license: Server is not registered, skipping checkin
WARNING [2022-12-06 10:51:53,317] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 10:51:53,318] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
INFO [2022-12-06 10:51:53,320] defence360agent.server: Creating source defence360agent.plugins.files_recurring_update.FilesRecurringUpdateTask
WARNING [2022-12-06 10:51:53,322] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 10:51:53,323] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
ERROR [2022-12-06 10:51:53,325] defence360agent.utils: Error executing <bound method SendServerConfig._send_server_config of im360.plugins.send_server_config.SendServerConfig>
Traceback (most recent call last):
File "/opt/alt/python38/lib/python3.8/dist-packages/defence360agent/utils/__init__.py", line 292, in wrapped
await fun(*args, **kwargs)
File "/opt/alt/python38/lib/python3.8/dist-packages/defence360agent/plugins/send_server_config.py", line 211, in _send_server_config
await self._create_server_config_msg())
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/plugins/send_server_config.py", line 56, in _create_server_config_msg
vendor_name in await hp.enabled_modsec_vendor_list())
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 183, in enabled_modsec_vendor_list
with open(MODSEC_CONF, 'r') as f:
FileNotFoundError: [Errno 2] No such file or directory: '/etc/sysconfig/imunify360/generic/modsec.conf'
INFO [2022-12-06 10:51:53,344] defence360agent.files: Updating all files
INFO [2022-12-06 10:51:53,356] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 10:51:53,357] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 10:51:53,382] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 10:51:53,383] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 10:51:53,386] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 10:51:53,387] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 10:51:53,398] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 10:51:53,398] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 10:51:53,398] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 10:51:53,399] defence360agent.server: Creating source defence360agent.malwarelib.plugins.malware_response.MalwareResponsePlugin
ERROR [2022-12-06 10:51:53,399] defence360agent.internals.iaid: something went wrong on activate APIError('request failed, reason: HTTP Error 400: Bad Request', 400) attempt 1
INFO [2022-12-06 10:51:53,432] defence360agent.server: Creating source defence360agent.plugins.mr_proper.MrProper
INFO [2022-12-06 10:51:53,435] defence360agent.malwarelib.scan.cleaners.outdated_scans: Cleaned 0 outdated scans
INFO [2022-12-06 10:51:53,435] defence360agent.server: Creating source defence360agent.malwarelib.plugins.mrs_suspicious_uploader.SuspiciousToMRSUploader
INFO [2022-12-06 10:51:53,436] defence360agent.server: Creating source defence360agent.feature_management.plugins.native.NativeEventMonitor
INFO [2022-12-06 10:51:53,437] defence360agent.server: Creating source defence360agent.plugins.ping.SendPing
INFO [2022-12-06 10:51:53,437] defence360agent.server: Creating source defence360agent.malwarelib.plugins.scan_queue.QueueSupervisor
INFO [2022-12-06 10:51:53,437] defence360agent.server: Creating source defence360agent.malwarelib.plugins.scanner.Scanner
INFO [2022-12-06 10:51:53,438] defence360agent.server: Creating source defence360agent.malwarelib.plugins.schedule_watcher.ScheduleWatcher
INFO [2022-12-06 10:51:53,438] defence360agent.server: Starting RpcServers...
INFO [2022-12-06 10:51:53,440] defence360agent.server: Message Bus started
INFO [2022-12-06 10:51:53,594] im360.contracts.plugins: Plugin im360.plugins.sensor.ignore_alert_with_whitelisted_ip.IgnoreWhitelisted is activated
INFO [2022-12-06 10:51:53,638] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 10:51:53,645] im360.contracts.plugins: Plugin im360.plugins.sensor.dos_detector.DOSSensor is activated
INFO [2022-12-06 10:51:53,683] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 08:51:53 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E28338B699FF9'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 10:51:53,769] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 10:51:53,770] defence360agent.files: php-immunity files update finished (not updated)
WARNING [2022-12-06 10:51:53,782] defence360agent.internals.cln: CLN.post(url='https://cln.cloudlinux.com/api/im/register', data=b'key=IPL', headers=None): 400 Bad Request
INFO [2022-12-06 10:51:54,051] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 10:51:54,052] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 10:51:54,053] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 10:51:54,054] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 10:51:54,056] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 10:51:54,057] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 10:51:54,133] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 10:51:54,133] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 10:51:54,236] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 10:51:54,237] defence360agent.files: geo files update finished (not updated)
WARNING [2022-12-06 10:51:54,238] defence360agent.plugins.check_license: Failed to register by ip: {"message":"IP license not found for 31.131.20.181","type":"no_ip","success":false,"data":null}
WARNING [2022-12-06 10:51:54,308] im360.subsys.panels.update_hooks: No vendors installed
INFO [2022-12-06 10:51:54,311] im360.plugins.modsec_ruleset_checker: Installed i360 vendor None does not match expected type of ruleset: FULL
Trying to reinstall modsec ruleset
ERROR [2022-12-06 10:51:54,335] im360.plugins.modsec_ruleset_checker: Something went wrong during reinstalling modsec ruleset: Integration config is missing server_type field
INFO [2022-12-06 10:51:54,402] im360.plugins.webshield_captcha_keys: Reloading Webshield service.
INFO [2022-12-06 10:51:54,534] im360.plugins.protector.lazy_init: Firewall rules recreated due to StrategyChange PRIMARY_IDS
INFO [2022-12-06 10:51:54,632] defence360agent.internals.the_sink: ServerConnected({}) processed in 1.1902 seconds
INFO [2022-12-06 10:51:54,639] defence360agent.internals.the_sink: HookEvent.AgentStarted({'version': '6.7.3-1'}) processed in 1.1960 seconds
WARNING [2022-12-06 10:51:54,651] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:51:54,653] defence360agent.internals.the_sink: StrategyChange({'method': 'STRATEGY_CHANGE', 'strategy': 'PRIMARY_IDS'}) processed in 1.2127 seconds
WARNING [2022-12-06 10:51:54,656] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:51:54,673] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0785 seconds
INFO [2022-12-06 10:51:54,696] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0}) processed in 0.0573 seconds
INFO [2022-12-06 10:51:54,714] defence360agent.internals.the_sink: ConfigUpdate({'method': 'CONFIG_UPDATE', 'conf': <defence360agent.contracts.config.SystemConfig object at 0x7f80fa792430>, 'timestamp': 1670316713.2776635}) processed in 1.2720 seconds
WARNING [2022-12-06 10:51:54,720] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:51:54,737] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0244 seconds
INFO [2022-12-06 10:51:55,096] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-06 10:52:06,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.53.169.98', 'timestamp': 1670316726.7089677, 'message': 'Dec 6 10:52:06 hqnl0246134 sshd[101635]: Invalid user aa from 202.53.169.98 port 49846', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 10:52:06,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.53.169.98', 'timestamp': 1670316726.7095106, 'message': 'Dec 6 10:52:06 hqnl0246134 sshd[101635]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.53.169.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0396 seconds
INFO [2022-12-06 10:52:06,793] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.53.169.98', 'timestamp': 1670316726.711112, 'message': 'Dec 6 10:52:06 hqnl0246134 sshd[101635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.53.169.98 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 10:52:07,837] defence360agent.simple_rpc: Response: method - ['version'], data - {'result': 'success', 'messages': [], 'data': {'items': '6.7.3-1', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 10:52:07,846] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:52:07,857] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['version'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'version']}) processed in 0.0196 seconds
INFO [2022-12-06 10:52:10,354] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 10:52:10,355] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 10:52:10,355] im360.plugins.client360: Waiting 6 seconds before retry...
INFO [2022-12-06 10:52:10,986] defence360agent.contracts.config_provider: CachedConfigReader <'/etc/sysconfig/imunify360/imunify360.config.d/90-local.config', modified at 1670316574.731776, 3 bytes> modified: removed={}, added={"WEBSHIELD": {"enable": false}}, changed={}
INFO [2022-12-06 10:52:11,103] defence360agent.contracts.config_provider: CachedConfigReader <'/etc/sysconfig/imunify360/imunify360-merged.config', modified at 1670316578.2238612, 3745 bytes> modified: removed={}, added={}, changed={"WEBSHIELD": {"+": {}, "-": {}, "?": {"enable": [true, false]}}}
INFO [2022-12-06 10:52:11,118] defence360agent.simple_rpc: Response: method - ['config', 'update'], data - {'result': 'success', 'messages': [], 'data': {'items': {'ADMIN_CONTACTS': {'emails': [], 'enable_icontact_notifications': True}, 'AUTO_WHITELIST': {'after_unblock_timeout': 1440, 'timeout': 1440}, 'BACKUP_RESTORE': {'cl_backup_allowed': True, 'cl_on_premise_backup_allowed': False, 'max_days_in_backup': 90}, 'BLOCKED_PORTS': {'default_mode': 'allowed'}, 'CAPTCHA': {'cert_refresh_timeout': 3600}, 'CAPTCHA_DOS': {'enabled': True, 'max_count': 100, 'time_frame': 21600, 'timeout': 864000}, 'CSF_INTEGRATION': {'catch_lfd_events': False}, 'DOS': {'default_limit': 250, 'enabled': True, 'interval': 30, 'port_limits': {}}, 'ERROR_REPORTING': {'enable': True}, 'FIREWALL': {'TCP_IN_IPv4': ['20', '21', '22', '25', '53', '80', '110', '443', '465', '587', '993', '995'], 'TCP_OUT_IPv4': ['20', '21', '22', '25', '53', '80', '110', '113', '443', '587', '993', '995'], 'UDP_IN_IPv4': ['20', '21', '53', '443'], 'UDP_OUT_IPv4': ['20', '21', '53', '113', '123'], 'internal_use_remote_iplist': False, 'port_blocking_mode': 'ALLOW'}, 'INCIDENT_LOGGING': {'limit': 100000, 'min_log_level': 4, 'num_days': 100, 'ui_autorefresh_timeout': 10}, 'KERNELCARE': {'edf': False}, 'LOGGER': {'backup_count': 5, 'max_log_file_size': 62914560, 'syscall_monitor': True}, 'MALWARE_CLEANUP': {'keep_original_files_days': 14, 'trim_file_instead_of_removal': True}, 'MALWARE_DATABASE_SCAN': {'enable': False}, 'MALWARE_SCANNING': {'cloud_assisted_scan': True, 'default_action': 'cleanup', 'detect_elf': True, 'enable_scan_cpanel': True, 'enable_scan_inotify': True, 'enable_scan_modsec': True, 'enable_scan_pure_ftpd': True, 'hyperscan': True, 'max_cloudscan_size_to_scan': 10485760, 'max_mrs_upload_file': 10485760, 'max_signature_size_to_scan': 1048576, 'notify_on_detect': False, 'optimize_realtime_scan': True, 'rapid_scan': True, 'rapid_scan_rescan_unchanging_files_frequency': None, 'scan_modified_files': None, 'sends_file_for_analysis': True, 'try_restore_from_backup_first': False}, 'MALWARE_SCAN_INTENSITY': {'cpu': 2, 'io': 2, 'ram': 2048, 'user_scan_cpu': 2, 'user_scan_io': 2, 'user_scan_ram': 1024}, 'MALWARE_SCAN_SCHEDULE': {'day_of_month': 1, 'day_of_week': 0, 'hour': 3, 'interval': 'week'}, 'MOD_SEC': {'app_specific_ruleset': True, 'cms_account_compromise_prevention': False, 'prev_settings': '', 'ruleset': 'FULL'}, 'MOD_SEC_BLOCK_BY_CUSTOM_RULE': {33332: {'check_period': 120, 'max_incidents': 10}, 33339: {'check_period': 120, 'max_incidents': 10}}, 'MOD_SEC_BLOCK_BY_SEVERITY': {'check_period': 120, 'denied_num_limit': 2, 'enable': True, 'max_incidents': 2, 'severity_limit': 2}, 'NETWORK_INTERFACE': {'eth6_device': None, 'eth_device': None, 'eth_device_skip': []}, 'OSSEC': {'active_response': False}, 'PAM': {'enable': True, 'exim_dovecot_native': False, 'exim_dovecot_protection': True, 'ftp_protection': False}, 'PERMISSIONS': {'advisor': True, 'allow_malware_scan': False, 'support_form': True, 'upgrade_button': True, 'user_ignore_list': False, 'user_override_malware_actions': False, 'user_override_proactive_defense': False}, 'PROACTIVE_DEFENCE': {'blamer': True, 'mode': 'KILL', 'php_immunity': True}, 'RESOURCE_MANAGEMENT': {'cpu_limit': 2, 'io_limit': 2, 'ram_limit': 500}, 'SEND_ADDITIONAL_DATA': {'enable': True}, 'SMTP_BLOCKING': {'allow_groups': ['mail'], 'allow_local': False, 'allow_users': [], 'enable': False, 'ports': [25, 587, 465], 'redirect': False}, 'STOP_MANAGING': {'modsec_directives': False}, 'WEBSHIELD': {'captcha_secret_key': '', 'captcha_site_key': '', 'enable': False, 'invisible_captcha': False, 'known_proxies_support': True, 'splash_screen': True}, 'WEB_SERVICES': {'http_ports': [], 'https_ports': []}}, 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 10:52:11,149] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:52:11,155] im360.plugins.protector.lazy_init: Webshield status (Webshield.ENABLE, Webshield.SPLASH_SCREEN) changed from (True, True) to (False, True)
WARNING [2022-12-06 10:52:11,205] im360.plugins.protector.lazy_init: Detected redundant ipsets while ensuring ipsets/rules; redundant ipsets: {'i360.ipv6.graysplashlist', 'i360.ipv6.remote_proxy', 'i360.ipv6.graylist', 'i360.ipv6.remote_proxy_static'}
INFO [2022-12-06 10:52:11,243] im360.plugins.protector.lazy_init: Rules status for ipv6 [rules: ok], [ipset: bad]
INFO [2022-12-06 10:52:11,243] im360.plugins.protector.lazy_init: Destroying rules for ipv6
INFO [2022-12-06 10:52:11,266] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['config', 'update'], 'params': {'data': '{"WEBSHIELD": {"enable": false}}'}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'config', 'update', '{"WEBSHIELD": {"enable": false}}']}) processed in 0.3413 seconds
INFO [2022-12-06 10:52:11,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.53.169.98', 'timestamp': 1670316730.925685, 'message': 'Dec 6 10:52:08 hqnl0246134 sshd[101635]: Failed password for invalid user aa from 202.53.169.98 port 49846 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.3404 seconds
INFO [2022-12-06 10:52:11,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.53.169.98', 'timestamp': 1670316730.925861, 'message': 'Dec 6 10:52:09 hqnl0246134 sshd[101635]: Disconnected from invalid user aa 202.53.169.98 port 49846 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0796 seconds
INFO [2022-12-06 10:52:11,588] im360.plugins.protector.lazy_init: Recreating ip sets for ipv6
INFO [2022-12-06 10:52:12,674] im360.internals.core: IP sets content restored from database
INFO [2022-12-06 10:52:12,675] im360.internals.core: Fill ipsets took 0.73 second(s)
INFO [2022-12-06 10:52:12,676] im360.plugins.protector.lazy_init: Recreating firewall rules for ipv6
WARNING [2022-12-06 10:52:12,730] im360.plugins.protector.lazy_init: Detected redundant ipsets while ensuring ipsets/rules; redundant ipsets: {'i360.ipv4.remote_proxy_static', 'i360.ipv4.graysplashlist', 'i360.ipv4.remote_proxy', 'i360.ipv4.graylist'}
INFO [2022-12-06 10:52:12,757] im360.plugins.protector.lazy_init: Rules status for ipv4 [rules: ok], [ipset: bad]
INFO [2022-12-06 10:52:12,757] im360.plugins.protector.lazy_init: Destroying rules for ipv4
INFO [2022-12-06 10:52:12,949] im360.plugins.protector.lazy_init: Recreating ip sets for ipv4
INFO [2022-12-06 10:52:13,198] defence360agent.api.server: Performed request for url=https://api.imunify360.com/api/ip method=None body=None status=200
INFO [2022-12-06 10:52:13,199] defence360agent.api.server: Response=b'{"ip":"31.131.20.181","status":"ok"}' ...
INFO [2022-12-06 10:52:13,918] defence360agent.simple_rpc: Response: method - ['install-vendors'], data - {'result': 'warnings', 'messages': ['Integration config is missing server_type field']}
WARNING [2022-12-06 10:52:13,927] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:52:13,940] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['install-vendors'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', '--console-log-level=WARNING', 'install-vendors']}) processed in 0.0199 seconds
INFO [2022-12-06 10:52:14,396] im360.internals.core: IP sets content restored from database
INFO [2022-12-06 10:52:14,396] im360.internals.core: Fill ipsets took 1.31 second(s)
INFO [2022-12-06 10:52:14,397] im360.plugins.protector.lazy_init: Recreating firewall rules for ipv4
INFO [2022-12-06 10:52:14,422] im360.plugins.protector.lazy_init: Rules and sets successfully recreated for enabled ip versions
INFO [2022-12-06 10:52:14,423] im360.plugins.protector.lazy_init: Firewall rules recreated due to ConfigUpdate
WARNING [2022-12-06 10:52:14,426] im360.subsys.panels.update_hooks: No vendors installed
INFO [2022-12-06 10:52:14,426] im360.plugins.modsec_ruleset_checker: Installed i360 vendor None does not match expected type of ruleset: FULL
Trying to reinstall modsec ruleset
ERROR [2022-12-06 10:52:14,440] im360.plugins.modsec_ruleset_checker: Something went wrong during reinstalling modsec ruleset: Integration config is missing server_type field
WARNING [2022-12-06 10:52:14,495] defence360agent.subsys.panels.generic.panel: panel_info not found neither in /etc/sysconfig/imunify360/integration.conf nor in /opt/cpvendor/etc/integration.ini.
WARNING [2022-12-06 10:52:14,506] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 10:52:14,506] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
WARNING [2022-12-06 10:52:14,518] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 10:52:14,519] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
WARNING [2022-12-06 10:52:14,536] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 10:52:14,537] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
ERROR [2022-12-06 10:52:14,540] defence360agent.utils: Ignoring exception from SendServerConfig.on_config_update_message: [Errno 2] No such file or directory: '/etc/sysconfig/imunify360/generic/modsec.conf'
Traceback (most recent call last):
File "/opt/alt/python38/lib/python3.8/dist-packages/defence360agent/utils/__init__.py", line 1234, in wrapper_async
return await coro(*args, **kwargs)
File "/opt/alt/python38/lib/python3.8/dist-packages/defence360agent/plugins/send_server_config.py", line 179, in on_config_update_message
await self._send_server_config()
File "/opt/alt/python38/lib/python3.8/dist-packages/defence360agent/plugins/send_server_config.py", line 211, in _send_server_config
await self._create_server_config_msg())
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/plugins/send_server_config.py", line 56, in _create_server_config_msg
vendor_name in await hp.enabled_modsec_vendor_list())
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 183, in enabled_modsec_vendor_list
with open(MODSEC_CONF, 'r') as f:
FileNotFoundError: [Errno 2] No such file or directory: '/etc/sysconfig/imunify360/generic/modsec.conf'
INFO [2022-12-06 10:52:14,603] im360.plugins.webshield_manager: WebShield is not enabled in the config but it is running. Disabling it...
INFO [2022-12-06 10:52:15,116] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-06 10:52:16,457] im360.plugins.webshield_manager: Disabled WebShield
INFO [2022-12-06 10:52:16,470] defence360agent.internals.the_sink: ConfigUpdate({'method': 'CONFIG_UPDATE', 'conf': <defence360agent.contracts.config.SystemConfig object at 0x7f80fa792430>, 'timestamp': 1670316730.9241521, 'event': <asyncio.locks.Event object at 0x7f80f8098ac0 [set]>}) processed in 5.5443 seconds
INFO [2022-12-06 10:52:17,046] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 10:52:17,110] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 10:52:17,111] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 10:52:17,111] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 10:52:17,111] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 10:52:17,112] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 10:52:17,123] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 10:52:17,139] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0264 seconds
WARNING [2022-12-06 10:52:17,146] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 10:52:17,149] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:52:17,168] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0347 seconds
INFO [2022-12-06 10:52:17,170] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0331 seconds
INFO [2022-12-06 10:52:18,023] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:52:18,024] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:52:18,032] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:52:18,043] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 10:52:20,535] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:52:20,536] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:52:20,542] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:52:20,553] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0163 seconds
WARNING [2022-12-06 10:52:45,186] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 10:52:45,186] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 10:52:48,485] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 10:52:48,485] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 10:52:48,486] im360.plugins.client360: Waiting 12 seconds before retry...
WARNING [2022-12-06 10:52:53,661] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:52:53,679] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.5666 seconds
INFO [2022-12-06 10:53:01,172] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 10:53:01,240] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 10:53:01,241] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 10:53:01,241] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 10:53:01,241] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 10:53:01,242] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 10:53:01,260] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 10:53:01,285] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0420 seconds
WARNING [2022-12-06 10:53:01,297] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 10:53:01,300] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:53:01,329] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0519 seconds
INFO [2022-12-06 10:53:01,331] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0495 seconds
INFO [2022-12-06 10:53:10,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.35.184', 'timestamp': 1670316790.7996402, 'message': 'Dec 6 10:53:10 hqnl0246134 sshd[101975]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.35.184 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 10:53:10,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.35.184', 'timestamp': 1670316790.8000696, 'message': 'Dec 6 10:53:10 hqnl0246134 sshd[101975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.35.184 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 10:53:12,827] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.35.184', 'timestamp': 1670316792.8005958, 'message': 'Dec 6 10:53:11 hqnl0246134 sshd[101975]: Failed password for root from 43.153.35.184 port 60026 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 10:53:14,901] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:53:14,903] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:53:14,920] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:53:14,941] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0334 seconds
INFO [2022-12-06 10:53:18,653] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:53:18,654] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:53:18,664] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:53:18,680] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0251 seconds
INFO [2022-12-06 10:53:21,928] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:53:21,928] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:53:21,941] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:53:21,959] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0295 seconds
INFO [2022-12-06 10:53:31,368] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 10:53:31,369] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 10:53:31,370] im360.plugins.client360: Waiting 24 seconds before retry...
INFO [2022-12-06 10:53:34,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.237.230.154', 'timestamp': 1670316814.8267276, 'message': 'Dec 6 10:53:33 hqnl0246134 sshd[102012]: Invalid user giovanni from 125.237.230.154 port 39710', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 10:53:34,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.237.230.154', 'timestamp': 1670316814.8269696, 'message': 'Dec 6 10:53:33 hqnl0246134 sshd[102012]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.237.230.154 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 10:53:34,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.237.230.154', 'timestamp': 1670316814.8270955, 'message': 'Dec 6 10:53:33 hqnl0246134 sshd[102012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.237.230.154 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 10:53:34,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.237.230.154', 'timestamp': 1670316814.8275595, 'message': 'Dec 6 10:53:34 hqnl0246134 sshd[102012]: Failed password for invalid user giovanni from 125.237.230.154 port 39710 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 10:53:36,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.237.230.154', 'timestamp': 1670316816.8281984, 'message': 'Dec 6 10:53:35 hqnl0246134 sshd[102012]: Disconnected from invalid user giovanni 125.237.230.154 port 39710 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 10:53:45,190] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 10:53:45,190] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 10:53:46,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.163.176', 'timestamp': 1670316826.837667, 'message': 'Dec 6 10:53:45 hqnl0246134 sshd[102018]: Invalid user ted from 159.65.163.176 port 53824', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 10:53:46,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.65.163.176', 'timestamp': 1670316826.8448188, 'message': 'Dec 6 10:53:45 hqnl0246134 sshd[102018]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.65.163.176 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 10:53:46,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.65.163.176', 'timestamp': 1670316826.8449879, 'message': 'Dec 6 10:53:45 hqnl0246134 sshd[102018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.163.176 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 10:53:48,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.163.176', 'timestamp': 1670316828.8400934, 'message': 'Dec 6 10:53:47 hqnl0246134 sshd[102018]: Failed password for invalid user ted from 159.65.163.176 port 53824 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 10:53:48,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.163.176', 'timestamp': 1670316828.8404765, 'message': 'Dec 6 10:53:48 hqnl0246134 sshd[102018]: Disconnected from invalid user ted 159.65.163.176 port 53824 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0164 seconds
WARNING [2022-12-06 10:53:53,131] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:53:53,165] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0459 seconds
INFO [2022-12-06 10:53:55,798] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 10:53:55,872] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 10:53:55,872] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 10:53:55,873] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 10:53:55,873] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 10:53:55,873] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 10:53:55,884] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 10:53:55,911] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0375 seconds
WARNING [2022-12-06 10:53:55,924] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 10:53:55,928] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:53:55,960] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0578 seconds
INFO [2022-12-06 10:53:55,962] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0541 seconds
INFO [2022-12-06 10:54:18,126] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:54:18,127] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:54:18,136] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:54:18,148] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 10:54:21,501] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:54:21,502] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:54:21,523] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:54:21,550] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0393 seconds
INFO [2022-12-06 10:54:26,119] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 10:54:26,120] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 10:54:26,121] im360.plugins.client360: Waiting 43 seconds before retry...
WARNING [2022-12-06 10:54:45,195] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 10:54:45,196] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 10:55:09,387] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 10:55:09,458] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 10:55:09,458] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 10:55:09,459] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 10:55:09,459] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 10:55:09,460] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 10:55:09,482] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 10:55:09,505] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0437 seconds
WARNING [2022-12-06 10:55:09,512] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 10:55:09,514] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:55:09,531] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0316 seconds
INFO [2022-12-06 10:55:09,532] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0290 seconds
INFO [2022-12-06 10:55:17,857] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:55:17,857] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:55:17,866] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:55:17,879] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 10:55:20,360] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:55:20,362] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:55:20,371] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:55:20,385] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 10:55:33,026] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.7.196.67', 'timestamp': 1670316933.0057535, 'message': 'Dec 6 10:55:31 hqnl0246134 sshd[102152]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.7.196.67 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 10:55:33,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.7.196.67', 'timestamp': 1670316933.0060627, 'message': 'Dec 6 10:55:31 hqnl0246134 sshd[102152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.196.67 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 10:55:35,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.7.196.67', 'timestamp': 1670316935.0096548, 'message': 'Dec 6 10:55:33 hqnl0246134 sshd[102152]: Failed password for root from 45.7.196.67 port 54506 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 10:55:38,022] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:55:38,023] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:55:38,032] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:55:38,050] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0261 seconds
INFO [2022-12-06 10:55:40,427] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 10:55:40,428] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 10:55:40,429] im360.plugins.client360: Waiting a minute before retry...
WARNING [2022-12-06 10:55:45,198] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 10:55:45,198] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 10:55:49,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.237.230.154', 'timestamp': 1670316949.0261946, 'message': 'Dec 6 10:55:48 hqnl0246134 sshd[102163]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.237.230.154 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 10:55:49,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.237.230.154', 'timestamp': 1670316949.0265408, 'message': 'Dec 6 10:55:48 hqnl0246134 sshd[102163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.237.230.154 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 10:55:51,047] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '125.237.230.154', 'timestamp': 1670316951.0279248, 'message': 'Dec 6 10:55:50 hqnl0246134 sshd[102163]: Failed password for root from 125.237.230.154 port 38198 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-06 10:55:53,138] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:55:53,160] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0298 seconds
INFO [2022-12-06 10:56:18,829] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:56:18,830] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:56:18,894] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:56:18,936] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1054 seconds
INFO [2022-12-06 10:56:21,097] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.163.176', 'timestamp': 1670316981.0694091, 'message': 'Dec 6 10:56:20 hqnl0246134 sshd[102203]: Invalid user test01 from 159.65.163.176 port 43070', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 10:56:21,125] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.65.163.176', 'timestamp': 1670316981.0700207, 'message': 'Dec 6 10:56:20 hqnl0246134 sshd[102203]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.65.163.176 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 10:56:21,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.65.163.176', 'timestamp': 1670316981.0702174, 'message': 'Dec 6 10:56:20 hqnl0246134 sshd[102203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.163.176 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 10:56:21,518] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:56:21,519] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:56:21,527] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:56:21,538] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 10:56:23,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.163.176', 'timestamp': 1670316983.0698361, 'message': 'Dec 6 10:56:22 hqnl0246134 sshd[102203]: Failed password for invalid user test01 from 159.65.163.176 port 43070 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 10:56:25,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.163.176', 'timestamp': 1670316985.0727527, 'message': 'Dec 6 10:56:23 hqnl0246134 sshd[102203]: Disconnected from invalid user test01 159.65.163.176 port 43070 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 10:56:43,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.53.169.98', 'timestamp': 1670317003.0906954, 'message': 'Dec 6 10:56:41 hqnl0246134 sshd[102212]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.53.169.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 10:56:43,134] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.53.169.98', 'timestamp': 1670317003.0910547, 'message': 'Dec 6 10:56:41 hqnl0246134 sshd[102212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.53.169.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 10:56:45,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '202.53.169.98', 'timestamp': 1670317005.0930927, 'message': 'Dec 6 10:56:43 hqnl0246134 sshd[102212]: Failed password for root from 202.53.169.98 port 38680 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-06 10:56:45,201] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 10:56:45,202] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 10:56:53,149] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:56:53,193] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0585 seconds
INFO [2022-12-06 10:57:14,372] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 10:57:14,449] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 10:57:14,450] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 10:57:14,450] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 10:57:14,451] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 10:57:14,451] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 10:57:14,476] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 10:57:14,505] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0523 seconds
WARNING [2022-12-06 10:57:14,513] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 10:57:14,516] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:57:14,550] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0544 seconds
INFO [2022-12-06 10:57:14,553] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0514 seconds
INFO [2022-12-06 10:57:18,619] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:57:18,620] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:57:18,628] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:57:18,642] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-06 10:57:21,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317041.1306248, 'message': 'Dec 6 10:57:20 hqnl0246134 sshd[102286]: Invalid user nvidia from 43.153.35.184 port 59246', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0495 seconds
INFO [2022-12-06 10:57:21,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317041.1312947, 'message': 'Dec 6 10:57:20 hqnl0246134 sshd[102286]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.35.184 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-06 10:57:21,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317041.1315827, 'message': 'Dec 6 10:57:20 hqnl0246134 sshd[102286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.35.184 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 10:57:21,407] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:57:21,408] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:57:21,419] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:57:21,436] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0261 seconds
INFO [2022-12-06 10:57:23,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317043.1297662, 'message': 'Dec 6 10:57:22 hqnl0246134 sshd[102286]: Failed password for invalid user nvidia from 43.153.35.184 port 59246 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 10:57:25,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317045.1307476, 'message': 'Dec 6 10:57:23 hqnl0246134 sshd[102286]: Disconnected from invalid user nvidia 43.153.35.184 port 59246 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 10:57:26,028] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:57:26,028] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:57:26,037] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:57:26,048] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 10:57:27,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.215.197.15', 'timestamp': 1670317047.1326606, 'message': 'Dec 6 10:57:26 hqnl0246134 sshd[102295]: Invalid user test from 186.215.197.15 port 48219', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 10:57:27,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.215.197.15', 'timestamp': 1670317047.1328468, 'message': 'Dec 6 10:57:26 hqnl0246134 sshd[102295]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.215.197.15 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 10:57:27,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.215.197.15', 'timestamp': 1670317047.1330087, 'message': 'Dec 6 10:57:26 hqnl0246134 sshd[102295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.215.197.15 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 10:57:29,161] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.215.197.15', 'timestamp': 1670317049.1349742, 'message': 'Dec 6 10:57:28 hqnl0246134 sshd[102295]: Failed password for invalid user test from 186.215.197.15 port 48219 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 10:57:35,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.102.114.10', 'timestamp': 1670317055.142947, 'message': 'Dec 6 10:57:34 hqnl0246134 sshd[102308]: Invalid user test from 14.102.114.10 port 41249', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 10:57:35,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.102.114.10', 'timestamp': 1670317055.1432362, 'message': 'Dec 6 10:57:34 hqnl0246134 sshd[102308]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.102.114.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 10:57:35,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.102.114.10', 'timestamp': 1670317055.143415, 'message': 'Dec 6 10:57:34 hqnl0246134 sshd[102308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.114.10 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 10:57:37,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.102.114.10', 'timestamp': 1670317057.145233, 'message': 'Dec 6 10:57:36 hqnl0246134 sshd[102308]: Failed password for invalid user test from 14.102.114.10 port 41249 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 10:57:44,992] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 10:57:44,993] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 10:57:44,994] im360.plugins.client360: Waiting 2 minutes before retry...
WARNING [2022-12-06 10:57:45,203] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 10:57:45,204] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 10:57:53,153] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:57:53,180] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0413 seconds
INFO [2022-12-06 10:58:17,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670317097.1941605, 'message': 'Dec 6 10:58:16 hqnl0246134 sshd[102345]: Invalid user ftpuser from 152.89.196.220 port 37430', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 10:58:17,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670317097.1947773, 'message': 'Dec 6 10:58:16 hqnl0246134 sshd[102345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 10:58:17,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670317097.194955, 'message': 'Dec 6 10:58:16 hqnl0246134 sshd[102345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 10:58:18,391] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:58:18,391] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:58:18,402] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:58:18,415] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 10:58:19,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670317099.1946409, 'message': 'Dec 6 10:58:18 hqnl0246134 sshd[102345]: Failed password for invalid user ftpuser from 152.89.196.220 port 37430 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 10:58:19,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670317099.194835, 'message': 'Dec 6 10:58:18 hqnl0246134 sshd[102345]: Disconnected from invalid user ftpuser 152.89.196.220 port 37430 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0747 seconds
INFO [2022-12-06 10:58:21,155] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:58:21,156] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:58:21,164] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:58:21,179] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0222 seconds
INFO [2022-12-06 10:58:43,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.7.196.67', 'timestamp': 1670317123.2212012, 'message': 'Dec 6 10:58:42 hqnl0246134 sshd[102382]: Invalid user leonardo from 45.7.196.67 port 41792', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 10:58:43,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.7.196.67', 'timestamp': 1670317123.221747, 'message': 'Dec 6 10:58:42 hqnl0246134 sshd[102382]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.7.196.67 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 10:58:43,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.7.196.67', 'timestamp': 1670317123.221938, 'message': 'Dec 6 10:58:42 hqnl0246134 sshd[102382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.196.67 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-06 10:58:45,207] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 10:58:45,207] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 10:58:47,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.7.196.67', 'timestamp': 1670317127.2251537, 'message': 'Dec 6 10:58:45 hqnl0246134 sshd[102382]: Failed password for invalid user leonardo from 45.7.196.67 port 41792 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0666 seconds
INFO [2022-12-06 10:58:47,382] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.7.196.67', 'timestamp': 1670317127.2254834, 'message': 'Dec 6 10:58:47 hqnl0246134 sshd[102382]: Disconnected from invalid user leonardo 45.7.196.67 port 41792 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0886 seconds
INFO [2022-12-06 10:58:50,222] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:58:50,222] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:58:50,241] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:58:50,255] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0304 seconds
WARNING [2022-12-06 10:58:53,149] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:58:53,183] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0412 seconds
INFO [2022-12-06 10:59:01,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.65.163.176', 'timestamp': 1670317141.2468948, 'message': 'Dec 6 10:58:59 hqnl0246134 sshd[102411]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.65.163.176 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 10:59:01,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.65.163.176', 'timestamp': 1670317141.2473128, 'message': 'Dec 6 10:58:59 hqnl0246134 sshd[102411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.163.176 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 10:59:01,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '159.65.163.176', 'timestamp': 1670317141.247568, 'message': 'Dec 6 10:59:01 hqnl0246134 sshd[102411]: Failed password for root from 159.65.163.176 port 60546 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 10:59:18,029] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:59:18,030] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:59:18,039] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:59:18,051] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 10:59:21,003] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 10:59:21,004] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 10:59:21,014] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:59:21,029] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0243 seconds
WARNING [2022-12-06 10:59:45,211] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 10:59:45,212] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 10:59:47,693] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 10:59:47,769] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 10:59:47,770] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 10:59:47,770] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 10:59:47,770] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 10:59:47,771] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 10:59:47,790] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 10:59:47,806] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0346 seconds
WARNING [2022-12-06 10:59:47,813] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 10:59:47,826] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:59:47,842] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0418 seconds
INFO [2022-12-06 10:59:47,844] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0401 seconds
WARNING [2022-12-06 10:59:53,153] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 10:59:53,174] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0302 seconds
INFO [2022-12-06 11:00:13,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317213.34543, 'message': 'Dec 6 11:00:12 hqnl0246134 sshd[102513]: Invalid user guest from 43.153.35.184 port 49818', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 11:00:13,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317213.3460956, 'message': 'Dec 6 11:00:12 hqnl0246134 sshd[102513]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.35.184 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 11:00:13,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317213.3463192, 'message': 'Dec 6 11:00:12 hqnl0246134 sshd[102513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.35.184 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 11:00:15,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317215.3454504, 'message': 'Dec 6 11:00:14 hqnl0246134 sshd[102513]: Failed password for invalid user guest from 43.153.35.184 port 49818 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 11:00:17,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317217.3457022, 'message': 'Dec 6 11:00:15 hqnl0246134 sshd[102513]: Disconnected from invalid user guest 43.153.35.184 port 49818 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 11:00:17,898] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 11:00:17,899] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 11:00:17,901] im360.plugins.client360: Waiting 7 minutes before retry...
INFO [2022-12-06 11:00:18,356] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:00:18,357] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:00:18,372] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:00:18,387] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0272 seconds
INFO [2022-12-06 11:00:18,709] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:00:18,710] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:00:18,727] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:00:18,744] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0326 seconds
INFO [2022-12-06 11:00:21,324] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:00:21,325] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:00:21,334] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:00:21,347] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
WARNING [2022-12-06 11:00:45,216] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:00:45,217] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:00:53,159] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:00:53,184] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0344 seconds
INFO [2022-12-06 11:01:17,889] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:01:17,890] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:01:17,898] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:01:17,909] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 11:01:20,525] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:01:20,525] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:01:20,533] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:01:20,545] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
WARNING [2022-12-06 11:01:45,219] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:01:45,220] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:01:53,225] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 11:01:57,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.7.196.67', 'timestamp': 1670317317.5010345, 'message': 'Dec 6 11:01:56 hqnl0246134 sshd[102626]: Invalid user common from 45.7.196.67 port 57310', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 11:01:57,545] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.7.196.67', 'timestamp': 1670317317.5016084, 'message': 'Dec 6 11:01:56 hqnl0246134 sshd[102626]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.7.196.67 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 11:01:57,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.7.196.67', 'timestamp': 1670317317.501769, 'message': 'Dec 6 11:01:56 hqnl0246134 sshd[102626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.196.67 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 11:01:59,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.7.196.67', 'timestamp': 1670317319.5035243, 'message': 'Dec 6 11:01:58 hqnl0246134 sshd[102626]: Failed password for invalid user common from 45.7.196.67 port 57310 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 11:01:59,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.7.196.67', 'timestamp': 1670317319.5037036, 'message': 'Dec 6 11:01:59 hqnl0246134 sshd[102626]: Disconnected from invalid user common 45.7.196.67 port 57310 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 11:02:18,085] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:02:18,086] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:02:18,094] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:02:18,106] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 11:02:20,764] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:02:20,766] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:02:20,776] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:02:20,789] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0226 seconds
WARNING [2022-12-06 11:02:45,225] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:02:45,227] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:02:53,177] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:02:53,221] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0627 seconds
INFO [2022-12-06 11:02:59,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317379.5757546, 'message': 'Dec 6 11:02:57 hqnl0246134 sshd[102680]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.35.184 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 11:02:59,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317379.5763042, 'message': 'Dec 6 11:02:57 hqnl0246134 sshd[102680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.35.184 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 11:02:59,644] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.35.184', 'timestamp': 1670317379.5765297, 'message': 'Dec 6 11:02:59 hqnl0246134 sshd[102680]: Failed password for root from 43.153.35.184 port 40372 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 11:03:02,742] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:03:02,742] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:03:02,750] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:03:02,762] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 11:03:18,237] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:03:18,238] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:03:18,251] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:03:18,267] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0284 seconds
INFO [2022-12-06 11:03:20,825] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:03:20,826] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:03:20,835] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:03:20,847] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
WARNING [2022-12-06 11:03:45,230] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:03:45,233] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:03:53,171] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:03:53,197] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0359 seconds
INFO [2022-12-06 11:04:17,966] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:04:17,967] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:04:17,976] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:04:17,996] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0272 seconds
INFO [2022-12-06 11:04:20,679] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:04:20,679] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:04:20,743] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:04:20,759] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0772 seconds
WARNING [2022-12-06 11:04:45,235] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:04:45,236] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:05:17,964] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:05:17,966] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:05:17,986] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:05:17,999] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0294 seconds
INFO [2022-12-06 11:05:20,768] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:05:20,768] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:05:20,775] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:05:20,786] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
WARNING [2022-12-06 11:05:45,239] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:05:45,240] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:06:18,522] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:06:18,524] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:06:18,551] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:06:18,583] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0503 seconds
INFO [2022-12-06 11:06:21,575] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:06:21,576] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:06:21,589] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:06:21,604] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0270 seconds
WARNING [2022-12-06 11:06:45,243] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:06:45,245] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:07:18,130] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:07:18,132] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:07:18,150] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:07:18,168] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0353 seconds
INFO [2022-12-06 11:07:20,861] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:07:20,862] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:07:20,870] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:07:20,889] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0264 seconds
INFO [2022-12-06 11:07:21,236] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 11:07:21,303] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 11:07:21,304] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 11:07:21,304] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 11:07:21,304] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 11:07:21,305] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 11:07:21,324] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 11:07:21,341] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0353 seconds
WARNING [2022-12-06 11:07:21,349] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 11:07:21,351] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:07:21,368] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0329 seconds
INFO [2022-12-06 11:07:21,369] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0310 seconds
WARNING [2022-12-06 11:07:45,247] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:07:45,248] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:07:51,885] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 11:07:51,887] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
INFO [2022-12-06 11:07:51,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5901, 'attackers_ip': None, 'timestamp': 1670317671.9260128, 'message': 'Dec 6 11:07:51 hqnl0246134 groupadd[103328]: new group: name=postfix, GID=117', 'severity': 3, 'name': 'New group added to the system', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 11:07:51,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5902, 'attackers_ip': None, 'timestamp': 1670317671.9265058, 'message': 'Dec 6 11:07:51 hqnl0246134 useradd[103338]: new user: name=postfix, UID=112, GID=117, home=/var/spool/postfix, shell=/usr/sbin/nologin, from=none', 'severity': 3, 'name': 'New user added to the system', 'tag': []}) processed in 0.0339 seconds
WARNING [2022-12-06 11:07:52,909] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 11:07:52,909] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
INFO [2022-12-06 11:07:53,923] defence360agent.internals.the_sink: UnreportableLocalIncidentList(<2 item(s)>) processed in 0.0886 seconds
INFO [2022-12-06 11:07:54,013] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5901, 'attackers_ip': None, 'timestamp': 1670317673.9384983, 'message': 'Dec 6 11:07:52 hqnl0246134 groupadd[103401]: new group: name=postdrop, GID=118', 'severity': 3, 'name': 'New group added to the system', 'tag': []}) processed in 0.0745 seconds
WARNING [2022-12-06 11:07:54,853] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 11:07:54,854] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
WARNING [2022-12-06 11:07:56,344] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 11:07:56,345] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
WARNING [2022-12-06 11:07:57,364] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 11:07:57,365] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
INFO [2022-12-06 11:07:57,368] defence360agent.feature_management.plugins.watcher: Feature management permissions updated
WARNING [2022-12-06 11:07:57,549] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 11:07:57,550] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
INFO [2022-12-06 11:07:59,639] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 11:07:59,640] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 11:07:59,641] im360.plugins.client360: Waiting 6 minutes before retry...
WARNING [2022-12-06 11:07:59,948] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 11:07:59,949] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
WARNING [2022-12-06 11:08:01,337] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 11:08:01,340] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
WARNING [2022-12-06 11:08:02,373] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 11:08:02,373] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
WARNING [2022-12-06 11:08:04,749] defence360agent.subsys.panels.generic.panel: Integrations script users failed with exit code 127
b'/bin/sh: 1: /path/to/get-users-script.sh: not found\n'
WARNING [2022-12-06 11:08:04,750] defence360agent.subsys.panels.generic.panel: Applying default implementation of users and domains lists
INFO [2022-12-06 11:08:05,322] defence360agent.feature_management.plugins.watcher: Feature management permissions updated
INFO [2022-12-06 11:08:17,882] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:08:17,883] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:08:17,893] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:08:17,905] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 11:08:20,461] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:08:20,462] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:08:20,470] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:08:20,481] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
WARNING [2022-12-06 11:08:45,255] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:08:45,257] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:08:53,864] defence360agent.internals.the_sink: UnreportableLocalIncidentList(<1 item(s)>) processed in 0.0270 seconds
INFO [2022-12-06 11:09:18,465] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:09:18,466] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:09:18,479] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:09:18,497] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0302 seconds
INFO [2022-12-06 11:09:21,189] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:09:21,190] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:09:21,197] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:09:21,208] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
WARNING [2022-12-06 11:09:45,260] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:09:45,261] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:10:18,353] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:10:18,354] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:10:18,371] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:10:18,387] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0256 seconds
INFO [2022-12-06 11:10:21,412] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:10:21,412] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:10:21,420] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:10:21,434] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
WARNING [2022-12-06 11:10:45,264] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:10:45,265] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:11:18,171] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:11:18,172] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:11:18,189] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:11:18,208] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0347 seconds
INFO [2022-12-06 11:11:20,965] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:11:20,965] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:11:20,972] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:11:20,983] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
WARNING [2022-12-06 11:11:45,270] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:11:45,272] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:11:53,228] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 11:12:18,021] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:12:18,021] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:12:18,033] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:12:18,047] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0243 seconds
INFO [2022-12-06 11:12:20,979] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:12:20,979] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:12:21,001] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:12:21,033] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0523 seconds
WARNING [2022-12-06 11:12:45,275] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:12:45,276] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:13:03,022] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 11:13:03,038] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:13:03,053] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0294 seconds
INFO [2022-12-06 11:13:18,622] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:13:18,623] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:13:18,630] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:13:18,642] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 11:13:21,837] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:13:21,837] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:13:21,844] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:13:21,856] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
WARNING [2022-12-06 11:13:45,279] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:13:45,280] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:14:18,211] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:14:18,212] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:14:18,222] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:14:18,238] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0250 seconds
INFO [2022-12-06 11:14:21,211] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:14:21,212] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:14:21,220] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:14:21,232] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
WARNING [2022-12-06 11:14:45,283] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:14:45,284] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:14:57,733] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 11:14:57,805] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 11:14:57,805] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 11:14:57,805] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 11:14:57,806] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 11:14:57,806] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 11:14:57,819] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 11:14:57,836] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0289 seconds
WARNING [2022-12-06 11:14:57,842] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 11:14:57,845] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:14:57,861] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0313 seconds
INFO [2022-12-06 11:14:57,862] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0288 seconds
INFO [2022-12-06 11:15:17,870] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:15:17,871] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:15:17,880] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:15:17,893] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0211 seconds
INFO [2022-12-06 11:15:20,416] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:15:20,416] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:15:20,423] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:15:20,438] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-06 11:15:27,937] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 11:15:27,938] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 11:15:27,939] im360.plugins.client360: Waiting 3 minutes before retry...
WARNING [2022-12-06 11:15:45,287] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:15:45,289] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:16:04,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318164.5395913, 'message': 'Dec 6 11:16:03 hqnl0246134 sshd[120013]: Invalid user RPM from 45.93.201.82 port 59100', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 11:16:04,585] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318164.5403059, 'message': 'Dec 6 11:16:03 hqnl0246134 sshd[120013]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.93.201.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 11:16:04,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318164.5405178, 'message': 'Dec 6 11:16:03 hqnl0246134 sshd[120013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.82 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 11:16:06,563] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318166.5421278, 'message': 'Dec 6 11:16:05 hqnl0246134 sshd[120013]: Failed password for invalid user RPM from 45.93.201.82 port 59100 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 11:16:12,571] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318172.5519571, 'message': 'Dec 6 11:16:10 hqnl0246134 sshd[120013]: Disconnecting invalid user RPM 45.93.201.82 port 59100: Change of username or service not allowed: (RPM,ssh-connection) -> (ubuntu,ssh-connection) [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 11:16:14,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318174.5548272, 'message': 'Dec 6 11:16:13 hqnl0246134 sshd[120018]: Invalid user ubuntu from 45.93.201.82 port 40402', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 11:16:14,597] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318174.5550563, 'message': 'Dec 6 11:16:13 hqnl0246134 sshd[120018]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.93.201.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 11:16:14,616] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318174.555169, 'message': 'Dec 6 11:16:13 hqnl0246134 sshd[120018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.82 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 11:16:16,580] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318176.5617974, 'message': 'Dec 6 11:16:15 hqnl0246134 sshd[120018]: Failed password for invalid user ubuntu from 45.93.201.82 port 40402 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 11:16:17,918] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:16:17,919] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:16:17,931] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:16:17,952] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0315 seconds
INFO [2022-12-06 11:16:20,574] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:16:20,575] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:16:20,594] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:16:20,625] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0490 seconds
INFO [2022-12-06 11:16:20,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318180.5775692, 'message': 'Dec 6 11:16:19 hqnl0246134 sshd[120018]: Disconnecting invalid user ubuntu 45.93.201.82 port 40402: Change of username or service not allowed: (ubuntu,ssh-connection) -> (tomcat,ssh-connection) [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 11:16:24,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318184.5817683, 'message': 'Dec 6 11:16:22 hqnl0246134 sshd[120028]: Invalid user tomcat from 45.93.201.82 port 40418', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 11:16:24,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318184.5823512, 'message': 'Dec 6 11:16:22 hqnl0246134 sshd[120028]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.93.201.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 11:16:24,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318184.582621, 'message': 'Dec 6 11:16:22 hqnl0246134 sshd[120028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.82 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 11:16:26,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.93.201.82', 'timestamp': 1670318186.5824094, 'message': 'Dec 6 11:16:25 hqnl0246134 sshd[120028]: Failed password for invalid user tomcat from 45.93.201.82 port 40418 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0351 seconds
WARNING [2022-12-06 11:16:45,293] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:16:45,295] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:16:53,864] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:16:53,888] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0351 seconds
INFO [2022-12-06 11:17:17,848] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:17:17,849] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:17:17,859] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:17:17,872] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 11:17:20,494] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:17:20,494] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:17:20,503] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:17:20,517] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
WARNING [2022-12-06 11:17:45,300] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:17:45,302] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:18:20,581] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:18:20,582] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:18:20,592] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:18:20,606] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0229 seconds
INFO [2022-12-06 11:18:23,861] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:18:23,861] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:18:23,879] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:18:23,905] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0397 seconds
WARNING [2022-12-06 11:18:45,305] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:18:45,307] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:18:50,961] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 11:18:51,031] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 11:18:51,032] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 11:18:51,032] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 11:18:51,032] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 11:18:51,033] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 11:18:51,051] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 11:18:51,070] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0352 seconds
WARNING [2022-12-06 11:18:51,078] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 11:18:51,081] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:18:51,097] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0330 seconds
INFO [2022-12-06 11:18:51,098] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0307 seconds
INFO [2022-12-06 11:19:17,841] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:19:17,842] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:19:17,851] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:19:17,863] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 11:19:20,399] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:19:20,400] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:19:20,406] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:19:20,418] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 11:19:21,163] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 11:19:21,164] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 11:19:21,165] im360.plugins.client360: Waiting 5 minutes before retry...
WARNING [2022-12-06 11:19:45,311] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:19:45,314] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:20:18,478] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:20:18,478] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:20:18,486] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:20:18,500] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 11:20:22,312] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:20:22,313] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:20:22,324] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:20:22,345] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0297 seconds
WARNING [2022-12-06 11:20:45,317] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:20:45,319] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:21:18,101] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:21:18,102] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:21:18,113] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:21:18,129] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0251 seconds
INFO [2022-12-06 11:21:21,253] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:21:21,254] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:21:21,265] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:21:21,284] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0296 seconds
WARNING [2022-12-06 11:21:45,321] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:21:45,322] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:21:53,231] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 11:21:54,239] defence360agent.files: Updating all files
INFO [2022-12-06 11:21:54,583] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 11:21:54,584] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 11:21:54,882] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 11:21:54,883] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 11:21:55,203] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 11:21:55,203] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 11:21:55,550] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 11:21:55,551] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 11:21:55,551] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 11:21:55,816] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 09:21:55 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E29D72305F6EB'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 11:21:55,818] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 11:21:55,819] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 11:21:56,525] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 11:21:56,526] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 11:21:56,790] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 11:21:56,790] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 11:21:57,114] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 11:21:57,114] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 11:21:57,511] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 11:21:57,511] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 11:21:57,992] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 11:21:57,994] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 11:22:19,430] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:22:19,431] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:22:19,442] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:22:19,459] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0264 seconds
INFO [2022-12-06 11:22:22,868] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:22:22,868] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:22:22,892] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:22:22,914] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0413 seconds
INFO [2022-12-06 11:22:43,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.245.192', 'timestamp': 1670318563.0367982, 'message': 'Dec 6 11:22:41 hqnl0246134 sshd[207626]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.245.192 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 11:22:43,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.245.192', 'timestamp': 1670318563.0373147, 'message': 'Dec 6 11:22:41 hqnl0246134 sshd[207626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.245.192 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 11:22:45,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.245.192', 'timestamp': 1670318565.0351985, 'message': 'Dec 6 11:22:43 hqnl0246134 sshd[207626]: Failed password for root from 178.128.245.192 port 44396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
WARNING [2022-12-06 11:22:45,324] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:22:45,325] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:22:49,049] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:22:49,049] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:22:49,062] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:22:49,100] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0497 seconds
WARNING [2022-12-06 11:22:53,869] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:22:53,921] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0605 seconds
INFO [2022-12-06 11:23:17,885] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:23:17,886] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:23:17,915] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:23:17,929] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0416 seconds
INFO [2022-12-06 11:23:20,539] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:23:20,539] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:23:20,547] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:23:20,558] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
WARNING [2022-12-06 11:23:45,328] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:23:45,330] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:24:17,880] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:24:17,881] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:24:17,893] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:24:17,907] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0249 seconds
INFO [2022-12-06 11:24:20,474] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:24:20,475] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:24:20,485] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:24:20,502] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0269 seconds
WARNING [2022-12-06 11:24:45,333] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:24:45,334] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:24:49,389] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 11:24:49,463] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 11:24:49,464] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 11:24:49,464] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 11:24:49,464] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 11:24:49,465] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 11:24:49,477] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 11:24:49,497] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0320 seconds
WARNING [2022-12-06 11:24:49,505] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 11:24:49,507] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:24:49,524] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0327 seconds
INFO [2022-12-06 11:24:49,526] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0306 seconds
INFO [2022-12-06 11:25:18,902] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:25:18,904] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:25:18,923] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:25:18,946] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0399 seconds
INFO [2022-12-06 11:25:21,963] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:25:21,964] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:25:21,974] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:25:21,987] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0226 seconds
INFO [2022-12-06 11:25:28,968] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 11:25:28,969] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 11:25:28,970] im360.plugins.client360: Waiting 3 minutes before retry...
WARNING [2022-12-06 11:25:45,338] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:25:45,339] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:26:13,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.245.192', 'timestamp': 1670318773.2350464, 'message': 'Dec 6 11:26:11 hqnl0246134 sshd[207831]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.245.192 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 11:26:13,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.245.192', 'timestamp': 1670318773.2365093, 'message': 'Dec 6 11:26:11 hqnl0246134 sshd[207831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.245.192 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 11:26:15,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.245.192', 'timestamp': 1670318775.2340977, 'message': 'Dec 6 11:26:14 hqnl0246134 sshd[207831]: Failed password for root from 178.128.245.192 port 34468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0402 seconds
INFO [2022-12-06 11:26:18,072] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:26:18,073] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:26:18,087] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:26:18,115] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0335 seconds
INFO [2022-12-06 11:26:20,736] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:26:20,736] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:26:20,743] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:26:20,754] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
WARNING [2022-12-06 11:26:45,342] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:26:45,344] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:26:53,891] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:26:53,928] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0585 seconds
INFO [2022-12-06 11:27:17,958] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:27:17,959] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:27:17,968] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:27:17,982] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 11:27:20,842] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:27:20,843] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:27:20,854] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:27:20,865] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0211 seconds
WARNING [2022-12-06 11:27:45,349] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:27:45,352] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:28:17,959] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:28:17,960] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:28:17,975] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:28:17,997] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0362 seconds
INFO [2022-12-06 11:28:20,803] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:28:20,803] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:28:20,810] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:28:20,821] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
WARNING [2022-12-06 11:28:45,355] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:28:45,357] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:28:55,420] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 11:28:55,493] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 11:28:55,494] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 11:28:55,494] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 11:28:55,494] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 11:28:55,495] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 11:28:55,520] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 11:28:55,540] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0431 seconds
WARNING [2022-12-06 11:28:55,548] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 11:28:55,550] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:28:55,568] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0339 seconds
INFO [2022-12-06 11:28:55,569] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0314 seconds
INFO [2022-12-06 11:29:18,656] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:29:18,657] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:29:18,668] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:29:18,682] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0243 seconds
INFO [2022-12-06 11:29:21,198] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:29:21,199] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:29:21,206] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:29:21,218] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 11:29:25,620] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 11:29:25,621] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 11:29:25,622] im360.plugins.client360: Waiting 2 minutes before retry...
WARNING [2022-12-06 11:29:45,360] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:29:45,361] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:30:17,846] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:30:17,847] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:30:17,857] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:30:17,876] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0279 seconds
INFO [2022-12-06 11:30:20,732] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:30:20,741] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:30:20,751] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:30:20,765] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0230 seconds
WARNING [2022-12-06 11:30:45,366] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:30:45,367] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:31:18,130] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:31:18,131] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:31:18,145] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:31:18,159] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0272 seconds
INFO [2022-12-06 11:31:20,748] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:31:20,749] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:31:20,755] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:31:20,767] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
WARNING [2022-12-06 11:31:45,371] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:31:45,373] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:31:53,234] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 11:32:14,025] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 11:32:14,095] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 11:32:14,096] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 11:32:14,096] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 11:32:14,096] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 11:32:14,097] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 11:32:14,118] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 11:32:14,139] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0404 seconds
WARNING [2022-12-06 11:32:14,146] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 11:32:14,148] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:32:14,166] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0339 seconds
INFO [2022-12-06 11:32:14,167] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0315 seconds
INFO [2022-12-06 11:32:18,073] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:32:18,074] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:32:18,086] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:32:18,107] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0316 seconds
INFO [2022-12-06 11:32:20,967] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:32:20,967] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:32:20,981] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:32:21,002] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0338 seconds
WARNING [2022-12-06 11:32:45,377] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:32:45,379] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:32:47,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670319167.729652, 'message': 'Dec 6 11:32:47 hqnl0246134 sshd[208191]: Invalid user admin from 152.89.196.123 port 18336', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 11:32:49,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.123', 'timestamp': 1670319169.7312925, 'message': 'Dec 6 11:32:47 hqnl0246134 sshd[208191]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.123 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 11:32:49,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.123', 'timestamp': 1670319169.7315576, 'message': 'Dec 6 11:32:47 hqnl0246134 sshd[208191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.123 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 11:32:51,161] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 11:32:51,162] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 11:32:51,163] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 11:32:51,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670319171.7332466, 'message': 'Dec 6 11:32:49 hqnl0246134 sshd[208191]: Failed password for invalid user admin from 152.89.196.123 port 18336 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 11:32:51,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670319171.7335055, 'message': 'Dec 6 11:32:51 hqnl0246134 sshd[208191]: Disconnected from invalid user admin 152.89.196.123 port 18336 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0166 seconds
WARNING [2022-12-06 11:32:53,892] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:32:53,912] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0304 seconds
INFO [2022-12-06 11:32:54,227] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:32:54,227] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:32:54,235] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:32:54,250] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 11:33:18,435] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:33:18,436] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:33:18,451] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:33:18,472] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0351 seconds
INFO [2022-12-06 11:33:21,071] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:33:21,072] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:33:21,079] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:33:21,092] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
WARNING [2022-12-06 11:33:45,382] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:33:45,384] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:34:17,786] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:34:17,787] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:34:17,797] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:34:17,811] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-06 11:34:20,479] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:34:20,480] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:34:20,487] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:34:20,499] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 11:34:25,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 10100, 'attackers_ip': '212.58.119.251', 'timestamp': 1670319265.8906777, 'message': 'Dec 6 11:34:25 hqnl0246134 sshd[208291]: Accepted password for supportwwwuser from 212.58.119.251 port 8172 ssh2', 'severity': 4, 'name': 'First time user logged in.', 'tag': []}) processed in 0.0220 seconds
WARNING [2022-12-06 11:34:45,388] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:34:45,390] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:34:53,896] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:34:53,917] defence360agent.internals.the_sink: SensorIncidentList(<1 item(s)>) processed in 0.0305 seconds
INFO [2022-12-06 11:35:17,952] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:35:17,953] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:35:17,961] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:35:17,973] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 11:35:20,542] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:35:20,542] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:35:20,549] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:35:20,561] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
WARNING [2022-12-06 11:35:45,394] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:35:45,396] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:36:17,920] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:36:17,921] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:36:17,931] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:36:17,945] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0230 seconds
INFO [2022-12-06 11:36:20,635] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:36:20,635] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:36:20,642] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:36:20,654] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
WARNING [2022-12-06 11:36:45,410] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:36:45,411] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:37:17,935] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:37:17,936] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:37:17,946] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:37:17,960] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0229 seconds
INFO [2022-12-06 11:37:20,703] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:37:20,704] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:37:20,711] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:37:20,722] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
WARNING [2022-12-06 11:37:45,414] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:37:45,415] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:38:17,851] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:38:17,852] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:38:17,862] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:38:17,877] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0244 seconds
INFO [2022-12-06 11:38:20,554] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:38:20,554] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:38:20,563] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:38:20,577] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
WARNING [2022-12-06 11:38:45,418] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:38:45,419] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:39:17,876] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:39:17,878] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:39:17,888] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:39:17,902] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0229 seconds
INFO [2022-12-06 11:39:20,645] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:39:20,645] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:39:20,653] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:39:20,664] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 11:39:33,331] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 11:39:33,397] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 11:39:33,398] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 11:39:33,398] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 11:39:33,398] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 11:39:33,399] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 11:39:33,410] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 11:39:33,432] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0323 seconds
WARNING [2022-12-06 11:39:33,440] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 11:39:33,444] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:39:33,468] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0428 seconds
INFO [2022-12-06 11:39:33,470] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0406 seconds
WARNING [2022-12-06 11:39:45,421] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:39:45,422] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:40:03,528] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 11:40:03,530] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 11:40:03,533] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 11:40:18,088] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:40:18,089] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:40:18,098] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:40:18,115] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0252 seconds
INFO [2022-12-06 11:40:20,815] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:40:20,816] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:40:20,824] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:40:20,837] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
WARNING [2022-12-06 11:40:45,426] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:40:45,428] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:40:50,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '42.119.111.155', 'timestamp': 1670319650.5083477, 'message': 'Dec 6 11:40:48 hqnl0246134 sshd[208836]: Invalid user richard from 42.119.111.155 port 34834', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 11:40:50,569] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '42.119.111.155', 'timestamp': 1670319650.509171, 'message': 'Dec 6 11:40:48 hqnl0246134 sshd[208836]: pam_imunify(sshd:auth): [IM360_RBL] The IP 42.119.111.155 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 11:40:50,587] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '42.119.111.155', 'timestamp': 1670319650.5094516, 'message': 'Dec 6 11:40:48 hqnl0246134 sshd[208836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.119.111.155 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 11:40:52,534] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '42.119.111.155', 'timestamp': 1670319652.509792, 'message': 'Dec 6 11:40:50 hqnl0246134 sshd[208836]: Failed password for invalid user richard from 42.119.111.155 port 34834 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0236 seconds
WARNING [2022-12-06 11:40:53,912] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:40:53,943] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0382 seconds
INFO [2022-12-06 11:40:54,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '42.119.111.155', 'timestamp': 1670319654.5102882, 'message': 'Dec 6 11:40:52 hqnl0246134 sshd[208836]: Disconnected from invalid user richard 42.119.111.155 port 34834 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 11:41:17,927] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:41:17,928] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:41:17,938] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:41:17,951] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-06 11:41:20,582] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:41:20,582] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:41:20,589] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:41:20,600] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
WARNING [2022-12-06 11:41:45,433] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:41:45,435] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:41:53,237] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 11:41:53,923] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:41:53,959] defence360agent.internals.the_sink: SensorIncidentList(<1 item(s)>) processed in 0.0509 seconds
INFO [2022-12-06 11:42:18,118] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:42:18,119] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:42:18,136] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:42:18,160] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0386 seconds
INFO [2022-12-06 11:42:21,121] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:42:21,122] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:42:21,135] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:42:21,163] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0401 seconds
INFO [2022-12-06 11:42:40,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.10.13', 'timestamp': 1670319760.667328, 'message': 'Dec 6 11:42:39 hqnl0246134 sshd[208940]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.10.13 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 11:42:40,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.10.13', 'timestamp': 1670319760.6676667, 'message': 'Dec 6 11:42:39 hqnl0246134 sshd[208940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.10.13 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 11:42:42,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.250.10.13', 'timestamp': 1670319762.6693912, 'message': 'Dec 6 11:42:41 hqnl0246134 sshd[208940]: Failed password for root from 51.250.10.13 port 33462 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 11:42:45,438] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:42:45,439] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:42:45,612] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:42:45,613] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:42:45,623] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:42:45,634] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
WARNING [2022-12-06 11:42:53,923] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:42:53,951] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0404 seconds
INFO [2022-12-06 11:43:17,990] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:43:17,991] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:43:18,003] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:43:18,019] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0260 seconds
INFO [2022-12-06 11:43:20,804] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:43:20,805] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:43:20,812] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:43:20,826] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
WARNING [2022-12-06 11:43:45,442] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:43:45,443] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:44:17,829] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:44:17,830] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:44:17,841] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:44:17,855] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0240 seconds
INFO [2022-12-06 11:44:20,654] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:44:20,655] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:44:20,662] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:44:20,674] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 11:44:28,792] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.236.228.138', 'timestamp': 1670319868.771837, 'message': 'Dec 6 11:44:27 hqnl0246134 sshd[209033]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.236.228.138 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 11:44:28,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.236.228.138', 'timestamp': 1670319868.772153, 'message': 'Dec 6 11:44:27 hqnl0246134 sshd[209033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.236.228.138 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 11:44:28,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '185.236.228.138', 'timestamp': 1670319868.7723932, 'message': 'Dec 6 11:44:28 hqnl0246134 sshd[209033]: Failed password for root from 185.236.228.138 port 55962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 11:44:38,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '192.252.180.65', 'timestamp': 1670319878.7810524, 'message': 'Dec 6 11:44:37 hqnl0246134 sshd[209046]: pam_imunify(sshd:auth): [IM360_RBL] The IP 192.252.180.65 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 11:44:38,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '192.252.180.65', 'timestamp': 1670319878.7813613, 'message': 'Dec 6 11:44:37 hqnl0246134 sshd[209046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.252.180.65 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 11:44:40,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '192.252.180.65', 'timestamp': 1670319880.7822087, 'message': 'Dec 6 11:44:39 hqnl0246134 sshd[209046]: Failed password for root from 192.252.180.65 port 45098 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
WARNING [2022-12-06 11:44:45,446] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:44:45,447] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:44:53,921] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:44:53,942] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0281 seconds
INFO [2022-12-06 11:45:17,862] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:45:17,863] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:45:17,873] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:45:17,887] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0224 seconds
INFO [2022-12-06 11:45:20,572] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:45:20,572] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:45:20,579] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:45:20,591] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
WARNING [2022-12-06 11:45:45,449] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:45:45,450] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:46:02,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670319962.8701978, 'message': 'Dec 6 11:46:02 hqnl0246134 sshd[209133]: Accepted password for supportwwwuser from 212.58.119.251 port 10902 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 11:46:17,992] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:46:17,993] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:46:18,002] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:46:18,016] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0224 seconds
INFO [2022-12-06 11:46:20,713] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:46:20,714] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:46:20,725] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:46:20,742] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0274 seconds
WARNING [2022-12-06 11:46:45,458] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:46:45,460] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:46:53,928] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:46:53,951] defence360agent.internals.the_sink: SensorIncidentList(<1 item(s)>) processed in 0.0320 seconds
INFO [2022-12-06 11:46:56,190] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 11:46:56,255] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 11:46:56,256] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 11:46:56,256] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 11:46:56,256] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 11:46:56,257] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 11:46:56,267] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 11:46:56,283] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0259 seconds
WARNING [2022-12-06 11:46:56,290] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 11:46:56,293] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:46:56,313] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0357 seconds
INFO [2022-12-06 11:46:56,315] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0337 seconds
INFO [2022-12-06 11:47:17,872] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:47:17,873] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:47:17,882] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:47:17,894] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 11:47:20,510] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:47:20,510] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:47:20,518] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:47:20,530] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 11:47:26,385] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 11:47:26,386] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 11:47:26,387] im360.plugins.client360: Waiting 4 minutes before retry...
WARNING [2022-12-06 11:47:45,463] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:47:45,464] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:47:51,064] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320071.039641, 'message': 'Dec 6 11:47:49 hqnl0246134 sshd[209294]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.161.27.163 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 11:47:51,083] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320071.0402002, 'message': 'Dec 6 11:47:49 hqnl0246134 sshd[209294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.27.163 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 11:47:53,058] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320073.0409093, 'message': 'Dec 6 11:47:51 hqnl0246134 sshd[209294]: Failed password for root from 14.161.27.163 port 39966 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 11:47:53,928] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:47:53,948] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0270 seconds
INFO [2022-12-06 11:47:55,902] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:47:55,903] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:47:55,910] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:47:55,922] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 11:48:17,895] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:48:17,896] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:48:17,931] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:48:17,958] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0518 seconds
INFO [2022-12-06 11:48:20,711] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:48:20,711] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:48:20,718] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:48:20,747] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0348 seconds
WARNING [2022-12-06 11:48:45,467] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:48:45,468] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:49:18,318] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:49:18,319] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:49:18,328] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:49:18,341] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 11:49:21,612] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:49:21,613] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:49:21,620] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:49:21,631] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
WARNING [2022-12-06 11:49:45,473] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:49:45,475] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:50:18,005] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:50:18,006] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:50:18,017] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:50:18,032] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0244 seconds
INFO [2022-12-06 11:50:20,612] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:50:20,613] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:50:20,621] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:50:20,632] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
WARNING [2022-12-06 11:50:45,478] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:50:45,479] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:51:05,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320265.2611418, 'message': 'Dec 6 11:51:04 hqnl0246134 sshd[209523]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.128.169.130 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0627 seconds
INFO [2022-12-06 11:51:05,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '42.119.111.155', 'timestamp': 1670320265.2623556, 'message': 'Dec 6 11:51:04 hqnl0246134 sshd[209524]: pam_imunify(sshd:auth): [IM360_RBL] The IP 42.119.111.155 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0630 seconds
INFO [2022-12-06 11:51:05,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320265.2620726, 'message': 'Dec 6 11:51:04 hqnl0246134 sshd[209523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.169.130 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 11:51:05,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '42.119.111.155', 'timestamp': 1670320265.262589, 'message': 'Dec 6 11:51:04 hqnl0246134 sshd[209524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.119.111.155 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 11:51:07,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320267.261341, 'message': 'Dec 6 11:51:06 hqnl0246134 sshd[209523]: Failed password for root from 190.128.169.130 port 36278 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0572 seconds
INFO [2022-12-06 11:51:07,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '42.119.111.155', 'timestamp': 1670320267.271609, 'message': 'Dec 6 11:51:06 hqnl0246134 sshd[209524]: Failed password for root from 42.119.111.155 port 36688 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0477 seconds
INFO [2022-12-06 11:51:18,000] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:51:18,001] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:51:18,010] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:51:18,023] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-06 11:51:20,600] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:51:20,601] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:51:20,609] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:51:20,621] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 11:51:40,052] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 11:51:40,054] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 11:51:40,968] im360.plugins.pam: PAM module has been enabled for dovecot-pam
WARNING [2022-12-06 11:51:45,482] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:51:45,483] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:51:50,671] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 11:51:50,745] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 11:51:50,745] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 11:51:50,746] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 11:51:50,746] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 11:51:50,746] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 11:51:50,759] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 11:51:50,787] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0397 seconds
WARNING [2022-12-06 11:51:50,794] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 11:51:50,797] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:51:50,824] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0484 seconds
INFO [2022-12-06 11:51:50,826] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0439 seconds
WARNING [2022-12-06 11:51:53,240] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 11:51:53,936] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:51:53,957] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0283 seconds
INFO [2022-12-06 11:51:58,003] defence360agent.files: Updating all files
INFO [2022-12-06 11:51:58,290] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 11:51:58,291] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 11:51:58,573] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 11:51:58,574] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 11:51:58,906] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 11:51:58,907] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 11:51:59,233] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 11:51:59,234] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 11:51:59,234] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 11:51:59,494] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 09:51:59 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2B7B16A46FCB'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 11:51:59,497] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 11:51:59,497] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 11:52:00,109] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 11:52:00,109] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 11:52:00,423] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 11:52:00,424] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 11:52:00,683] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 11:52:00,683] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 11:52:01,020] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 11:52:01,021] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 11:52:01,411] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 11:52:01,412] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 11:52:18,074] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:52:18,075] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:52:18,087] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:52:18,101] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0240 seconds
INFO [2022-12-06 11:52:20,788] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:52:20,789] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:52:20,796] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:52:20,809] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 11:52:20,882] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 11:52:20,883] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 11:52:20,884] im360.plugins.client360: Waiting 5 minutes before retry...
WARNING [2022-12-06 11:52:45,486] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:52:45,488] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:53:18,118] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:53:18,121] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:53:18,141] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:53:18,169] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0454 seconds
INFO [2022-12-06 11:53:20,683] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:53:20,684] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:53:20,692] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:53:20,705] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-06 11:53:43,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '42.119.111.155', 'timestamp': 1670320423.4348521, 'message': 'Dec 6 11:53:42 hqnl0246134 sshd[209710]: pam_imunify(sshd:auth): [IM360_RBL] The IP 42.119.111.155 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 11:53:43,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '42.119.111.155', 'timestamp': 1670320423.4353197, 'message': 'Dec 6 11:53:42 hqnl0246134 sshd[209710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.119.111.155 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 11:53:45,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '42.119.111.155', 'timestamp': 1670320425.4390297, 'message': 'Dec 6 11:53:44 hqnl0246134 sshd[209710]: Failed password for root from 42.119.111.155 port 47218 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-06 11:53:45,491] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:53:45,492] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:53:48,915] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:53:48,916] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:53:48,923] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:53:48,934] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
WARNING [2022-12-06 11:53:54,469] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:53:54,487] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.5558 seconds
INFO [2022-12-06 11:54:17,874] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:54:17,875] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:54:17,885] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:54:17,898] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 11:54:20,500] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:54:20,501] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:54:20,508] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:54:20,519] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
WARNING [2022-12-06 11:54:45,494] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:54:45,495] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:54:49,563] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.246.130.69', 'timestamp': 1670320489.5230722, 'message': 'Dec 6 11:54:49 hqnl0246134 sshd[209775]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.246.130.69 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-06 11:54:49,580] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.246.130.69', 'timestamp': 1670320489.5235293, 'message': 'Dec 6 11:54:49 hqnl0246134 sshd[209775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.130.69 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 11:54:51,598] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '185.246.130.69', 'timestamp': 1670320491.5215309, 'message': 'Dec 6 11:54:51 hqnl0246134 sshd[209775]: Failed password for root from 185.246.130.69 port 56954 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0764 seconds
WARNING [2022-12-06 11:54:53,941] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:54:53,980] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0466 seconds
INFO [2022-12-06 11:55:13,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320513.55575, 'message': 'Dec 6 11:55:12 hqnl0246134 sshd[209814]: Invalid user joao from 14.161.27.163 port 65008', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 11:55:13,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320513.5569465, 'message': 'Dec 6 11:55:12 hqnl0246134 sshd[209814]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.161.27.163 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 11:55:13,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320513.5571592, 'message': 'Dec 6 11:55:12 hqnl0246134 sshd[209814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.27.163 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 11:55:15,587] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '192.252.180.65', 'timestamp': 1670320515.5559475, 'message': 'Dec 6 11:55:14 hqnl0246134 sshd[209812]: pam_imunify(sshd:auth): [IM360_RBL] The IP 192.252.180.65 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 11:55:15,588] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320515.5563412, 'message': 'Dec 6 11:55:14 hqnl0246134 sshd[209814]: Failed password for invalid user joao from 14.161.27.163 port 65008 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 11:55:15,607] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '192.252.180.65', 'timestamp': 1670320515.5561705, 'message': 'Dec 6 11:55:14 hqnl0246134 sshd[209812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.252.180.65 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 11:55:17,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320517.5575418, 'message': 'Dec 6 11:55:16 hqnl0246134 sshd[209814]: Disconnected from invalid user joao 14.161.27.163 port 65008 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 11:55:17,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '192.252.180.65', 'timestamp': 1670320517.5577419, 'message': 'Dec 6 11:55:16 hqnl0246134 sshd[209812]: Failed password for root from 192.252.180.65 port 43306 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 11:55:17,933] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:55:17,933] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:55:17,945] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:55:17,962] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0280 seconds
INFO [2022-12-06 11:55:20,610] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:55:20,611] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:55:20,618] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:55:20,631] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
WARNING [2022-12-06 11:55:45,498] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:55:45,499] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:55:45,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.10.13', 'timestamp': 1670320545.6104662, 'message': 'Dec 6 11:55:44 hqnl0246134 sshd[209852]: Invalid user hive from 51.250.10.13 port 41920', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 11:55:45,664] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.10.13', 'timestamp': 1670320545.6108327, 'message': 'Dec 6 11:55:45 hqnl0246134 sshd[209852]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.10.13 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 11:55:45,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.10.13', 'timestamp': 1670320545.6110268, 'message': 'Dec 6 11:55:45 hqnl0246134 sshd[209852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.10.13 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 11:55:47,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.10.13', 'timestamp': 1670320547.611775, 'message': 'Dec 6 11:55:46 hqnl0246134 sshd[209852]: Failed password for invalid user hive from 51.250.10.13 port 41920 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1259 seconds
INFO [2022-12-06 11:55:47,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.10.13', 'timestamp': 1670320547.6121428, 'message': 'Dec 6 11:55:47 hqnl0246134 sshd[209852]: Disconnected from invalid user hive 51.250.10.13 port 41920 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1274 seconds
WARNING [2022-12-06 11:55:53,958] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:55:53,986] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0488 seconds
INFO [2022-12-06 11:56:18,887] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:56:18,888] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:56:18,902] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:56:18,915] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0263 seconds
INFO [2022-12-06 11:56:21,659] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:56:21,660] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:56:21,667] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:56:21,682] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0211 seconds
INFO [2022-12-06 11:56:25,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '42.119.111.155', 'timestamp': 1670320585.6585376, 'message': 'Dec 6 11:56:25 hqnl0246134 sshd[209900]: pam_imunify(sshd:auth): [IM360_RBL] The IP 42.119.111.155 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 11:56:25,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '42.119.111.155', 'timestamp': 1670320585.6587765, 'message': 'Dec 6 11:56:25 hqnl0246134 sshd[209900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.119.111.155 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0160 seconds
INFO [2022-12-06 11:56:27,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '42.119.111.155', 'timestamp': 1670320587.659648, 'message': 'Dec 6 11:56:27 hqnl0246134 sshd[209900]: Failed password for root from 42.119.111.155 port 57754 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0452 seconds
INFO [2022-12-06 11:56:32,098] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:56:32,099] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:56:32,107] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:56:32,118] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 11:56:39,697] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.128.16', 'timestamp': 1670320599.6745899, 'message': 'Dec 6 11:56:39 hqnl0246134 sshd[209920]: Invalid user ca from 159.65.128.16 port 54026', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 11:56:39,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.65.128.16', 'timestamp': 1670320599.6749766, 'message': 'Dec 6 11:56:39 hqnl0246134 sshd[209920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.65.128.16 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 11:56:39,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.65.128.16', 'timestamp': 1670320599.6751652, 'message': 'Dec 6 11:56:39 hqnl0246134 sshd[209920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.128.16 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1102 seconds
INFO [2022-12-06 11:56:41,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320601.6798506, 'message': 'Dec 6 11:56:40 hqnl0246134 sshd[209923]: Invalid user umcapasocanoas from 125.99.46.50 port 33632', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 11:56:41,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320601.6802664, 'message': 'Dec 6 11:56:41 hqnl0246134 sshd[209923]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.99.46.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 11:56:41,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320601.6804311, 'message': 'Dec 6 11:56:41 hqnl0246134 sshd[209923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.99.46.50 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 11:56:43,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.128.16', 'timestamp': 1670320603.6798995, 'message': 'Dec 6 11:56:41 hqnl0246134 sshd[209920]: Failed password for invalid user ca from 159.65.128.16 port 54026 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 11:56:43,713] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320603.6804364, 'message': 'Dec 6 11:56:43 hqnl0246134 sshd[209923]: Failed password for invalid user umcapasocanoas from 125.99.46.50 port 33632 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 11:56:43,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.128.16', 'timestamp': 1670320603.6802287, 'message': 'Dec 6 11:56:42 hqnl0246134 sshd[209920]: Disconnected from invalid user ca 159.65.128.16 port 54026 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
WARNING [2022-12-06 11:56:45,501] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:56:45,503] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:56:47,714] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320607.689453, 'message': 'Dec 6 11:56:45 hqnl0246134 sshd[209923]: Disconnected from invalid user umcapasocanoas 125.99.46.50 port 33632 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 11:56:49,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.64.76.187', 'timestamp': 1670320609.6900508, 'message': 'Dec 6 11:56:48 hqnl0246134 sshd[209925]: Invalid user ruben from 34.64.76.187 port 55876', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 11:56:49,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.64.76.187', 'timestamp': 1670320609.6933546, 'message': 'Dec 6 11:56:48 hqnl0246134 sshd[209925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.64.76.187 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 11:56:49,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.64.76.187', 'timestamp': 1670320609.6935778, 'message': 'Dec 6 11:56:48 hqnl0246134 sshd[209925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.64.76.187 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 11:56:51,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.64.76.187', 'timestamp': 1670320611.6930513, 'message': 'Dec 6 11:56:51 hqnl0246134 sshd[209925]: Failed password for invalid user ruben from 34.64.76.187 port 55876 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 11:56:53,714] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.64.76.187', 'timestamp': 1670320613.6945422, 'message': 'Dec 6 11:56:53 hqnl0246134 sshd[209925]: Disconnected from invalid user ruben 34.64.76.187 port 55876 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 11:56:53,953] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:56:53,987] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0471 seconds
INFO [2022-12-06 11:57:05,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320625.7147894, 'message': 'Dec 6 11:57:04 hqnl0246134 sshd[209946]: Invalid user xerox from 190.128.169.130 port 51366', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 11:57:05,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320625.715231, 'message': 'Dec 6 11:57:04 hqnl0246134 sshd[209946]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.128.169.130 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 11:57:05,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320625.7154956, 'message': 'Dec 6 11:57:04 hqnl0246134 sshd[209946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.169.130 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 11:57:07,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320627.7199461, 'message': 'Dec 6 11:57:06 hqnl0246134 sshd[209946]: Failed password for invalid user xerox from 190.128.169.130 port 51366 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 11:57:07,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320627.7201772, 'message': 'Dec 6 11:57:07 hqnl0246134 sshd[209946]: Disconnected from invalid user xerox 190.128.169.130 port 51366 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 11:57:17,952] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:57:17,952] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:57:17,960] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:57:17,971] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 11:57:20,573] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:57:20,581] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:57:20,589] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:57:20,601] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 11:57:24,959] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 11:57:25,025] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 11:57:25,026] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 11:57:25,026] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 11:57:25,026] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 11:57:25,026] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 11:57:25,040] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 11:57:25,063] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0358 seconds
WARNING [2022-12-06 11:57:25,072] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 11:57:25,075] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:57:25,103] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0469 seconds
INFO [2022-12-06 11:57:25,105] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0451 seconds
INFO [2022-12-06 11:57:41,785] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670320661.7585993, 'message': 'Dec 6 11:57:39 hqnl0246134 sshd[209995]: Invalid user lzh from 20.40.81.0 port 44986', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 11:57:41,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.40.81.0', 'timestamp': 1670320661.759281, 'message': 'Dec 6 11:57:40 hqnl0246134 sshd[209995]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.40.81.0 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 11:57:41,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.40.81.0', 'timestamp': 1670320661.7595258, 'message': 'Dec 6 11:57:40 hqnl0246134 sshd[209995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.40.81.0 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 11:57:43,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670320663.7579305, 'message': 'Dec 6 11:57:41 hqnl0246134 sshd[209995]: Failed password for invalid user lzh from 20.40.81.0 port 44986 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 11:57:43,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670320663.7582722, 'message': 'Dec 6 11:57:42 hqnl0246134 sshd[209995]: Disconnected from invalid user lzh 20.40.81.0 port 44986 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 11:57:45,111] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:57:45,112] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:57:45,119] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:57:45,131] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
WARNING [2022-12-06 11:57:45,509] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:57:45,509] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 11:57:47,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.236.228.138', 'timestamp': 1670320667.7674077, 'message': 'Dec 6 11:57:46 hqnl0246134 sshd[210005]: Invalid user servidor from 185.236.228.138 port 57848', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 11:57:47,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.236.228.138', 'timestamp': 1670320667.7677717, 'message': 'Dec 6 11:57:46 hqnl0246134 sshd[210005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.236.228.138 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 11:57:47,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.236.228.138', 'timestamp': 1670320667.7679763, 'message': 'Dec 6 11:57:46 hqnl0246134 sshd[210005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.236.228.138 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 11:57:49,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.236.228.138', 'timestamp': 1670320669.7724848, 'message': 'Dec 6 11:57:49 hqnl0246134 sshd[210005]: Failed password for invalid user servidor from 185.236.228.138 port 57848 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 11:57:51,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.236.228.138', 'timestamp': 1670320671.7740169, 'message': 'Dec 6 11:57:50 hqnl0246134 sshd[210005]: Disconnected from invalid user servidor 185.236.228.138 port 57848 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0336 seconds
WARNING [2022-12-06 11:57:53,956] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:57:53,989] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0454 seconds
INFO [2022-12-06 11:58:03,328] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 11:58:03,329] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 11:58:03,330] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 11:58:17,936] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:58:17,936] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:58:17,948] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:58:17,963] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0255 seconds
INFO [2022-12-06 11:58:20,595] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:58:20,596] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:58:20,604] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:58:20,615] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 11:58:39,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.10.13', 'timestamp': 1670320719.837293, 'message': 'Dec 6 11:58:38 hqnl0246134 sshd[210057]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.10.13 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0581 seconds
INFO [2022-12-06 11:58:39,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320719.838621, 'message': 'Dec 6 11:58:38 hqnl0246134 sshd[210055]: Invalid user linux from 14.161.27.163 port 33550', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0582 seconds
INFO [2022-12-06 11:58:39,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.10.13', 'timestamp': 1670320719.838298, 'message': 'Dec 6 11:58:38 hqnl0246134 sshd[210057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.10.13 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 11:58:39,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320719.838808, 'message': 'Dec 6 11:58:38 hqnl0246134 sshd[210055]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.161.27.163 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 11:58:39,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.250.10.13', 'timestamp': 1670320719.8391845, 'message': 'Dec 6 11:58:39 hqnl0246134 sshd[210057]: Failed password for root from 51.250.10.13 port 60216 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 11:58:39,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320719.838977, 'message': 'Dec 6 11:58:38 hqnl0246134 sshd[210055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.27.163 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 11:58:41,854] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320721.8363645, 'message': 'Dec 6 11:58:40 hqnl0246134 sshd[210055]: Failed password for invalid user linux from 14.161.27.163 port 33550 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 11:58:41,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320721.8365827, 'message': 'Dec 6 11:58:41 hqnl0246134 sshd[210055]: Disconnected from invalid user linux 14.161.27.163 port 33550 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-06 11:58:45,511] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:58:45,512] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:58:53,956] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:58:53,981] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0349 seconds
INFO [2022-12-06 11:59:17,980] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:59:17,981] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:59:17,991] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:59:18,004] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 11:59:20,716] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:59:20,716] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:59:20,726] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:59:20,743] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0257 seconds
INFO [2022-12-06 11:59:31,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.118.22.221', 'timestamp': 1670320771.9042537, 'message': 'Dec 6 11:59:30 hqnl0246134 sshd[210097]: Invalid user paula from 27.118.22.221 port 46014', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 11:59:31,950] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320771.9049656, 'message': 'Dec 6 11:59:30 hqnl0246134 sshd[210099]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.99.46.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 11:59:31,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '27.118.22.221', 'timestamp': 1670320771.9045446, 'message': 'Dec 6 11:59:30 hqnl0246134 sshd[210097]: pam_imunify(sshd:auth): [IM360_RBL] The IP 27.118.22.221 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 11:59:31,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320771.90508, 'message': 'Dec 6 11:59:30 hqnl0246134 sshd[210099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.99.46.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 11:59:32,000] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '27.118.22.221', 'timestamp': 1670320771.9048033, 'message': 'Dec 6 11:59:30 hqnl0246134 sshd[210097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.118.22.221 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 11:59:33,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.118.22.221', 'timestamp': 1670320773.9061773, 'message': 'Dec 6 11:59:33 hqnl0246134 sshd[210097]: Failed password for invalid user paula from 27.118.22.221 port 46014 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 11:59:33,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320773.9063795, 'message': 'Dec 6 11:59:33 hqnl0246134 sshd[210099]: Failed password for root from 125.99.46.50 port 40040 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 11:59:35,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.118.22.221', 'timestamp': 1670320775.9092414, 'message': 'Dec 6 11:59:34 hqnl0246134 sshd[210097]: Disconnected from invalid user paula 27.118.22.221 port 46014 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-06 11:59:36,883] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 11:59:36,884] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 11:59:36,891] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:59:36,902] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 11:59:39,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.172.219.107', 'timestamp': 1670320779.9134386, 'message': 'Dec 6 11:59:38 hqnl0246134 sshd[210116]: Invalid user sarah from 107.172.219.107 port 54972', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 11:59:39,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '107.172.219.107', 'timestamp': 1670320779.913744, 'message': 'Dec 6 11:59:39 hqnl0246134 sshd[210116]: pam_imunify(sshd:auth): [IM360_RBL] The IP 107.172.219.107 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 11:59:39,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '107.172.219.107', 'timestamp': 1670320779.9139826, 'message': 'Dec 6 11:59:39 hqnl0246134 sshd[210116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.219.107 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 11:59:41,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.172.219.107', 'timestamp': 1670320781.918588, 'message': 'Dec 6 11:59:40 hqnl0246134 sshd[210116]: Failed password for invalid user sarah from 107.172.219.107 port 54972 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 11:59:43,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.172.219.107', 'timestamp': 1670320783.9215786, 'message': 'Dec 6 11:59:42 hqnl0246134 sshd[210116]: Disconnected from invalid user sarah 107.172.219.107 port 54972 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 11:59:45,514] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 11:59:45,514] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 11:59:53,958] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 11:59:53,981] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0314 seconds
INFO [2022-12-06 12:00:03,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320803.9479747, 'message': 'Dec 6 12:00:03 hqnl0246134 sshd[210160]: Invalid user usuario2 from 125.99.46.50 port 45408', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 12:00:04,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320803.9484162, 'message': 'Dec 6 12:00:03 hqnl0246134 sshd[210160]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.99.46.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 12:00:04,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320803.9485643, 'message': 'Dec 6 12:00:03 hqnl0246134 sshd[210160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.99.46.50 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 12:00:07,984] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320807.9508808, 'message': 'Dec 6 12:00:05 hqnl0246134 sshd[210160]: Failed password for invalid user usuario2 from 125.99.46.50 port 45408 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 12:00:08,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320807.951325, 'message': 'Dec 6 12:00:07 hqnl0246134 sshd[210160]: Disconnected from invalid user usuario2 125.99.46.50 port 45408 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 12:00:19,970] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:00:19,970] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:00:19,992] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:00:20,026] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0412 seconds
INFO [2022-12-06 12:00:22,730] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:00:22,730] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:00:22,737] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:00:22,749] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 12:00:28,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320827.990551, 'message': 'Dec 6 12:00:26 hqnl0246134 sshd[210196]: Invalid user admin from 190.128.169.130 port 40954', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 12:00:28,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320827.9908273, 'message': 'Dec 6 12:00:26 hqnl0246134 sshd[210196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.128.169.130 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 12:00:28,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320827.9910178, 'message': 'Dec 6 12:00:26 hqnl0246134 sshd[210196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.169.130 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 12:00:30,013] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320829.995105, 'message': 'Dec 6 12:00:28 hqnl0246134 sshd[210196]: Failed password for invalid user admin from 190.128.169.130 port 40954 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 12:00:30,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670320829.9953296, 'message': 'Dec 6 12:00:28 hqnl0246134 sshd[210196]: Disconnected from invalid user admin 190.128.169.130 port 40954 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 12:00:36,026] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320836.0043721, 'message': 'Dec 6 12:00:35 hqnl0246134 sshd[210202]: Invalid user archive from 125.99.46.50 port 50776', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 12:00:36,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320836.0046856, 'message': 'Dec 6 12:00:35 hqnl0246134 sshd[210202]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.99.46.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 12:00:36,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320836.0048225, 'message': 'Dec 6 12:00:35 hqnl0246134 sshd[210202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.99.46.50 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 12:00:40,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320840.0188813, 'message': 'Dec 6 12:00:38 hqnl0246134 sshd[210202]: Failed password for invalid user archive from 125.99.46.50 port 50776 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 12:00:40,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.99.46.50', 'timestamp': 1670320840.0191507, 'message': 'Dec 6 12:00:39 hqnl0246134 sshd[210202]: Disconnected from invalid user archive 125.99.46.50 port 50776 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 12:00:42,478] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:00:42,480] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:00:42,491] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:00:42,504] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
WARNING [2022-12-06 12:00:45,519] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:00:45,520] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:00:48,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '192.252.180.65', 'timestamp': 1670320848.02442, 'message': 'Dec 6 12:00:47 hqnl0246134 sshd[210219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 192.252.180.65 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0530 seconds
INFO [2022-12-06 12:00:48,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '192.252.180.65', 'timestamp': 1670320848.024672, 'message': 'Dec 6 12:00:47 hqnl0246134 sshd[210219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.252.180.65 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0563 seconds
INFO [2022-12-06 12:00:50,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '192.252.180.65', 'timestamp': 1670320850.0255182, 'message': 'Dec 6 12:00:49 hqnl0246134 sshd[210219]: Failed password for root from 192.252.180.65 port 33536 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-06 12:00:53,964] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:00:53,998] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0452 seconds
INFO [2022-12-06 12:01:17,762] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:01:17,763] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:01:17,772] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:01:17,786] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 12:01:20,746] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:01:20,747] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:01:20,754] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:01:20,771] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0234 seconds
INFO [2022-12-06 12:01:26,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.10.13', 'timestamp': 1670320886.0740454, 'message': 'Dec 6 12:01:25 hqnl0246134 sshd[210260]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.10.13 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 12:01:26,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.10.13', 'timestamp': 1670320886.0742745, 'message': 'Dec 6 12:01:25 hqnl0246134 sshd[210260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.10.13 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:01:28,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.250.10.13', 'timestamp': 1670320888.0760355, 'message': 'Dec 6 12:01:27 hqnl0246134 sshd[210260]: Failed password for root from 51.250.10.13 port 50256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 12:01:45,527] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:01:45,528] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:01:50,702] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 12:01:50,767] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 12:01:50,767] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 12:01:50,767] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 12:01:50,768] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 12:01:50,768] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 12:01:50,780] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 12:01:50,798] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0286 seconds
WARNING [2022-12-06 12:01:50,806] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 12:01:50,810] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:01:50,838] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0468 seconds
INFO [2022-12-06 12:01:50,840] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0449 seconds
WARNING [2022-12-06 12:01:53,244] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 12:01:53,964] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:01:53,982] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0263 seconds
INFO [2022-12-06 12:02:02,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.198.205.72', 'timestamp': 1670320922.1206634, 'message': 'Dec 6 12:02:02 hqnl0246134 sshd[210284]: Invalid user pdx from 67.198.205.72 port 53336', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 12:02:04,172] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '67.198.205.72', 'timestamp': 1670320924.121429, 'message': 'Dec 6 12:02:02 hqnl0246134 sshd[210284]: pam_imunify(sshd:auth): [IM360_RBL] The IP 67.198.205.72 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0508 seconds
INFO [2022-12-06 12:02:04,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '67.198.205.72', 'timestamp': 1670320924.1216183, 'message': 'Dec 6 12:02:02 hqnl0246134 sshd[210284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.198.205.72 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 12:02:04,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.198.205.72', 'timestamp': 1670320924.121792, 'message': 'Dec 6 12:02:03 hqnl0246134 sshd[210284]: Failed password for invalid user pdx from 67.198.205.72 port 53336 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 12:02:06,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.198.205.72', 'timestamp': 1670320926.1238096, 'message': 'Dec 6 12:02:04 hqnl0246134 sshd[210284]: Disconnected from invalid user pdx 67.198.205.72 port 53336 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0689 seconds
INFO [2022-12-06 12:02:07,833] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:02:07,834] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:02:07,842] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:02:07,854] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 12:02:16,172] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.236.228.138', 'timestamp': 1670320936.13431, 'message': 'Dec 6 12:02:14 hqnl0246134 sshd[210315]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.236.228.138 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 12:02:16,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320936.134912, 'message': 'Dec 6 12:02:15 hqnl0246134 sshd[210313]: Invalid user mexico from 14.161.27.163 port 37832', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 12:02:16,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.236.228.138', 'timestamp': 1670320936.1347024, 'message': 'Dec 6 12:02:14 hqnl0246134 sshd[210315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.236.228.138 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 12:02:16,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320936.13502, 'message': 'Dec 6 12:02:15 hqnl0246134 sshd[210313]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.161.27.163 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 12:02:16,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320936.1351464, 'message': 'Dec 6 12:02:15 hqnl0246134 sshd[210313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.27.163 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 12:02:17,916] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:02:17,917] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:02:17,925] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:02:17,937] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 12:02:18,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '185.236.228.138', 'timestamp': 1670320938.1349602, 'message': 'Dec 6 12:02:16 hqnl0246134 sshd[210315]: Failed password for root from 185.236.228.138 port 48358 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 12:02:18,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320938.135137, 'message': 'Dec 6 12:02:17 hqnl0246134 sshd[210313]: Failed password for invalid user mexico from 14.161.27.163 port 37832 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 12:02:20,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.27.163', 'timestamp': 1670320940.1369247, 'message': 'Dec 6 12:02:18 hqnl0246134 sshd[210313]: Disconnected from invalid user mexico 14.161.27.163 port 37832 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 12:02:20,900] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 12:02:20,900] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 12:02:20,901] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 12:02:21,052] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:02:21,052] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:02:21,060] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:02:21,071] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
WARNING [2022-12-06 12:02:45,534] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:02:45,535] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:02:53,967] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:02:53,989] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0301 seconds
INFO [2022-12-06 12:03:17,850] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:03:17,851] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:03:17,862] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:03:17,876] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0238 seconds
INFO [2022-12-06 12:03:20,590] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:03:20,590] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:03:20,598] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:03:20,609] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 12:03:40,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321020.2276323, 'message': 'Dec 6 12:03:38 hqnl0246134 sshd[210394]: Invalid user ubuntu from 52.183.128.237 port 56696', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 12:03:40,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321020.2281735, 'message': 'Dec 6 12:03:38 hqnl0246134 sshd[210394]: pam_imunify(sshd:auth): [IM360_RBL] The IP 52.183.128.237 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 12:03:40,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321020.2284017, 'message': 'Dec 6 12:03:38 hqnl0246134 sshd[210394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.183.128.237 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 12:03:42,285] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321022.2282135, 'message': 'Dec 6 12:03:41 hqnl0246134 sshd[210394]: Failed password for invalid user ubuntu from 52.183.128.237 port 56696 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0567 seconds
INFO [2022-12-06 12:03:44,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321024.2308593, 'message': 'Dec 6 12:03:43 hqnl0246134 sshd[210394]: Disconnected from invalid user ubuntu 52.183.128.237 port 56696 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 12:03:44,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321024.231118, 'message': 'Dec 6 12:03:43 hqnl0246134 sshd[210398]: Invalid user bbs from 194.204.194.11 port 56876', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 12:03:44,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321024.231301, 'message': 'Dec 6 12:03:44 hqnl0246134 sshd[210398]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.204.194.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 12:03:44,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321024.2314816, 'message': 'Dec 6 12:03:44 hqnl0246134 sshd[210398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 12:03:45,539] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:03:45,539] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:03:45,953] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:03:45,953] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:03:45,963] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:03:45,977] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 12:03:46,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321026.234272, 'message': 'Dec 6 12:03:45 hqnl0246134 sshd[210401]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.246.130.69 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-06 12:03:46,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321026.2345843, 'message': 'Dec 6 12:03:45 hqnl0246134 sshd[210398]: Failed password for invalid user bbs from 194.204.194.11 port 56876 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 12:03:46,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321026.2344687, 'message': 'Dec 6 12:03:45 hqnl0246134 sshd[210401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.130.69 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-06 12:03:46,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321026.2347803, 'message': 'Dec 6 12:03:45 hqnl0246134 sshd[210398]: Disconnected from invalid user bbs 194.204.194.11 port 56876 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-06 12:03:48,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321028.2370884, 'message': 'Dec 6 12:03:47 hqnl0246134 sshd[210401]: Failed password for root from 185.246.130.69 port 34886 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 12:03:50,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670321030.2422051, 'message': 'Dec 6 12:03:49 hqnl0246134 sshd[210407]: Invalid user fiscal from 190.128.169.130 port 58768', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 12:03:50,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.128.169.130', 'timestamp': 1670321030.2423823, 'message': 'Dec 6 12:03:50 hqnl0246134 sshd[210407]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.128.169.130 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 12:03:50,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.128.169.130', 'timestamp': 1670321030.242495, 'message': 'Dec 6 12:03:50 hqnl0246134 sshd[210407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.169.130 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 12:03:52,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670321032.24599, 'message': 'Dec 6 12:03:51 hqnl0246134 sshd[210407]: Failed password for invalid user fiscal from 190.128.169.130 port 58768 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 12:03:53,969] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:03:54,006] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0448 seconds
INFO [2022-12-06 12:03:54,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321034.2498534, 'message': 'Dec 6 12:03:52 hqnl0246134 sshd[210410]: Invalid user xh from 77.82.90.210 port 58800', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0537 seconds
INFO [2022-12-06 12:03:54,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670321034.2506607, 'message': 'Dec 6 12:03:52 hqnl0246134 sshd[210407]: Disconnected from invalid user fiscal 190.128.169.130 port 58768 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0527 seconds
INFO [2022-12-06 12:03:54,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321034.250217, 'message': 'Dec 6 12:03:52 hqnl0246134 sshd[210410]: pam_imunify(sshd:auth): [IM360_RBL] The IP 77.82.90.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 12:03:54,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321034.2504807, 'message': 'Dec 6 12:03:52 hqnl0246134 sshd[210410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.82.90.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 12:03:56,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321036.255459, 'message': 'Dec 6 12:03:55 hqnl0246134 sshd[210410]: Failed password for invalid user xh from 77.82.90.210 port 58800 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 12:03:56,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321036.2557318, 'message': 'Dec 6 12:03:56 hqnl0246134 sshd[210410]: Disconnected from invalid user xh 77.82.90.210 port 58800 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 12:04:18,013] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:04:18,014] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:04:18,045] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:04:18,078] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0487 seconds
INFO [2022-12-06 12:04:21,533] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:04:21,534] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:04:21,541] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:04:21,552] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 12:04:36,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321076.3336346, 'message': 'Dec 6 12:04:35 hqnl0246134 sshd[210447]: Invalid user usuario2 from 51.75.17.210 port 50994', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 12:04:36,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321076.3340855, 'message': 'Dec 6 12:04:35 hqnl0246134 sshd[210447]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.75.17.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 12:04:36,428] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321076.3342545, 'message': 'Dec 6 12:04:35 hqnl0246134 sshd[210447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.17.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 12:04:38,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321078.343957, 'message': 'Dec 6 12:04:37 hqnl0246134 sshd[210447]: Failed password for invalid user usuario2 from 51.75.17.210 port 50994 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 12:04:40,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321080.3454666, 'message': 'Dec 6 12:04:39 hqnl0246134 sshd[210447]: Disconnected from invalid user usuario2 51.75.17.210 port 50994 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
WARNING [2022-12-06 12:04:45,541] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:04:45,541] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:04:53,971] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:04:53,993] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0291 seconds
INFO [2022-12-06 12:04:56,382] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321096.3627346, 'message': 'Dec 6 12:04:54 hqnl0246134 sshd[210462]: Invalid user pdx from 107.172.219.107 port 33350', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 12:04:56,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321096.362959, 'message': 'Dec 6 12:04:54 hqnl0246134 sshd[210462]: pam_imunify(sshd:auth): [IM360_RBL] The IP 107.172.219.107 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 12:04:56,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321096.3631098, 'message': 'Dec 6 12:04:54 hqnl0246134 sshd[210462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.219.107 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 12:04:56,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321096.3634815, 'message': 'Dec 6 12:04:56 hqnl0246134 sshd[210462]: Failed password for invalid user pdx from 107.172.219.107 port 33350 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 12:04:58,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321098.3651054, 'message': 'Dec 6 12:04:56 hqnl0246134 sshd[210462]: Disconnected from invalid user pdx 107.172.219.107 port 33350 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 12:04:59,196] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:04:59,196] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:04:59,205] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:04:59,217] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 12:05:06,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321106.373145, 'message': 'Dec 6 12:05:04 hqnl0246134 sshd[210490]: Invalid user pdx from 159.65.128.16 port 40186', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 12:05:06,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321106.3735356, 'message': 'Dec 6 12:05:04 hqnl0246134 sshd[210490]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.65.128.16 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 12:05:06,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321106.3737144, 'message': 'Dec 6 12:05:04 hqnl0246134 sshd[210490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.128.16 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 12:05:08,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321108.373524, 'message': 'Dec 6 12:05:06 hqnl0246134 sshd[210490]: Failed password for invalid user pdx from 159.65.128.16 port 40186 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 12:05:08,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321108.3737168, 'message': 'Dec 6 12:05:07 hqnl0246134 sshd[210490]: Disconnected from invalid user pdx 159.65.128.16 port 40186 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 12:05:17,846] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:05:17,846] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:05:17,853] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:05:17,864] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 12:05:20,466] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:05:20,467] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:05:20,474] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:05:20,489] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 12:05:22,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321122.3905957, 'message': 'Dec 6 12:05:21 hqnl0246134 sshd[210525]: Invalid user sarah from 67.198.205.72 port 49734', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:05:22,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321122.3908195, 'message': 'Dec 6 12:05:21 hqnl0246134 sshd[210525]: pam_imunify(sshd:auth): [IM360_RBL] The IP 67.198.205.72 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 12:05:22,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321122.3910215, 'message': 'Dec 6 12:05:21 hqnl0246134 sshd[210525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.198.205.72 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 12:05:24,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321124.3923073, 'message': 'Dec 6 12:05:22 hqnl0246134 sshd[210525]: Failed password for invalid user sarah from 67.198.205.72 port 49734 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 12:05:24,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321124.392514, 'message': 'Dec 6 12:05:22 hqnl0246134 sshd[210525]: Disconnected from invalid user sarah 67.198.205.72 port 49734 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 12:05:33,206] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 12:05:37,542] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 12:05:37,543] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 12:05:37,543] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 12:05:37,544] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 12:05:37,545] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 12:05:37,565] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 12:05:37,596] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0506 seconds
WARNING [2022-12-06 12:05:37,607] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 12:05:37,610] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:05:37,627] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0414 seconds
INFO [2022-12-06 12:05:37,629] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0370 seconds
WARNING [2022-12-06 12:05:45,544] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:05:45,545] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:05:53,976] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:05:54,003] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0363 seconds
INFO [2022-12-06 12:06:12,533] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 12:06:12,533] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 12:06:12,534] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 12:06:17,834] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:06:17,835] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:06:17,844] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:06:17,856] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 12:06:18,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.252.180.65', 'timestamp': 1670321178.452046, 'message': 'Dec 6 12:06:17 hqnl0246134 sshd[210578]: Invalid user jessie from 192.252.180.65 port 51996', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 12:06:18,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '192.252.180.65', 'timestamp': 1670321178.452422, 'message': 'Dec 6 12:06:17 hqnl0246134 sshd[210578]: pam_imunify(sshd:auth): [IM360_RBL] The IP 192.252.180.65 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 12:06:18,524] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '192.252.180.65', 'timestamp': 1670321178.4526567, 'message': 'Dec 6 12:06:17 hqnl0246134 sshd[210578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.252.180.65 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 12:06:20,502] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:06:20,502] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:06:20,522] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:06:20,541] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0377 seconds
INFO [2022-12-06 12:06:20,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.252.180.65', 'timestamp': 1670321180.5042965, 'message': 'Dec 6 12:06:19 hqnl0246134 sshd[210578]: Failed password for invalid user jessie from 192.252.180.65 port 51996 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 12:06:22,502] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.252.180.65', 'timestamp': 1670321182.454006, 'message': 'Dec 6 12:06:20 hqnl0246134 sshd[210578]: Disconnected from invalid user jessie 192.252.180.65 port 51996 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0477 seconds
INFO [2022-12-06 12:06:23,387] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:06:23,388] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:06:23,396] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:06:23,408] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 12:06:26,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321186.4580023, 'message': 'Dec 6 12:06:25 hqnl0246134 sshd[210598]: Invalid user dbuser from 185.246.130.69 port 56168', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 12:06:26,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321186.458286, 'message': 'Dec 6 12:06:25 hqnl0246134 sshd[210598]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.246.130.69 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 12:06:26,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321186.4584668, 'message': 'Dec 6 12:06:25 hqnl0246134 sshd[210598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.130.69 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 12:06:28,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321188.4586265, 'message': 'Dec 6 12:06:27 hqnl0246134 sshd[210598]: Failed password for invalid user dbuser from 185.246.130.69 port 56168 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 12:06:30,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321190.4622362, 'message': 'Dec 6 12:06:29 hqnl0246134 sshd[210598]: Disconnected from invalid user dbuser 185.246.130.69 port 56168 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 12:06:40,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.236.228.138', 'timestamp': 1670321200.4727373, 'message': 'Dec 6 12:06:38 hqnl0246134 sshd[210614]: Invalid user teamspeak3 from 185.236.228.138 port 38868', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0798 seconds
INFO [2022-12-06 12:06:40,615] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.236.228.138', 'timestamp': 1670321200.4730818, 'message': 'Dec 6 12:06:38 hqnl0246134 sshd[210614]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.236.228.138 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0586 seconds
INFO [2022-12-06 12:06:40,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.236.228.138', 'timestamp': 1670321200.4732294, 'message': 'Dec 6 12:06:38 hqnl0246134 sshd[210614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.236.228.138 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0459 seconds
INFO [2022-12-06 12:06:40,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.236.228.138', 'timestamp': 1670321200.473374, 'message': 'Dec 6 12:06:39 hqnl0246134 sshd[210614]: Failed password for invalid user teamspeak3 from 185.236.228.138 port 38868 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0618 seconds
INFO [2022-12-06 12:06:40,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.236.228.138', 'timestamp': 1670321200.4735115, 'message': 'Dec 6 12:06:40 hqnl0246134 sshd[210614]: Disconnected from invalid user teamspeak3 185.236.228.138 port 38868 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0502 seconds
WARNING [2022-12-06 12:06:45,547] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:06:45,548] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:06:46,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321206.4779336, 'message': 'Dec 6 12:06:44 hqnl0246134 sshd[210620]: Invalid user f from 52.183.128.237 port 49104', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 12:06:46,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321206.4781618, 'message': 'Dec 6 12:06:44 hqnl0246134 sshd[210620]: pam_imunify(sshd:auth): [IM360_RBL] The IP 52.183.128.237 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 12:06:46,534] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321206.4783049, 'message': 'Dec 6 12:06:44 hqnl0246134 sshd[210620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.183.128.237 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 12:06:48,512] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321208.4804611, 'message': 'Dec 6 12:06:46 hqnl0246134 sshd[210620]: Failed password for invalid user f from 52.183.128.237 port 49104 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 12:06:48,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321208.480826, 'message': 'Dec 6 12:06:47 hqnl0246134 sshd[210620]: Disconnected from invalid user f 52.183.128.237 port 49104 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0305 seconds
WARNING [2022-12-06 12:06:53,985] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:06:54,014] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0404 seconds
INFO [2022-12-06 12:06:54,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321214.4962926, 'message': 'Dec 6 12:06:52 hqnl0246134 sshd[210631]: Invalid user svnroot from 34.64.76.187 port 48030', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 12:06:54,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321214.4966145, 'message': 'Dec 6 12:06:53 hqnl0246134 sshd[210631]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.64.76.187 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 12:06:54,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321214.4968638, 'message': 'Dec 6 12:06:53 hqnl0246134 sshd[210631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.64.76.187 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 12:06:56,524] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321216.4993124, 'message': 'Dec 6 12:06:55 hqnl0246134 sshd[210631]: Failed password for invalid user svnroot from 34.64.76.187 port 48030 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 12:06:56,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321216.4995918, 'message': 'Dec 6 12:06:55 hqnl0246134 sshd[210631]: Disconnected from invalid user svnroot 34.64.76.187 port 48030 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 12:07:17,744] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:07:17,745] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:07:17,754] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:07:17,767] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
INFO [2022-12-06 12:07:20,288] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:07:20,288] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:07:20,297] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:07:20,310] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-06 12:07:40,580] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670321260.555865, 'message': 'Dec 6 12:07:39 hqnl0246134 sshd[210673]: Accepted password for supportwwwuser from 212.58.119.251 port 10735 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0235 seconds
WARNING [2022-12-06 12:07:45,551] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:07:45,552] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:07:53,984] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:07:54,005] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0286 seconds
INFO [2022-12-06 12:08:08,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321288.58701, 'message': 'Dec 6 12:08:06 hqnl0246134 sshd[210724]: pam_imunify(sshd:auth): [IM360_RBL] The IP 67.198.205.72 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 12:08:08,629] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321288.5874038, 'message': 'Dec 6 12:08:06 hqnl0246134 sshd[210724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.198.205.72 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:08:10,625] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321290.5894442, 'message': 'Dec 6 12:08:09 hqnl0246134 sshd[210724]: Failed password for root from 67.198.205.72 port 40810 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 12:08:12,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321292.5902772, 'message': 'Dec 6 12:08:11 hqnl0246134 sshd[210735]: pam_imunify(sshd:auth): [IM360_RBL] The IP 107.172.219.107 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 12:08:12,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321292.5905488, 'message': 'Dec 6 12:08:11 hqnl0246134 sshd[210735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.219.107 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 12:08:13,788] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:08:13,789] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:08:13,796] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:08:13,806] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0166 seconds
INFO [2022-12-06 12:08:14,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321294.5964468, 'message': 'Dec 6 12:08:13 hqnl0246134 sshd[210735]: Failed password for root from 107.172.219.107 port 49338 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 12:08:17,648] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:08:17,648] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:08:17,656] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:08:17,668] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 12:08:18,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321298.6068237, 'message': 'Dec 6 12:08:17 hqnl0246134 sshd[210745]: Invalid user sarah from 159.65.128.16 port 57656', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 12:08:18,660] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321298.6070375, 'message': 'Dec 6 12:08:17 hqnl0246134 sshd[210745]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.65.128.16 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 12:08:18,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321298.607151, 'message': 'Dec 6 12:08:17 hqnl0246134 sshd[210745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.128.16 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 12:08:20,254] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:08:20,254] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:08:20,263] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:08:20,277] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 12:08:20,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321300.6097734, 'message': 'Dec 6 12:08:19 hqnl0246134 sshd[210745]: Failed password for invalid user sarah from 159.65.128.16 port 57656 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 12:08:22,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321302.6123672, 'message': 'Dec 6 12:08:21 hqnl0246134 sshd[210745]: Disconnected from invalid user sarah 159.65.128.16 port 57656 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 12:08:38,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321318.6306424, 'message': 'Dec 6 12:08:37 hqnl0246134 sshd[210765]: pam_imunify(sshd:auth): [IM360_RBL] The IP 77.82.90.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 12:08:38,696] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321318.6311324, 'message': 'Dec 6 12:08:37 hqnl0246134 sshd[210765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.82.90.210 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 12:08:40,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321320.632355, 'message': 'Dec 6 12:08:40 hqnl0246134 sshd[210765]: Failed password for root from 77.82.90.210 port 55386 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0233 seconds
WARNING [2022-12-06 12:08:45,555] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:08:45,556] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:08:50,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670321330.6425633, 'message': 'Dec 6 12:08:50 hqnl0246134 sshd[210771]: Invalid user support from 152.89.196.123 port 34586', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 12:08:52,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.123', 'timestamp': 1670321332.6481698, 'message': 'Dec 6 12:08:50 hqnl0246134 sshd[210771]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.123 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 12:08:52,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.123', 'timestamp': 1670321332.6485555, 'message': 'Dec 6 12:08:50 hqnl0246134 sshd[210771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.123 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 12:08:52,708] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670321332.6487646, 'message': 'Dec 6 12:08:52 hqnl0246134 sshd[210771]: Failed password for invalid user support from 152.89.196.123 port 34586 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 12:08:52,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670321332.6502833, 'message': 'Dec 6 12:08:52 hqnl0246134 sshd[210771]: Disconnected from invalid user support 152.89.196.123 port 34586 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 12:08:53,991] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:08:54,027] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0483 seconds
INFO [2022-12-06 12:08:54,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321334.6506965, 'message': 'Dec 6 12:08:52 hqnl0246134 sshd[210774]: Invalid user paula from 20.40.81.0 port 35510', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 12:08:54,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321334.6510074, 'message': 'Dec 6 12:08:53 hqnl0246134 sshd[210774]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.40.81.0 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 12:08:54,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321334.651166, 'message': 'Dec 6 12:08:53 hqnl0246134 sshd[210774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.40.81.0 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 12:08:56,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321336.652712, 'message': 'Dec 6 12:08:55 hqnl0246134 sshd[210774]: Failed password for invalid user paula from 20.40.81.0 port 35510 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 12:08:56,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321336.652955, 'message': 'Dec 6 12:08:56 hqnl0246134 sshd[210774]: Disconnected from invalid user paula 20.40.81.0 port 35510 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 12:09:12,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321352.6720083, 'message': 'Dec 6 12:09:11 hqnl0246134 sshd[210923]: Invalid user archive from 51.75.17.210 port 58776', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 12:09:12,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321352.6728399, 'message': 'Dec 6 12:09:12 hqnl0246134 sshd[210923]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.75.17.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 12:09:12,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321352.675133, 'message': 'Dec 6 12:09:12 hqnl0246134 sshd[210923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.17.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 12:09:14,693] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321354.674193, 'message': 'Dec 6 12:09:14 hqnl0246134 sshd[210923]: Failed password for invalid user archive from 51.75.17.210 port 58776 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 12:09:16,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321356.6770496, 'message': 'Dec 6 12:09:15 hqnl0246134 sshd[210923]: Disconnected from invalid user archive 51.75.17.210 port 58776 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0687 seconds
INFO [2022-12-06 12:09:16,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321356.6773684, 'message': 'Dec 6 12:09:15 hqnl0246134 sshd[210930]: Invalid user temp1 from 185.246.130.69 port 49428', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0687 seconds
INFO [2022-12-06 12:09:16,783] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321356.6776278, 'message': 'Dec 6 12:09:15 hqnl0246134 sshd[210930]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.246.130.69 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 12:09:16,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321356.6778343, 'message': 'Dec 6 12:09:15 hqnl0246134 sshd[210930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.130.69 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 12:09:18,404] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:09:18,405] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:09:18,412] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:09:18,423] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 12:09:18,581] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:09:18,581] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:09:18,596] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:09:18,617] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0343 seconds
INFO [2022-12-06 12:09:18,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321358.6789317, 'message': 'Dec 6 12:09:17 hqnl0246134 sshd[210930]: Failed password for invalid user temp1 from 185.246.130.69 port 49428 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 12:09:18,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '212.58.119.251', 'timestamp': 1670321358.6792789, 'message': 'Dec 6 12:09:18 hqnl0246134 sshd[210912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.58.119.251 user=supportwwwuser', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 12:09:18,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.246.130.69', 'timestamp': 1670321358.6791224, 'message': 'Dec 6 12:09:17 hqnl0246134 sshd[210930]: Disconnected from invalid user temp1 185.246.130.69 port 49428 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 12:09:22,497] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:09:22,497] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:09:22,552] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:09:22,580] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0770 seconds
INFO [2022-12-06 12:09:22,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '212.58.119.251', 'timestamp': 1670321362.6815412, 'message': 'Dec 6 12:09:20 hqnl0246134 sshd[210912]: Failed password for supportwwwuser from 212.58.119.251 port 10524 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 12:09:24,702] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321364.6846447, 'message': 'Dec 6 12:09:24 hqnl0246134 sshd[210952]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.64.76.187 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 12:09:24,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321364.6850154, 'message': 'Dec 6 12:09:24 hqnl0246134 sshd[210952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.64.76.187 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 12:09:26,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321366.6857073, 'message': 'Dec 6 12:09:26 hqnl0246134 sshd[210952]: Failed password for root from 34.64.76.187 port 55630 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 12:09:32,721] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670321372.7008624, 'message': 'Dec 6 12:09:31 hqnl0246134 sshd[210960]: Accepted password for supportwwwuser from 212.58.119.251 port 10553 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0198 seconds
WARNING [2022-12-06 12:09:45,560] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:09:45,561] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:09:53,998] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:09:54,033] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0473 seconds
INFO [2022-12-06 12:09:56,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321396.7459605, 'message': 'Dec 6 12:09:54 hqnl0246134 sshd[211007]: Invalid user user1 from 52.183.128.237 port 39160', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 12:09:56,786] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321396.7463083, 'message': 'Dec 6 12:09:54 hqnl0246134 sshd[211007]: pam_imunify(sshd:auth): [IM360_RBL] The IP 52.183.128.237 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 12:09:56,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321396.746492, 'message': 'Dec 6 12:09:54 hqnl0246134 sshd[211007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.183.128.237 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 12:09:58,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321398.7487583, 'message': 'Dec 6 12:09:57 hqnl0246134 sshd[211007]: Failed password for invalid user user1 from 52.183.128.237 port 39160 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 12:10:00,782] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321400.75644, 'message': 'Dec 6 12:09:59 hqnl0246134 sshd[211007]: Disconnected from invalid user user1 52.183.128.237 port 39160 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 12:10:11,116] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 12:10:11,190] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 12:10:11,191] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 12:10:11,191] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 12:10:11,191] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 12:10:11,192] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 12:10:11,239] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 12:10:11,282] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0882 seconds
WARNING [2022-12-06 12:10:11,292] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 12:10:11,295] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:10:11,319] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0471 seconds
INFO [2022-12-06 12:10:11,321] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0434 seconds
INFO [2022-12-06 12:10:17,845] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:10:17,846] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:10:17,854] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:10:17,865] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 12:10:20,556] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:10:20,557] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:10:20,565] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:10:20,577] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 12:10:40,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321440.8161533, 'message': 'Dec 6 12:10:38 hqnl0246134 sshd[211092]: Invalid user mosquitto from 194.204.194.11 port 55796', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 12:10:40,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321440.8167448, 'message': 'Dec 6 12:10:38 hqnl0246134 sshd[211092]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.204.194.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 12:10:40,888] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321440.8170142, 'message': 'Dec 6 12:10:38 hqnl0246134 sshd[211092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 12:10:41,420] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 12:10:41,420] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 12:10:41,421] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 12:10:42,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321442.817419, 'message': 'Dec 6 12:10:41 hqnl0246134 sshd[211092]: Failed password for invalid user mosquitto from 194.204.194.11 port 55796 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 12:10:44,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321444.8201623, 'message': 'Dec 6 12:10:43 hqnl0246134 sshd[211092]: Disconnected from invalid user mosquitto 194.204.194.11 port 55796 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
WARNING [2022-12-06 12:10:45,565] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:10:45,566] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:10:45,815] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:10:45,815] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:10:45,823] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:10:45,836] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
WARNING [2022-12-06 12:10:53,998] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:10:54,021] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0313 seconds
INFO [2022-12-06 12:11:02,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321462.847272, 'message': 'Dec 6 12:11:02 hqnl0246134 sshd[211103]: Invalid user ca from 67.198.205.72 port 60120', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 12:11:02,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321462.8476882, 'message': 'Dec 6 12:11:02 hqnl0246134 sshd[211103]: pam_imunify(sshd:auth): [IM360_RBL] The IP 67.198.205.72 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 12:11:02,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321462.8478262, 'message': 'Dec 6 12:11:02 hqnl0246134 sshd[211103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.198.205.72 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 12:11:04,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321464.8487377, 'message': 'Dec 6 12:11:04 hqnl0246134 sshd[211103]: Failed password for invalid user ca from 67.198.205.72 port 60120 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 12:11:06,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.198.205.72', 'timestamp': 1670321466.849841, 'message': 'Dec 6 12:11:05 hqnl0246134 sshd[211103]: Disconnected from invalid user ca 67.198.205.72 port 60120 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 12:11:17,999] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:11:18,000] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:11:18,009] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:11:18,022] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0211 seconds
INFO [2022-12-06 12:11:20,879] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:11:20,880] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:11:20,886] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:11:20,897] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 12:11:22,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321482.8805249, 'message': 'Dec 6 12:11:21 hqnl0246134 sshd[211131]: Invalid user ca from 107.172.219.107 port 37050', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 12:11:22,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321482.8807595, 'message': 'Dec 6 12:11:21 hqnl0246134 sshd[211131]: pam_imunify(sshd:auth): [IM360_RBL] The IP 107.172.219.107 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 12:11:22,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321482.8809264, 'message': 'Dec 6 12:11:21 hqnl0246134 sshd[211131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.219.107 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 12:11:24,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321484.8811662, 'message': 'Dec 6 12:11:23 hqnl0246134 sshd[211131]: Failed password for invalid user ca from 107.172.219.107 port 37050 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 12:11:24,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.172.219.107', 'timestamp': 1670321484.8814385, 'message': 'Dec 6 12:11:24 hqnl0246134 sshd[211131]: Disconnected from invalid user ca 107.172.219.107 port 37050 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 12:11:26,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321486.8817034, 'message': 'Dec 6 12:11:26 hqnl0246134 sshd[211136]: Invalid user ts3server from 27.118.22.221 port 49472', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 12:11:26,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321486.8819256, 'message': 'Dec 6 12:11:26 hqnl0246134 sshd[211136]: pam_imunify(sshd:auth): [IM360_RBL] The IP 27.118.22.221 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 12:11:26,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321486.8821044, 'message': 'Dec 6 12:11:26 hqnl0246134 sshd[211136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.118.22.221 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 12:11:28,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321488.8842633, 'message': 'Dec 6 12:11:28 hqnl0246134 sshd[211136]: Failed password for invalid user ts3server from 27.118.22.221 port 49472 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 12:11:30,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321490.8887799, 'message': 'Dec 6 12:11:30 hqnl0246134 sshd[211136]: Disconnected from invalid user ts3server 27.118.22.221 port 49472 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 12:11:32,918] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321492.8909726, 'message': 'Dec 6 12:11:32 hqnl0246134 sshd[211140]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.65.128.16 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 12:11:32,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321492.8914044, 'message': 'Dec 6 12:11:32 hqnl0246134 sshd[211140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.128.16 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 12:11:34,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '159.65.128.16', 'timestamp': 1670321494.8937957, 'message': 'Dec 6 12:11:34 hqnl0246134 sshd[211140]: Failed password for root from 159.65.128.16 port 46892 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
WARNING [2022-12-06 12:11:45,569] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:11:45,570] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:11:50,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321510.913027, 'message': 'Dec 6 12:11:49 hqnl0246134 sshd[211151]: Invalid user administrator from 34.64.76.187 port 35024', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0695 seconds
INFO [2022-12-06 12:11:50,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321510.9141502, 'message': 'Dec 6 12:11:49 hqnl0246134 sshd[211154]: Invalid user oratest from 77.82.90.210 port 45408', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0627 seconds
INFO [2022-12-06 12:11:51,018] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321510.913684, 'message': 'Dec 6 12:11:49 hqnl0246134 sshd[211151]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.64.76.187 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 12:11:51,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321510.9143946, 'message': 'Dec 6 12:11:49 hqnl0246134 sshd[211154]: pam_imunify(sshd:auth): [IM360_RBL] The IP 77.82.90.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 12:11:51,058] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321510.913903, 'message': 'Dec 6 12:11:49 hqnl0246134 sshd[211151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.64.76.187 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0387 seconds
INFO [2022-12-06 12:11:51,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321510.9146588, 'message': 'Dec 6 12:11:49 hqnl0246134 sshd[211154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.82.90.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 12:11:52,967] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321512.9152923, 'message': 'Dec 6 12:11:51 hqnl0246134 sshd[211151]: Failed password for invalid user administrator from 34.64.76.187 port 35024 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0507 seconds
INFO [2022-12-06 12:11:52,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321512.915809, 'message': 'Dec 6 12:11:51 hqnl0246134 sshd[211154]: Failed password for invalid user oratest from 77.82.90.210 port 45408 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0514 seconds
WARNING [2022-12-06 12:11:53,246] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 12:11:54,001] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:11:54,035] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0424 seconds
INFO [2022-12-06 12:11:54,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321514.9190106, 'message': 'Dec 6 12:11:53 hqnl0246134 sshd[211154]: Disconnected from invalid user oratest 77.82.90.210 port 45408 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 12:11:54,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.64.76.187', 'timestamp': 1670321514.9193957, 'message': 'Dec 6 12:11:53 hqnl0246134 sshd[211151]: Disconnected from invalid user administrator 34.64.76.187 port 35024 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 12:12:04,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321524.9272995, 'message': 'Dec 6 12:12:03 hqnl0246134 sshd[211177]: Invalid user eoffice from 20.40.81.0 port 38226', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 12:12:04,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321524.9275858, 'message': 'Dec 6 12:12:03 hqnl0246134 sshd[211177]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.40.81.0 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 12:12:04,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321524.9277508, 'message': 'Dec 6 12:12:03 hqnl0246134 sshd[211177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.40.81.0 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 12:12:06,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321526.9313016, 'message': 'Dec 6 12:12:05 hqnl0246134 sshd[211177]: Failed password for invalid user eoffice from 20.40.81.0 port 38226 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 12:12:06,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321526.931721, 'message': 'Dec 6 12:12:06 hqnl0246134 sshd[211179]: Invalid user umcapasocanoas from 51.75.17.210 port 49348', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-06 12:12:07,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321526.932368, 'message': 'Dec 6 12:12:06 hqnl0246134 sshd[211177]: Disconnected from invalid user eoffice 20.40.81.0 port 38226 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 12:12:07,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321526.9319174, 'message': 'Dec 6 12:12:06 hqnl0246134 sshd[211179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.75.17.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 12:12:07,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321526.9321926, 'message': 'Dec 6 12:12:06 hqnl0246134 sshd[211179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.17.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 12:12:08,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321528.9310188, 'message': 'Dec 6 12:12:08 hqnl0246134 sshd[211179]: Failed password for invalid user umcapasocanoas from 51.75.17.210 port 49348 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0585 seconds
INFO [2022-12-06 12:12:09,035] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321528.9317782, 'message': 'Dec 6 12:12:08 hqnl0246134 sshd[211179]: Disconnected from invalid user umcapasocanoas 51.75.17.210 port 49348 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0403 seconds
INFO [2022-12-06 12:12:09,861] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:12:09,862] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:12:09,874] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:12:09,893] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0296 seconds
INFO [2022-12-06 12:12:18,437] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:12:18,438] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:12:18,447] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:12:18,458] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 12:12:21,436] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:12:21,437] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:12:21,447] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:12:21,459] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
WARNING [2022-12-06 12:12:45,574] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:12:45,578] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:12:54,013] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:12:54,057] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0587 seconds
INFO [2022-12-06 12:13:03,033] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 12:13:03,045] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:13:03,059] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0225 seconds
INFO [2022-12-06 12:13:13,076] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321593.0346074, 'message': 'Dec 6 12:13:12 hqnl0246134 sshd[211248]: Invalid user ami from 52.183.128.237 port 57644', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 12:13:15,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321595.0298288, 'message': 'Dec 6 12:13:13 hqnl0246134 sshd[211248]: pam_imunify(sshd:auth): [IM360_RBL] The IP 52.183.128.237 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 12:13:15,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321595.0303705, 'message': 'Dec 6 12:13:13 hqnl0246134 sshd[211248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.183.128.237 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 12:13:17,060] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321597.0311146, 'message': 'Dec 6 12:13:15 hqnl0246134 sshd[211248]: Failed password for invalid user ami from 52.183.128.237 port 57644 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 12:13:17,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.183.128.237', 'timestamp': 1670321597.0315251, 'message': 'Dec 6 12:13:16 hqnl0246134 sshd[211248]: Disconnected from invalid user ami 52.183.128.237 port 57644 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0511 seconds
INFO [2022-12-06 12:13:19,061] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:13:19,067] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:13:19,075] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:13:19,087] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 12:13:20,238] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:13:20,238] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:13:20,258] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:13:20,269] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0164 seconds
INFO [2022-12-06 12:13:22,462] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:13:22,463] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:13:22,476] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:13:22,514] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0487 seconds
INFO [2022-12-06 12:13:25,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321605.047327, 'message': 'Dec 6 12:13:23 hqnl0246134 sshd[211266]: Invalid user l4d2server from 194.204.194.11 port 45338', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 12:13:25,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321605.0479312, 'message': 'Dec 6 12:13:23 hqnl0246134 sshd[211266]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.204.194.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 12:13:25,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321605.0504942, 'message': 'Dec 6 12:13:23 hqnl0246134 sshd[211266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 12:13:27,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321607.043899, 'message': 'Dec 6 12:13:25 hqnl0246134 sshd[211266]: Failed password for invalid user l4d2server from 194.204.194.11 port 45338 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0559 seconds
INFO [2022-12-06 12:13:29,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321609.043174, 'message': 'Dec 6 12:13:27 hqnl0246134 sshd[211266]: Disconnected from invalid user l4d2server 194.204.194.11 port 45338 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0505 seconds
WARNING [2022-12-06 12:13:45,582] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:13:45,584] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:13:54,015] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:13:54,046] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0429 seconds
INFO [2022-12-06 12:14:18,603] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:14:18,605] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:14:18,614] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:14:18,628] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-06 12:14:21,608] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:14:21,609] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:14:21,649] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:14:21,687] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0725 seconds
INFO [2022-12-06 12:14:39,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670321679.094766, 'message': 'Dec 6 12:14:37 hqnl0246134 sshd[211316]: Accepted password for supportwwwuser from 212.58.119.251 port 10581 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 12:14:43,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670321683.1009562, 'message': 'Dec 6 12:14:41 hqnl0246134 sshd[211362]: Accepted password for supportwwwuser from 212.58.119.251 port 10583 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 12:14:45,589] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:14:45,589] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:14:54,023] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:14:54,068] defence360agent.internals.the_sink: SensorIncidentList(<1 item(s)>) processed in 0.0622 seconds
INFO [2022-12-06 12:14:55,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321695.1164746, 'message': 'Dec 6 12:14:53 hqnl0246134 sshd[211401]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.75.17.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0701 seconds
INFO [2022-12-06 12:14:55,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321695.1218977, 'message': 'Dec 6 12:14:53 hqnl0246134 sshd[211401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.17.210 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0739 seconds
INFO [2022-12-06 12:14:57,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.75.17.210', 'timestamp': 1670321697.1182213, 'message': 'Dec 6 12:14:55 hqnl0246134 sshd[211401]: Failed password for root from 51.75.17.210 port 39940 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 12:14:57,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321697.1185467, 'message': 'Dec 6 12:14:56 hqnl0246134 sshd[211405]: Invalid user eoffice from 27.118.22.221 port 39472', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 12:14:57,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321697.1190476, 'message': 'Dec 6 12:14:56 hqnl0246134 sshd[211405]: pam_imunify(sshd:auth): [IM360_RBL] The IP 27.118.22.221 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 12:14:57,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321697.1192026, 'message': 'Dec 6 12:14:56 hqnl0246134 sshd[211405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.118.22.221 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 12:14:59,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321699.1209319, 'message': 'Dec 6 12:14:58 hqnl0246134 sshd[211405]: Failed password for invalid user eoffice from 27.118.22.221 port 39472 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 12:14:59,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321699.1213555, 'message': 'Dec 6 12:14:59 hqnl0246134 sshd[211405]: Disconnected from invalid user eoffice 27.118.22.221 port 39472 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 12:15:00,137] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:15:00,138] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:15:00,145] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:15:00,157] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 12:15:07,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321707.1281865, 'message': 'Dec 6 12:15:05 hqnl0246134 sshd[211432]: pam_imunify(sshd:auth): [IM360_RBL] The IP 77.82.90.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 12:15:07,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321707.128479, 'message': 'Dec 6 12:15:05 hqnl0246134 sshd[211432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.82.90.210 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 12:15:09,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '77.82.90.210', 'timestamp': 1670321709.1300855, 'message': 'Dec 6 12:15:07 hqnl0246134 sshd[211432]: Failed password for root from 77.82.90.210 port 35450 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 12:15:13,157] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321713.1366878, 'message': 'Dec 6 12:15:12 hqnl0246134 sshd[211447]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 12:15:13,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321713.137037, 'message': 'Dec 6 12:15:12 hqnl0246134 sshd[211447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 12:15:17,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321717.143299, 'message': 'Dec 6 12:15:15 hqnl0246134 sshd[211447]: Failed password for root from 61.177.173.49 port 48862 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0811 seconds
INFO [2022-12-06 12:15:17,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321717.1436052, 'message': 'Dec 6 12:15:17 hqnl0246134 sshd[211447]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0588 seconds
INFO [2022-12-06 12:15:19,078] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:15:19,078] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:15:19,087] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:15:19,098] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 12:15:19,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321719.1457682, 'message': 'Dec 6 12:15:18 hqnl0246134 sshd[211447]: Failed password for root from 61.177.173.49 port 48862 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 12:15:21,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321721.1495416, 'message': 'Dec 6 12:15:19 hqnl0246134 sshd[211447]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 12:15:21,704] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:15:21,704] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:15:21,711] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:15:21,722] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 12:15:23,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321723.1536086, 'message': 'Dec 6 12:15:21 hqnl0246134 sshd[211447]: Failed password for root from 61.177.173.49 port 48862 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 12:15:27,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321727.1611862, 'message': 'Dec 6 12:15:25 hqnl0246134 sshd[211469]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 12:15:27,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321727.1614292, 'message': 'Dec 6 12:15:25 hqnl0246134 sshd[211469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 12:15:29,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321729.1661785, 'message': 'Dec 6 12:15:27 hqnl0246134 sshd[211469]: Failed password for root from 61.177.173.49 port 48352 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 12:15:29,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321729.1664412, 'message': 'Dec 6 12:15:27 hqnl0246134 sshd[211471]: Invalid user ts3server from 20.40.81.0 port 40796', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 12:15:29,211] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321729.166602, 'message': 'Dec 6 12:15:27 hqnl0246134 sshd[211471]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.40.81.0 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0161 seconds
INFO [2022-12-06 12:15:29,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321729.1667216, 'message': 'Dec 6 12:15:27 hqnl0246134 sshd[211471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.40.81.0 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 12:15:31,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321731.1685023, 'message': 'Dec 6 12:15:29 hqnl0246134 sshd[211469]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 12:15:31,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321731.1688871, 'message': 'Dec 6 12:15:29 hqnl0246134 sshd[211471]: Failed password for invalid user ts3server from 20.40.81.0 port 40796 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 12:15:33,294] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670321733.1699648, 'message': 'Dec 6 12:15:31 hqnl0246134 sshd[211471]: Disconnected from invalid user ts3server 20.40.81.0 port 40796 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1236 seconds
INFO [2022-12-06 12:15:33,295] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321733.1702638, 'message': 'Dec 6 12:15:31 hqnl0246134 sshd[211469]: Failed password for root from 61.177.173.49 port 48352 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1234 seconds
INFO [2022-12-06 12:15:33,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321733.1704168, 'message': 'Dec 6 12:15:32 hqnl0246134 sshd[211469]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 12:15:35,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670321735.1733384, 'message': 'Dec 6 12:15:33 hqnl0246134 sshd[211469]: Failed password for root from 61.177.173.49 port 48352 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0257 seconds
WARNING [2022-12-06 12:15:45,593] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:15:45,594] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:15:54,022] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:15:54,290] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.2790 seconds
INFO [2022-12-06 12:15:57,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321757.2047322, 'message': 'Dec 6 12:15:55 hqnl0246134 sshd[211486]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 12:15:57,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321757.2050664, 'message': 'Dec 6 12:15:55 hqnl0246134 sshd[211486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 12:15:59,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321759.2056353, 'message': 'Dec 6 12:15:57 hqnl0246134 sshd[211486]: Failed password for root from 61.177.173.36 port 42962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:16:01,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321761.2083166, 'message': 'Dec 6 12:15:59 hqnl0246134 sshd[211486]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 12:16:03,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321763.211498, 'message': 'Dec 6 12:16:01 hqnl0246134 sshd[211486]: Failed password for root from 61.177.173.36 port 42962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 12:16:05,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321765.2145221, 'message': 'Dec 6 12:16:03 hqnl0246134 sshd[211486]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 12:16:05,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321765.2147415, 'message': 'Dec 6 12:16:05 hqnl0246134 sshd[211486]: Failed password for root from 61.177.173.36 port 42962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 12:16:08,789] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:16:08,790] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:16:08,799] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:16:08,812] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
INFO [2022-12-06 12:16:09,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321769.2180915, 'message': 'Dec 6 12:16:07 hqnl0246134 sshd[211500]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0561 seconds
INFO [2022-12-06 12:16:09,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '187.234.72.37', 'timestamp': 1670321769.2184448, 'message': 'Dec 6 12:16:08 hqnl0246134 sshd[211502]: Invalid user kafka from 187.234.72.37 port 57190', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0574 seconds
INFO [2022-12-06 12:16:09,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321769.218312, 'message': 'Dec 6 12:16:07 hqnl0246134 sshd[211500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0378 seconds
INFO [2022-12-06 12:16:09,314] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '187.234.72.37', 'timestamp': 1670321769.218569, 'message': 'Dec 6 12:16:08 hqnl0246134 sshd[211502]: pam_imunify(sshd:auth): [IM360_RBL] The IP 187.234.72.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 12:16:09,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '187.234.72.37', 'timestamp': 1670321769.2189307, 'message': 'Dec 6 12:16:08 hqnl0246134 sshd[211502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.234.72.37 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0162 seconds
INFO [2022-12-06 12:16:11,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '187.234.72.37', 'timestamp': 1670321771.2202744, 'message': 'Dec 6 12:16:10 hqnl0246134 sshd[211502]: Failed password for invalid user kafka from 187.234.72.37 port 57190 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 12:16:11,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321771.2205195, 'message': 'Dec 6 12:16:10 hqnl0246134 sshd[211500]: Failed password for root from 61.177.173.36 port 37468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 12:16:11,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '187.234.72.37', 'timestamp': 1670321771.2206337, 'message': 'Dec 6 12:16:10 hqnl0246134 sshd[211502]: Disconnected from invalid user kafka 187.234.72.37 port 57190 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:16:13,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321773.2216456, 'message': 'Dec 6 12:16:12 hqnl0246134 sshd[211500]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 12:16:13,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321773.2218227, 'message': 'Dec 6 12:16:12 hqnl0246134 sshd[211516]: Invalid user allen from 194.204.194.11 port 34896', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 12:16:13,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321773.2222416, 'message': 'Dec 6 12:16:12 hqnl0246134 sshd[211516]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.204.194.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 12:16:13,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321773.2223513, 'message': 'Dec 6 12:16:12 hqnl0246134 sshd[211516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 12:16:15,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321775.224124, 'message': 'Dec 6 12:16:14 hqnl0246134 sshd[211500]: Failed password for root from 61.177.173.36 port 37468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 12:16:15,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321775.2243502, 'message': 'Dec 6 12:16:15 hqnl0246134 sshd[211516]: Failed password for invalid user allen from 194.204.194.11 port 34896 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 12:16:17,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670321777.2262485, 'message': 'Dec 6 12:16:15 hqnl0246134 sshd[211516]: Disconnected from invalid user allen 194.204.194.11 port 34896 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 12:16:17,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321777.226463, 'message': 'Dec 6 12:16:16 hqnl0246134 sshd[211500]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 12:16:17,953] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:16:17,953] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:16:17,960] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:16:17,970] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 12:16:19,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321779.2287986, 'message': 'Dec 6 12:16:18 hqnl0246134 sshd[211500]: Failed password for root from 61.177.173.36 port 37468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 12:16:20,567] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:16:20,568] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:16:20,576] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:16:20,589] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 12:16:21,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321781.2319663, 'message': 'Dec 6 12:16:20 hqnl0246134 sshd[211526]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 12:16:21,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321781.232193, 'message': 'Dec 6 12:16:20 hqnl0246134 sshd[211526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 12:16:23,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321783.2342417, 'message': 'Dec 6 12:16:22 hqnl0246134 sshd[211526]: Failed password for root from 61.177.173.36 port 24902 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 12:16:23,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321783.2344215, 'message': 'Dec 6 12:16:22 hqnl0246134 sshd[211526]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 12:16:25,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321785.2368667, 'message': 'Dec 6 12:16:24 hqnl0246134 sshd[211526]: Failed password for root from 61.177.173.36 port 24902 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 12:16:25,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321785.2371874, 'message': 'Dec 6 12:16:25 hqnl0246134 sshd[211526]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 12:16:27,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670321787.23763, 'message': 'Dec 6 12:16:27 hqnl0246134 sshd[211526]: Failed password for root from 61.177.173.36 port 24902 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 12:16:35,022] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 12:16:35,093] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 12:16:35,093] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 12:16:35,094] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 12:16:35,094] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 12:16:35,094] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 12:16:35,106] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 12:16:35,123] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0286 seconds
WARNING [2022-12-06 12:16:35,129] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 12:16:35,131] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:16:35,149] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0318 seconds
INFO [2022-12-06 12:16:35,150] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0291 seconds
INFO [2022-12-06 12:16:43,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321803.2553277, 'message': 'Dec 6 12:16:41 hqnl0246134 sshd[211541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 12:16:43,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321803.2562451, 'message': 'Dec 6 12:16:41 hqnl0246134 sshd[211541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 12:16:45,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321805.255697, 'message': 'Dec 6 12:16:43 hqnl0246134 sshd[211541]: Failed password for root from 61.177.172.98 port 29586 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
WARNING [2022-12-06 12:16:45,598] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:16:45,599] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:16:47,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321807.2584453, 'message': 'Dec 6 12:16:45 hqnl0246134 sshd[211541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:16:49,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321809.2622502, 'message': 'Dec 6 12:16:47 hqnl0246134 sshd[211541]: Failed password for root from 61.177.172.98 port 29586 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 12:16:49,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321809.262591, 'message': 'Dec 6 12:16:48 hqnl0246134 sshd[211541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 12:16:51,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321811.2641387, 'message': 'Dec 6 12:16:50 hqnl0246134 sshd[211541]: Failed password for root from 61.177.172.98 port 29586 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-06 12:16:54,028] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:16:54,071] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0543 seconds
INFO [2022-12-06 12:16:59,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321819.269826, 'message': 'Dec 6 12:16:57 hqnl0246134 sshd[211556]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 12:16:59,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321819.2703547, 'message': 'Dec 6 12:16:57 hqnl0246134 sshd[211556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 12:16:59,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321819.2704835, 'message': 'Dec 6 12:16:59 hqnl0246134 sshd[211556]: Failed password for root from 61.177.172.98 port 29240 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 12:17:01,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321821.2706552, 'message': 'Dec 6 12:16:59 hqnl0246134 sshd[211556]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 12:17:03,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321823.2727742, 'message': 'Dec 6 12:17:01 hqnl0246134 sshd[211556]: Failed password for root from 61.177.172.98 port 29240 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 12:17:03,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321823.273137, 'message': 'Dec 6 12:17:02 hqnl0246134 sshd[211556]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 12:17:05,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321825.2768023, 'message': 'Dec 6 12:17:03 hqnl0246134 sshd[211556]: Failed password for root from 61.177.172.98 port 29240 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-06 12:17:07,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321827.2790134, 'message': 'Dec 6 12:17:06 hqnl0246134 sshd[211569]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 12:17:07,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321827.2792187, 'message': 'Dec 6 12:17:06 hqnl0246134 sshd[211569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 12:17:09,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321829.2818408, 'message': 'Dec 6 12:17:08 hqnl0246134 sshd[211569]: Failed password for root from 61.177.172.98 port 33575 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 12:17:10,851] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 12:17:10,852] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 12:17:10,853] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 12:17:11,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321831.2839968, 'message': 'Dec 6 12:17:10 hqnl0246134 sshd[211569]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0487 seconds
INFO [2022-12-06 12:17:13,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321833.2859259, 'message': 'Dec 6 12:17:12 hqnl0246134 sshd[211569]: Failed password for root from 61.177.172.98 port 33575 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 12:17:13,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321833.2861235, 'message': 'Dec 6 12:17:12 hqnl0246134 sshd[211569]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 12:17:15,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321835.3226476, 'message': 'Dec 6 12:17:14 hqnl0246134 sshd[211569]: Failed password for root from 61.177.172.98 port 33575 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 12:17:18,561] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:17:18,561] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:17:18,569] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:17:18,644] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:17:18,645] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:17:18,672] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:17:18,689] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1263 seconds
INFO [2022-12-06 12:17:18,708] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0548 seconds
INFO [2022-12-06 12:17:21,510] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:17:21,510] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:17:21,522] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:17:21,541] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0278 seconds
INFO [2022-12-06 12:17:23,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321843.2941556, 'message': 'Dec 6 12:17:22 hqnl0246134 sshd[211600]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 12:17:23,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321843.2944274, 'message': 'Dec 6 12:17:22 hqnl0246134 sshd[211600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 12:17:25,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321845.2944643, 'message': 'Dec 6 12:17:24 hqnl0246134 sshd[211600]: Failed password for root from 61.177.172.98 port 21955 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0489 seconds
INFO [2022-12-06 12:17:25,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321845.2947512, 'message': 'Dec 6 12:17:24 hqnl0246134 sshd[211600]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 12:17:27,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321847.2948668, 'message': 'Dec 6 12:17:26 hqnl0246134 sshd[211600]: Failed password for root from 61.177.172.98 port 21955 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0446 seconds
INFO [2022-12-06 12:17:27,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321847.2951224, 'message': 'Dec 6 12:17:26 hqnl0246134 sshd[211600]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0585 seconds
INFO [2022-12-06 12:17:29,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670321849.297283, 'message': 'Dec 6 12:17:28 hqnl0246134 sshd[211600]: Failed password for root from 61.177.172.98 port 21955 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 12:17:45,602] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:17:45,603] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:17:54,033] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:17:54,057] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0343 seconds
INFO [2022-12-06 12:18:17,915] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:18:17,916] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:18:17,924] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:18:17,935] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 12:18:20,716] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:18:20,717] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:18:20,724] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:18:20,737] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 12:18:35,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321915.3790545, 'message': 'Dec 6 12:18:33 hqnl0246134 sshd[211659]: Invalid user lzh from 27.118.22.221 port 57692', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 12:18:35,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321915.379289, 'message': 'Dec 6 12:18:33 hqnl0246134 sshd[211659]: pam_imunify(sshd:auth): [IM360_RBL] The IP 27.118.22.221 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 12:18:35,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321915.3794403, 'message': 'Dec 6 12:18:33 hqnl0246134 sshd[211659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.118.22.221 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 12:18:35,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321915.3795464, 'message': 'Dec 6 12:18:35 hqnl0246134 sshd[211659]: Failed password for invalid user lzh from 27.118.22.221 port 57692 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:18:37,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.118.22.221', 'timestamp': 1670321917.3804164, 'message': 'Dec 6 12:18:36 hqnl0246134 sshd[211659]: Disconnected from invalid user lzh 27.118.22.221 port 57692 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 12:18:38,494] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:18:38,495] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:18:38,501] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:18:38,512] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0164 seconds
WARNING [2022-12-06 12:18:45,657] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:18:45,658] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:18:49,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '187.234.72.37', 'timestamp': 1670321929.4012432, 'message': 'Dec 6 12:18:48 hqnl0246134 sshd[211681]: pam_imunify(sshd:auth): [IM360_RBL] The IP 187.234.72.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0423 seconds
INFO [2022-12-06 12:18:49,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '187.234.72.37', 'timestamp': 1670321929.4018645, 'message': 'Dec 6 12:18:48 hqnl0246134 sshd[211681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.234.72.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-06 12:18:51,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '187.234.72.37', 'timestamp': 1670321931.4043136, 'message': 'Dec 6 12:18:50 hqnl0246134 sshd[211681]: Failed password for root from 187.234.72.37 port 64095 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-06 12:18:54,032] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:18:54,058] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0331 seconds
INFO [2022-12-06 12:19:17,932] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:19:17,932] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:19:17,942] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:19:17,955] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-06 12:19:20,556] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:19:20,557] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:19:20,563] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:19:20,575] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
WARNING [2022-12-06 12:19:45,662] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:19:45,663] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:20:17,874] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:20:17,875] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:20:17,884] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:20:17,897] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 12:20:20,496] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:20:20,500] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:20:20,511] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:20:20,529] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0279 seconds
INFO [2022-12-06 12:20:43,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322043.6196797, 'message': 'Dec 6 12:20:43 hqnl0246134 sshd[211818]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 12:20:43,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322043.6201584, 'message': 'Dec 6 12:20:43 hqnl0246134 sshd[211818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 12:20:45,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322045.6219409, 'message': 'Dec 6 12:20:45 hqnl0246134 sshd[211818]: Failed password for root from 61.177.172.104 port 63529 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 12:20:45,665] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:20:45,666] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:20:47,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322047.6239898, 'message': 'Dec 6 12:20:47 hqnl0246134 sshd[211818]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 12:20:49,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322049.6325831, 'message': 'Dec 6 12:20:49 hqnl0246134 sshd[211818]: Failed password for root from 61.177.172.104 port 63529 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 12:20:49,675] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322049.632826, 'message': 'Dec 6 12:20:49 hqnl0246134 sshd[211818]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 12:20:53,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322053.6384668, 'message': 'Dec 6 12:20:52 hqnl0246134 sshd[211818]: Failed password for root from 61.177.172.104 port 63529 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 12:20:54,036] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:20:54,064] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0347 seconds
INFO [2022-12-06 12:20:55,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '187.234.72.37', 'timestamp': 1670322055.6433687, 'message': 'Dec 6 12:20:54 hqnl0246134 sshd[211823]: pam_imunify(sshd:auth): [IM360_RBL] The IP 187.234.72.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 12:20:55,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '187.234.72.37', 'timestamp': 1670322055.643575, 'message': 'Dec 6 12:20:54 hqnl0246134 sshd[211823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.234.72.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 12:20:56,305] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:20:56,305] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:20:56,322] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:20:56,341] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0355 seconds
INFO [2022-12-06 12:20:57,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '187.234.72.37', 'timestamp': 1670322057.6472702, 'message': 'Dec 6 12:20:56 hqnl0246134 sshd[211823]: Failed password for root from 187.234.72.37 port 37866 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0861 seconds
INFO [2022-12-06 12:21:07,677] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322067.6571436, 'message': 'Dec 6 12:21:05 hqnl0246134 sshd[211845]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 12:21:07,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322067.657587, 'message': 'Dec 6 12:21:05 hqnl0246134 sshd[211845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 12:21:09,782] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322069.6767483, 'message': 'Dec 6 12:21:08 hqnl0246134 sshd[211845]: Failed password for root from 61.177.172.104 port 11725 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1037 seconds
INFO [2022-12-06 12:21:11,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322071.6603687, 'message': 'Dec 6 12:21:10 hqnl0246134 sshd[211845]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 12:21:13,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322073.6620913, 'message': 'Dec 6 12:21:12 hqnl0246134 sshd[211845]: Failed password for root from 61.177.172.104 port 11725 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 12:21:15,696] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322075.6644723, 'message': 'Dec 6 12:21:14 hqnl0246134 sshd[211845]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 12:21:17,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322077.6665928, 'message': 'Dec 6 12:21:17 hqnl0246134 sshd[211845]: Failed password for root from 61.177.172.104 port 11725 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 12:21:17,831] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:21:17,832] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:21:17,839] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:21:17,849] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 12:21:21,135] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:21:21,135] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:21:21,142] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:21:21,155] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 12:21:21,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322081.6678805, 'message': 'Dec 6 12:21:20 hqnl0246134 sshd[211868]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:21:21,708] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322081.6680963, 'message': 'Dec 6 12:21:20 hqnl0246134 sshd[211868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 12:21:23,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322083.669854, 'message': 'Dec 6 12:21:23 hqnl0246134 sshd[211868]: Failed password for root from 61.177.172.104 port 62882 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 12:21:25,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322085.6723194, 'message': 'Dec 6 12:21:25 hqnl0246134 sshd[211868]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 12:21:27,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322087.6738107, 'message': 'Dec 6 12:21:27 hqnl0246134 sshd[211868]: Failed password for root from 61.177.172.104 port 62882 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 12:21:29,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322089.6761658, 'message': 'Dec 6 12:21:29 hqnl0246134 sshd[211868]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 12:21:31,696] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322091.6780431, 'message': 'Dec 6 12:21:31 hqnl0246134 sshd[211868]: Failed password for root from 61.177.172.104 port 62882 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 12:21:33,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322093.6797345, 'message': 'Dec 6 12:21:33 hqnl0246134 sshd[211875]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 12:21:33,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322093.680042, 'message': 'Dec 6 12:21:33 hqnl0246134 sshd[211875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 12:21:35,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322095.680981, 'message': 'Dec 6 12:21:35 hqnl0246134 sshd[211875]: Failed password for root from 61.177.172.104 port 51312 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 12:21:35,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322095.6812816, 'message': 'Dec 6 12:21:35 hqnl0246134 sshd[211875]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 12:21:39,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322099.6862447, 'message': 'Dec 6 12:21:37 hqnl0246134 sshd[211875]: Failed password for root from 61.177.172.104 port 51312 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 12:21:41,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322101.6885293, 'message': 'Dec 6 12:21:39 hqnl0246134 sshd[211875]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 12:21:43,722] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322103.690004, 'message': 'Dec 6 12:21:41 hqnl0246134 sshd[211875]: Failed password for root from 61.177.172.104 port 51312 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
WARNING [2022-12-06 12:21:45,672] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:21:45,673] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:21:47,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322107.6938572, 'message': 'Dec 6 12:21:45 hqnl0246134 sshd[211893]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 12:21:47,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322107.6941264, 'message': 'Dec 6 12:21:45 hqnl0246134 sshd[211893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 12:21:49,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322109.7017076, 'message': 'Dec 6 12:21:47 hqnl0246134 sshd[211893]: Failed password for root from 61.177.172.104 port 31554 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 12:21:49,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322109.7022893, 'message': 'Dec 6 12:21:48 hqnl0246134 sshd[211893]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 12:21:51,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322111.703378, 'message': 'Dec 6 12:21:50 hqnl0246134 sshd[211893]: Failed password for root from 61.177.172.104 port 31554 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0328 seconds
WARNING [2022-12-06 12:21:53,248] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 12:21:53,735] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322113.7062848, 'message': 'Dec 6 12:21:52 hqnl0246134 sshd[211893]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
WARNING [2022-12-06 12:21:54,040] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:21:54,063] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0312 seconds
INFO [2022-12-06 12:21:55,782] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670322115.7089107, 'message': 'Dec 6 12:21:54 hqnl0246134 sshd[211873]: Accepted password for supportwwwuser from 212.58.119.251 port 10536 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0728 seconds
INFO [2022-12-06 12:21:55,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670322115.7091718, 'message': 'Dec 6 12:21:54 hqnl0246134 sshd[211893]: Failed password for root from 61.177.172.104 port 31554 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0737 seconds
INFO [2022-12-06 12:21:57,587] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:21:57,588] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:21:57,595] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:21:57,608] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 12:22:01,415] defence360agent.files: Updating all files
INFO [2022-12-06 12:22:01,723] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 12:22:01,723] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 12:22:02,105] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 12:22:02,106] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 12:22:02,438] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 12:22:02,439] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 12:22:02,808] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 12:22:02,809] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 12:22:02,809] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 12:22:03,070] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 10:22:03 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E2D1F0425714A'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 12:22:03,073] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 12:22:03,074] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 12:22:03,544] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 12:22:03,545] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 12:22:03,865] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 12:22:03,865] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 12:22:04,200] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 12:22:04,200] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 12:22:04,623] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 12:22:04,623] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 12:22:05,150] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 12:22:05,153] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 12:22:18,649] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:22:18,652] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:22:18,667] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:22:18,688] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0333 seconds
INFO [2022-12-06 12:22:22,006] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:22:22,007] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:22:22,017] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:22:22,030] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
WARNING [2022-12-06 12:22:45,677] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:22:45,679] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:22:54,058] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:22:54,086] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0448 seconds
INFO [2022-12-06 12:23:05,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '187.234.72.37', 'timestamp': 1670322185.773021, 'message': 'Dec 6 12:23:05 hqnl0246134 sshd[212043]: pam_imunify(sshd:auth): [IM360_RBL] The IP 187.234.72.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 12:23:05,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '187.234.72.37', 'timestamp': 1670322185.773918, 'message': 'Dec 6 12:23:05 hqnl0246134 sshd[212043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.234.72.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 12:23:07,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '187.234.72.37', 'timestamp': 1670322187.7726483, 'message': 'Dec 6 12:23:06 hqnl0246134 sshd[212043]: Failed password for root from 187.234.72.37 port 47929 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 12:23:12,918] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:23:12,920] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:23:12,943] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:23:13,008] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0868 seconds
INFO [2022-12-06 12:23:18,516] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:23:18,517] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:23:18,527] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:23:18,541] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0223 seconds
INFO [2022-12-06 12:23:21,938] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:23:21,938] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:23:21,951] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:23:21,966] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0265 seconds
INFO [2022-12-06 12:23:36,265] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 12:23:36,337] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 12:23:36,338] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 12:23:36,339] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 12:23:36,339] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 12:23:36,339] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 12:23:36,360] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 12:23:36,389] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0480 seconds
WARNING [2022-12-06 12:23:36,400] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 12:23:36,403] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:23:36,424] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0452 seconds
INFO [2022-12-06 12:23:36,426] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0412 seconds
WARNING [2022-12-06 12:23:45,683] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:23:45,685] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:23:54,063] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:23:54,104] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0576 seconds
INFO [2022-12-06 12:24:06,489] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 12:24:06,491] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 12:24:06,492] im360.plugins.client360: Waiting 7 minutes before retry...
INFO [2022-12-06 12:24:18,889] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:24:18,890] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:24:18,907] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:24:18,929] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0370 seconds
INFO [2022-12-06 12:24:22,505] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:24:22,505] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:24:22,514] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:24:22,527] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 12:24:29,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 10100, 'attackers_ip': '188.32.176.34', 'timestamp': 1670322269.8801663, 'message': 'Dec 6 12:24:28 hqnl0246134 sshd[212129]: Accepted publickey for root from 188.32.176.34 port 45640 ssh2: RSA SHA256:M5XvbkooZmQvvjfo3fKHU5lbqUaXL4LET3qhCF0FT28', 'severity': 4, 'name': 'First time user logged in.', 'tag': []}) processed in 0.0323 seconds
WARNING [2022-12-06 12:24:45,688] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:24:45,690] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:24:54,067] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:24:54,103] defence360agent.internals.the_sink: SensorIncidentList(<1 item(s)>) processed in 0.0530 seconds
INFO [2022-12-06 12:25:18,361] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:25:18,362] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:25:18,390] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:25:18,412] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0489 seconds
INFO [2022-12-06 12:25:21,041] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:25:21,041] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:25:21,047] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:25:21,058] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0161 seconds
INFO [2022-12-06 12:25:23,958] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670322323.935924, 'message': 'Dec 6 12:25:22 hqnl0246134 sshd[212263]: Accepted password for supportwwwuser from 212.58.119.251 port 10679 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 12:25:25,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322325.9374597, 'message': 'Dec 6 12:25:24 hqnl0246134 sshd[212297]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 12:25:25,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322325.937742, 'message': 'Dec 6 12:25:24 hqnl0246134 sshd[212297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 12:25:27,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322327.9379618, 'message': 'Dec 6 12:25:26 hqnl0246134 sshd[212297]: Failed password for root from 61.177.173.50 port 47420 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:25:29,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322329.9398928, 'message': 'Dec 6 12:25:28 hqnl0246134 sshd[212297]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 12:25:31,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322331.9418972, 'message': 'Dec 6 12:25:30 hqnl0246134 sshd[212297]: Failed password for root from 61.177.173.50 port 47420 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 12:25:31,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322331.942154, 'message': 'Dec 6 12:25:30 hqnl0246134 sshd[212297]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 12:25:33,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322333.9460413, 'message': 'Dec 6 12:25:32 hqnl0246134 sshd[212297]: Failed password for root from 61.177.173.50 port 47420 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 12:25:37,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322337.95177, 'message': 'Dec 6 12:25:37 hqnl0246134 sshd[212305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 12:25:37,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322337.952039, 'message': 'Dec 6 12:25:37 hqnl0246134 sshd[212305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:25:39,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322339.9543982, 'message': 'Dec 6 12:25:39 hqnl0246134 sshd[212305]: Failed password for root from 61.177.173.50 port 38732 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 12:25:41,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322341.9538934, 'message': 'Dec 6 12:25:41 hqnl0246134 sshd[212305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 12:25:43,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322343.956794, 'message': 'Dec 6 12:25:43 hqnl0246134 sshd[212305]: Failed password for root from 61.177.173.50 port 38732 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-06 12:25:45,695] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:25:45,695] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:25:45,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322345.9576905, 'message': 'Dec 6 12:25:44 hqnl0246134 sshd[212305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 12:25:48,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670322348.01104, 'message': 'Dec 6 12:25:46 hqnl0246134 sshd[212305]: Failed password for root from 61.177.173.50 port 38732 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 12:25:54,059] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:25:54,081] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0284 seconds
INFO [2022-12-06 12:26:18,036] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:26:18,037] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:26:18,181] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:26:18,196] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1572 seconds
INFO [2022-12-06 12:26:20,889] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:26:20,889] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:26:20,904] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:26:20,916] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0255 seconds
WARNING [2022-12-06 12:26:45,699] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:26:45,701] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:27:18,204] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:27:18,205] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:27:18,213] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:27:18,225] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 12:27:20,795] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:27:20,796] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:27:20,803] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:27:20,814] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
WARNING [2022-12-06 12:27:45,703] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:27:45,705] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:28:16,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322496.1644242, 'message': 'Dec 6 12:28:15 hqnl0246134 sshd[212449]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 12:28:16,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322496.1652286, 'message': 'Dec 6 12:28:15 hqnl0246134 sshd[212449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 12:28:17,898] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:28:17,899] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:28:17,909] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:28:17,922] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 12:28:18,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322498.1646214, 'message': 'Dec 6 12:28:17 hqnl0246134 sshd[212449]: Failed password for root from 61.177.173.36 port 32228 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 12:28:20,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322500.1661346, 'message': 'Dec 6 12:28:19 hqnl0246134 sshd[212449]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 12:28:20,889] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:28:20,890] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:28:20,896] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:28:20,908] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-06 12:28:22,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322502.1690452, 'message': 'Dec 6 12:28:22 hqnl0246134 sshd[212449]: Failed password for root from 61.177.173.36 port 32228 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 12:28:24,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322504.1707647, 'message': 'Dec 6 12:28:24 hqnl0246134 sshd[212449]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 12:28:28,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322508.1793833, 'message': 'Dec 6 12:28:26 hqnl0246134 sshd[212449]: Failed password for root from 61.177.173.36 port 32228 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 12:28:30,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322510.1822484, 'message': 'Dec 6 12:28:30 hqnl0246134 sshd[212465]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 12:28:30,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322510.182722, 'message': 'Dec 6 12:28:30 hqnl0246134 sshd[212465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 12:28:31,006] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:28:31,006] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:28:31,015] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:28:31,029] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 12:28:32,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322512.1824021, 'message': 'Dec 6 12:28:32 hqnl0246134 sshd[212465]: Failed password for root from 61.177.173.36 port 39676 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 12:28:34,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322514.184403, 'message': 'Dec 6 12:28:32 hqnl0246134 sshd[212465]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 12:28:36,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322516.1864505, 'message': 'Dec 6 12:28:34 hqnl0246134 sshd[212465]: Failed password for root from 61.177.173.36 port 39676 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:28:36,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322516.186704, 'message': 'Dec 6 12:28:34 hqnl0246134 sshd[212465]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 12:28:38,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322518.198952, 'message': 'Dec 6 12:28:37 hqnl0246134 sshd[212465]: Failed password for root from 61.177.173.36 port 39676 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 12:28:42,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322522.1922526, 'message': 'Dec 6 12:28:40 hqnl0246134 sshd[212473]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 12:28:42,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322522.192582, 'message': 'Dec 6 12:28:40 hqnl0246134 sshd[212473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 12:28:44,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322524.1951826, 'message': 'Dec 6 12:28:42 hqnl0246134 sshd[212473]: Failed password for root from 61.177.173.36 port 62343 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 12:28:44,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322524.1954074, 'message': 'Dec 6 12:28:43 hqnl0246134 sshd[212473]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 12:28:45,714] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:28:45,714] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:28:46,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322526.1980367, 'message': 'Dec 6 12:28:45 hqnl0246134 sshd[212473]: Failed password for root from 61.177.173.36 port 62343 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 12:28:46,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322526.1982334, 'message': 'Dec 6 12:28:45 hqnl0246134 sshd[212473]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 12:28:48,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670322528.2032096, 'message': 'Dec 6 12:28:46 hqnl0246134 sshd[212473]: Failed password for root from 61.177.173.36 port 62343 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0228 seconds
WARNING [2022-12-06 12:28:54,069] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:28:54,088] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0282 seconds
INFO [2022-12-06 12:29:17,905] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:29:17,905] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:29:17,915] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:29:17,927] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 12:29:20,675] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:29:20,676] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:29:20,684] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:29:20,697] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
WARNING [2022-12-06 12:29:45,721] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:29:45,722] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:30:18,238] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:30:18,239] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:30:18,248] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:30:18,260] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 12:30:21,076] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:30:21,076] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:30:21,083] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:30:21,096] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
WARNING [2022-12-06 12:30:45,726] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:30:45,727] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:31:17,967] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:31:17,968] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:31:17,979] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:31:17,992] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0232 seconds
INFO [2022-12-06 12:31:20,659] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:31:20,659] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:31:20,666] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:31:20,678] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 12:31:23,467] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 12:31:23,532] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 12:31:23,533] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 12:31:23,533] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 12:31:23,533] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 12:31:23,534] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 12:31:23,554] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 12:31:23,570] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0354 seconds
WARNING [2022-12-06 12:31:23,576] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 12:31:23,578] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:31:23,594] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0294 seconds
INFO [2022-12-06 12:31:23,595] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0278 seconds
WARNING [2022-12-06 12:31:45,730] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:31:45,732] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:31:53,251] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 12:31:53,667] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 12:31:53,668] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 12:31:53,669] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 12:32:17,924] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:32:17,924] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:32:17,952] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:32:17,968] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0422 seconds
INFO [2022-12-06 12:32:22,780] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:32:22,780] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:32:22,787] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:32:22,798] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
WARNING [2022-12-06 12:32:45,740] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:32:45,742] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:33:17,862] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:33:17,863] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:33:17,874] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:33:17,889] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0244 seconds
INFO [2022-12-06 12:33:20,457] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:33:20,457] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:33:20,464] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:33:20,476] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
WARNING [2022-12-06 12:33:45,745] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:33:45,746] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:34:17,885] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:34:17,886] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:34:17,895] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:34:17,908] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 12:34:20,482] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:34:20,483] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:34:20,489] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:34:20,500] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0165 seconds
WARNING [2022-12-06 12:34:45,750] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:34:45,752] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:35:17,814] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:35:17,815] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:35:17,825] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:35:17,841] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0250 seconds
INFO [2022-12-06 12:35:20,453] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:35:20,453] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:35:20,462] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:35:20,482] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0281 seconds
WARNING [2022-12-06 12:35:45,758] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:35:45,760] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:36:08,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322968.75386, 'message': 'Dec 6 12:36:07 hqnl0246134 sshd[212877]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 12:36:08,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322968.754557, 'message': 'Dec 6 12:36:07 hqnl0246134 sshd[212877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 12:36:10,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322970.754117, 'message': 'Dec 6 12:36:09 hqnl0246134 sshd[212877]: Failed password for root from 61.177.173.49 port 55717 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 12:36:10,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322970.7543604, 'message': 'Dec 6 12:36:09 hqnl0246134 sshd[212877]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 12:36:12,777] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322972.7569957, 'message': 'Dec 6 12:36:11 hqnl0246134 sshd[212877]: Failed password for root from 61.177.173.49 port 55717 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 12:36:12,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322972.7572668, 'message': 'Dec 6 12:36:12 hqnl0246134 sshd[212877]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 12:36:14,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322974.7590106, 'message': 'Dec 6 12:36:14 hqnl0246134 sshd[212877]: Failed password for root from 61.177.173.49 port 55717 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 12:36:18,032] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:36:18,034] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:36:18,044] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:36:18,057] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 12:36:18,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322978.7614605, 'message': 'Dec 6 12:36:18 hqnl0246134 sshd[212892]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 12:36:18,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322978.7688613, 'message': 'Dec 6 12:36:18 hqnl0246134 sshd[212892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 12:36:19,234] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:36:19,234] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:36:19,242] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:36:19,254] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 12:36:20,620] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:36:20,621] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:36:20,627] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:36:20,638] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0165 seconds
INFO [2022-12-06 12:36:20,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322980.8773577, 'message': 'Dec 6 12:36:19 hqnl0246134 sshd[212892]: Failed password for root from 61.177.173.49 port 33415 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 12:36:20,918] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322980.8776836, 'message': 'Dec 6 12:36:20 hqnl0246134 sshd[212892]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 12:36:22,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322982.7683847, 'message': 'Dec 6 12:36:22 hqnl0246134 sshd[212892]: Failed password for root from 61.177.173.49 port 33415 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 12:36:24,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322984.7710109, 'message': 'Dec 6 12:36:23 hqnl0246134 sshd[212892]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 12:36:26,809] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670322986.7740953, 'message': 'Dec 6 12:36:25 hqnl0246134 sshd[212892]: Failed password for root from 61.177.173.49 port 33415 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0347 seconds
WARNING [2022-12-06 12:36:45,766] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:36:45,767] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:36:54,089] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:36:54,111] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0298 seconds
INFO [2022-12-06 12:37:18,124] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:37:18,126] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:37:18,137] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:37:18,152] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0246 seconds
INFO [2022-12-06 12:37:21,262] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:37:21,263] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:37:21,283] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:37:21,313] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0362 seconds
WARNING [2022-12-06 12:37:45,770] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:37:45,771] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:38:18,004] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:38:18,005] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:38:18,028] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:38:18,044] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0375 seconds
INFO [2022-12-06 12:38:20,711] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:38:20,711] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:38:20,718] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:38:20,730] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 12:38:25,426] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 12:38:25,494] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 12:38:25,494] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 12:38:25,494] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 12:38:25,495] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 12:38:25,495] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 12:38:25,509] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 12:38:25,524] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0288 seconds
WARNING [2022-12-06 12:38:25,530] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 12:38:25,532] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:38:25,548] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0299 seconds
INFO [2022-12-06 12:38:25,550] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0278 seconds
WARNING [2022-12-06 12:38:45,773] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:38:45,775] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:38:55,620] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 12:38:55,621] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 12:38:55,623] im360.plugins.client360: Waiting 7 minutes before retry...
INFO [2022-12-06 12:39:17,904] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:39:17,905] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:39:17,918] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:39:17,933] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0270 seconds
INFO [2022-12-06 12:39:21,327] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:39:21,327] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:39:21,335] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:39:21,350] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 12:39:35,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670323175.1717782, 'message': 'Dec 6 12:39:33 hqnl0246134 sshd[213210]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 12:39:35,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670323175.1721876, 'message': 'Dec 6 12:39:33 hqnl0246134 sshd[213210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 12:39:37,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670323177.1712458, 'message': 'Dec 6 12:39:35 hqnl0246134 sshd[213210]: Failed password for root from 61.177.173.52 port 21421 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 12:39:39,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670323179.174085, 'message': 'Dec 6 12:39:37 hqnl0246134 sshd[213210]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 12:39:41,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670323181.1796436, 'message': 'Dec 6 12:39:39 hqnl0246134 sshd[213210]: Failed password for root from 61.177.173.52 port 21421 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 12:39:41,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670323181.1798832, 'message': 'Dec 6 12:39:39 hqnl0246134 sshd[213210]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 12:39:43,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670323183.181586, 'message': 'Dec 6 12:39:41 hqnl0246134 sshd[213210]: Failed password for root from 61.177.173.52 port 21421 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 12:39:45,097] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:39:45,098] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:39:45,105] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:39:45,117] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 12:39:45,216] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670323185.1844685, 'message': 'Dec 6 12:39:44 hqnl0246134 sshd[213218]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 12:39:45,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670323185.1847823, 'message': 'Dec 6 12:39:44 hqnl0246134 sshd[213218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0291 seconds
WARNING [2022-12-06 12:39:45,778] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:39:45,779] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:39:47,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670323187.188497, 'message': 'Dec 6 12:39:46 hqnl0246134 sshd[213218]: Failed password for root from 61.177.173.52 port 48578 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 12:39:49,209] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670323189.1898885, 'message': 'Dec 6 12:39:47 hqnl0246134 sshd[213218]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 12:39:51,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670323191.1912415, 'message': 'Dec 6 12:39:49 hqnl0246134 sshd[213218]: Failed password for root from 61.177.173.52 port 48578 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0349 seconds
WARNING [2022-12-06 12:39:54,094] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:39:54,115] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0289 seconds
INFO [2022-12-06 12:40:17,711] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:40:17,712] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:40:17,721] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:40:17,735] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-06 12:40:20,343] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:40:20,343] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:40:20,353] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:40:20,364] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 12:40:23,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323223.2346172, 'message': 'Dec 6 12:40:22 hqnl0246134 sshd[213293]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 12:40:23,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323223.2349985, 'message': 'Dec 6 12:40:22 hqnl0246134 sshd[213293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:40:25,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323225.2361765, 'message': 'Dec 6 12:40:25 hqnl0246134 sshd[213293]: Failed password for root from 61.177.173.39 port 57076 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 12:40:27,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323227.2377846, 'message': 'Dec 6 12:40:26 hqnl0246134 sshd[213293]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 12:40:29,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323229.2401328, 'message': 'Dec 6 12:40:28 hqnl0246134 sshd[213293]: Failed password for root from 61.177.173.39 port 57076 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 12:40:29,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323229.2403862, 'message': 'Dec 6 12:40:29 hqnl0246134 sshd[213293]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 12:40:33,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323233.2456646, 'message': 'Dec 6 12:40:31 hqnl0246134 sshd[213293]: Failed password for root from 61.177.173.39 port 57076 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 12:40:35,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323235.248119, 'message': 'Dec 6 12:40:35 hqnl0246134 sshd[213296]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 12:40:35,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323235.2483282, 'message': 'Dec 6 12:40:35 hqnl0246134 sshd[213296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 12:40:37,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323237.247544, 'message': 'Dec 6 12:40:37 hqnl0246134 sshd[213296]: Failed password for root from 61.177.173.39 port 33212 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 12:40:39,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323239.2533884, 'message': 'Dec 6 12:40:37 hqnl0246134 sshd[213296]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 12:40:41,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323241.2563949, 'message': 'Dec 6 12:40:39 hqnl0246134 sshd[213296]: Failed password for root from 61.177.173.39 port 33212 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 12:40:41,295] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323241.2566106, 'message': 'Dec 6 12:40:39 hqnl0246134 sshd[213296]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 12:40:43,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323243.2584562, 'message': 'Dec 6 12:40:42 hqnl0246134 sshd[213296]: Failed password for root from 61.177.173.39 port 33212 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 12:40:45,782] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:40:45,784] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:40:46,589] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:40:46,589] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:40:46,602] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:40:46,621] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0305 seconds
INFO [2022-12-06 12:40:47,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323247.26616, 'message': 'Dec 6 12:40:45 hqnl0246134 sshd[213303]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 12:40:47,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323247.2669022, 'message': 'Dec 6 12:40:45 hqnl0246134 sshd[213303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 12:40:49,290] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323249.2720652, 'message': 'Dec 6 12:40:47 hqnl0246134 sshd[213303]: Failed password for root from 61.177.173.39 port 46773 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 12:40:51,295] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323251.2768164, 'message': 'Dec 6 12:40:49 hqnl0246134 sshd[213303]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 12:40:51,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323251.2770963, 'message': 'Dec 6 12:40:51 hqnl0246134 sshd[213303]: Failed password for root from 61.177.173.39 port 46773 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 12:40:53,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323253.2827668, 'message': 'Dec 6 12:40:51 hqnl0246134 sshd[213303]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
WARNING [2022-12-06 12:40:54,098] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:40:54,117] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0271 seconds
INFO [2022-12-06 12:40:55,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670323255.288969, 'message': 'Dec 6 12:40:54 hqnl0246134 sshd[213303]: Failed password for root from 61.177.173.39 port 46773 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 12:41:17,932] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:41:17,933] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:41:17,944] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:41:17,958] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0234 seconds
INFO [2022-12-06 12:41:20,535] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:41:20,535] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:41:20,542] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:41:20,554] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
WARNING [2022-12-06 12:41:45,795] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:41:45,796] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:41:53,255] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 12:41:54,107] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:41:54,144] defence360agent.internals.the_sink: SensorIncidentList(<1 item(s)>) processed in 0.0511 seconds
INFO [2022-12-06 12:42:17,974] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:42:17,975] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:42:17,987] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:42:18,001] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0247 seconds
INFO [2022-12-06 12:42:20,855] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:42:20,856] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:42:20,866] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:42:20,878] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
WARNING [2022-12-06 12:42:45,799] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:42:45,800] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:43:22,540] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:43:22,542] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:43:22,577] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:43:22,885] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.3422 seconds
INFO [2022-12-06 12:43:23,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323403.514641, 'message': 'Dec 6 12:43:22 hqnl0246134 sshd[213456]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 12:43:23,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323403.5149648, 'message': 'Dec 6 12:43:22 hqnl0246134 sshd[213456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 12:43:25,537] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323405.5164123, 'message': 'Dec 6 12:43:24 hqnl0246134 sshd[213456]: Failed password for root from 61.177.172.19 port 56312 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 12:43:25,606] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:43:25,606] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:43:25,613] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:43:25,624] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 12:43:27,542] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323407.5203936, 'message': 'Dec 6 12:43:26 hqnl0246134 sshd[213456]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 12:43:29,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323409.521914, 'message': 'Dec 6 12:43:28 hqnl0246134 sshd[213456]: Failed password for root from 61.177.172.19 port 56312 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 12:43:29,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323409.522207, 'message': 'Dec 6 12:43:29 hqnl0246134 sshd[213456]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 12:43:31,542] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323411.5236757, 'message': 'Dec 6 12:43:31 hqnl0246134 sshd[213456]: Failed password for root from 61.177.172.19 port 56312 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 12:43:35,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323415.5282314, 'message': 'Dec 6 12:43:35 hqnl0246134 sshd[213465]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 12:43:35,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323415.528808, 'message': 'Dec 6 12:43:35 hqnl0246134 sshd[213465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 12:43:36,221] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:43:36,222] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:43:36,229] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:43:36,244] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 12:43:37,549] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323417.5298636, 'message': 'Dec 6 12:43:37 hqnl0246134 sshd[213465]: Failed password for root from 61.177.172.19 port 46638 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 12:43:39,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323419.5321257, 'message': 'Dec 6 12:43:39 hqnl0246134 sshd[213465]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 12:43:41,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323421.5357268, 'message': 'Dec 6 12:43:41 hqnl0246134 sshd[213465]: Failed password for root from 61.177.172.19 port 46638 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 12:43:43,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323423.5396647, 'message': 'Dec 6 12:43:41 hqnl0246134 sshd[213465]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 12:43:45,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323425.5531402, 'message': 'Dec 6 12:43:43 hqnl0246134 sshd[213465]: Failed password for root from 61.177.172.19 port 46638 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0580 seconds
WARNING [2022-12-06 12:43:45,807] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:43:45,808] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:43:49,569] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323429.5457802, 'message': 'Dec 6 12:43:47 hqnl0246134 sshd[213480]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 12:43:49,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323429.5461688, 'message': 'Dec 6 12:43:47 hqnl0246134 sshd[213480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 12:43:51,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323431.5464482, 'message': 'Dec 6 12:43:49 hqnl0246134 sshd[213480]: Failed password for root from 61.177.172.19 port 31252 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 12:43:51,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323431.5467389, 'message': 'Dec 6 12:43:49 hqnl0246134 sshd[213480]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 12:43:53,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323433.5467858, 'message': 'Dec 6 12:43:51 hqnl0246134 sshd[213480]: Failed password for root from 61.177.172.19 port 31252 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 12:43:53,606] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323433.5470262, 'message': 'Dec 6 12:43:52 hqnl0246134 sshd[213480]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
WARNING [2022-12-06 12:43:54,109] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:43:54,150] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0517 seconds
INFO [2022-12-06 12:43:55,569] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323435.548322, 'message': 'Dec 6 12:43:54 hqnl0246134 sshd[213480]: Failed password for root from 61.177.172.19 port 31252 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 12:43:59,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323439.5527155, 'message': 'Dec 6 12:43:57 hqnl0246134 sshd[213484]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:43:59,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323439.5530007, 'message': 'Dec 6 12:43:57 hqnl0246134 sshd[213484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 12:44:01,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323441.55427, 'message': 'Dec 6 12:44:00 hqnl0246134 sshd[213484]: Failed password for root from 61.177.172.19 port 59709 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 12:44:03,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323443.5539618, 'message': 'Dec 6 12:44:02 hqnl0246134 sshd[213484]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 12:44:05,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323445.5552833, 'message': 'Dec 6 12:44:03 hqnl0246134 sshd[213484]: Failed password for root from 61.177.172.19 port 59709 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 12:44:05,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323445.5554788, 'message': 'Dec 6 12:44:04 hqnl0246134 sshd[213484]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 12:44:07,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670323447.5620034, 'message': 'Dec 6 12:44:06 hqnl0246134 sshd[213484]: Failed password for root from 61.177.172.19 port 59709 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 12:44:18,231] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:44:18,232] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:44:18,266] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:44:18,320] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0867 seconds
INFO [2022-12-06 12:44:21,177] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:44:21,178] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:44:21,186] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:44:21,199] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
WARNING [2022-12-06 12:44:45,810] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:44:45,811] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:44:54,112] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:44:54,139] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0379 seconds
INFO [2022-12-06 12:45:18,215] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:45:18,217] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:45:18,236] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:45:18,261] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0425 seconds
INFO [2022-12-06 12:45:21,210] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:45:21,211] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:45:21,223] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:45:21,236] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0242 seconds
WARNING [2022-12-06 12:45:45,812] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:45:45,813] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:46:03,895] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 12:46:03,962] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 12:46:03,963] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 12:46:03,963] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 12:46:03,963] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 12:46:03,964] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 12:46:03,976] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 12:46:03,993] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0289 seconds
WARNING [2022-12-06 12:46:04,000] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 12:46:04,003] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:46:04,020] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0328 seconds
INFO [2022-12-06 12:46:04,022] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0311 seconds
INFO [2022-12-06 12:46:18,038] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:46:18,039] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:46:18,048] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:46:18,061] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
INFO [2022-12-06 12:46:20,865] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:46:20,865] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:46:20,873] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:46:20,885] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 12:46:33,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323593.7632697, 'message': 'Dec 6 12:46:32 hqnl0246134 sshd[213659]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 12:46:33,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323593.7637372, 'message': 'Dec 6 12:46:32 hqnl0246134 sshd[213659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 12:46:34,114] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 12:46:34,115] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 12:46:34,115] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 12:46:35,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323595.7639887, 'message': 'Dec 6 12:46:34 hqnl0246134 sshd[213659]: Failed password for root from 61.177.173.51 port 47375 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 12:46:37,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323597.7656486, 'message': 'Dec 6 12:46:36 hqnl0246134 sshd[213659]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 12:46:39,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323599.7692664, 'message': 'Dec 6 12:46:38 hqnl0246134 sshd[213659]: Failed password for root from 61.177.173.51 port 47375 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 12:46:41,792] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323601.7697275, 'message': 'Dec 6 12:46:40 hqnl0246134 sshd[213659]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 12:46:43,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323603.772099, 'message': 'Dec 6 12:46:42 hqnl0246134 sshd[213659]: Failed password for root from 61.177.173.51 port 47375 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 12:46:45,553] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:46:45,553] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:46:45,561] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:46:45,572] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 12:46:45,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323605.775247, 'message': 'Dec 6 12:46:44 hqnl0246134 sshd[213664]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 12:46:45,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323605.7754815, 'message': 'Dec 6 12:46:44 hqnl0246134 sshd[213664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 12:46:45,815] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:46:45,816] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:46:47,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323607.777126, 'message': 'Dec 6 12:46:46 hqnl0246134 sshd[213664]: Failed password for root from 61.177.173.51 port 39115 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 12:46:47,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323607.7774413, 'message': 'Dec 6 12:46:47 hqnl0246134 sshd[213664]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 12:46:49,802] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323609.7804499, 'message': 'Dec 6 12:46:49 hqnl0246134 sshd[213664]: Failed password for root from 61.177.173.51 port 39115 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 12:46:51,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323611.7841623, 'message': 'Dec 6 12:46:51 hqnl0246134 sshd[213664]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 12:46:53,833] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670323613.813246, 'message': 'Dec 6 12:46:53 hqnl0246134 sshd[213664]: Failed password for root from 61.177.173.51 port 39115 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
WARNING [2022-12-06 12:46:54,115] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:46:54,140] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0314 seconds
INFO [2022-12-06 12:47:17,766] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:47:17,767] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:47:17,776] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:47:17,789] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 12:47:20,371] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:47:20,372] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:47:20,379] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:47:20,390] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
WARNING [2022-12-06 12:47:45,819] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:47:45,821] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:48:18,356] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:48:18,357] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:48:18,367] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:48:18,381] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-06 12:48:21,026] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:48:21,027] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:48:21,034] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:48:21,046] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
WARNING [2022-12-06 12:48:45,824] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:48:45,826] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:49:18,087] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:49:18,088] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:49:18,097] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:49:18,110] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 12:49:21,515] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:49:21,516] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:49:21,528] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:49:21,545] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0280 seconds
WARNING [2022-12-06 12:49:45,830] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:49:45,832] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:50:12,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.245.252.34', 'timestamp': 1670323812.0668387, 'message': 'Dec 6 12:50:10 hqnl0246134 sshd[213850]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.245.252.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 12:50:12,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.245.252.34', 'timestamp': 1670323812.0680304, 'message': 'Dec 6 12:50:10 hqnl0246134 sshd[213850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.252.34 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 12:50:14,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '157.245.252.34', 'timestamp': 1670323814.0669634, 'message': 'Dec 6 12:50:12 hqnl0246134 sshd[213850]: Failed password for root from 157.245.252.34 port 53582 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 12:50:15,210] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:50:15,211] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:50:15,224] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:50:15,245] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0325 seconds
INFO [2022-12-06 12:50:17,938] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:50:17,939] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:50:17,948] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:50:17,960] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 12:50:20,996] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:50:20,996] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:50:21,011] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:50:21,023] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 12:50:36,192] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 12:50:36,645] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 12:50:36,646] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 12:50:36,646] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 12:50:36,646] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 12:50:36,647] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 12:50:36,658] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 12:50:36,677] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0303 seconds
WARNING [2022-12-06 12:50:36,690] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 12:50:36,694] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:50:36,720] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0506 seconds
INFO [2022-12-06 12:50:36,721] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0480 seconds
WARNING [2022-12-06 12:50:45,834] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:50:45,835] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:50:54,130] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:50:54,160] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0408 seconds
INFO [2022-12-06 12:51:07,364] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 12:51:07,365] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 12:51:07,366] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 12:51:19,833] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:51:19,834] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:51:19,845] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:51:19,857] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 12:51:22,383] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:51:22,384] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:51:22,392] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:51:22,403] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 12:51:36,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.121.113.183', 'timestamp': 1670323896.2026074, 'message': 'Dec 6 12:51:35 hqnl0246134 sshd[213930]: Invalid user kai from 20.121.113.183 port 1152', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 12:51:36,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.121.113.183', 'timestamp': 1670323896.202867, 'message': 'Dec 6 12:51:35 hqnl0246134 sshd[213930]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.121.113.183 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 12:51:36,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.121.113.183', 'timestamp': 1670323896.203034, 'message': 'Dec 6 12:51:35 hqnl0246134 sshd[213930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.121.113.183 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 12:51:38,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.121.113.183', 'timestamp': 1670323898.2024968, 'message': 'Dec 6 12:51:37 hqnl0246134 sshd[213930]: Failed password for invalid user kai from 20.121.113.183 port 1152 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 12:51:38,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.121.113.183', 'timestamp': 1670323898.2026699, 'message': 'Dec 6 12:51:37 hqnl0246134 sshd[213930]: Disconnected from invalid user kai 20.121.113.183 port 1152 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 12:51:40,059] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 12:51:40,061] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 12:51:40,968] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-06 12:51:44,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.81.14.65', 'timestamp': 1670323904.2085245, 'message': 'Dec 6 12:51:42 hqnl0246134 sshd[213947]: Invalid user ryan from 206.81.14.65 port 50552', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 12:51:44,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.81.14.65', 'timestamp': 1670323904.2089326, 'message': 'Dec 6 12:51:42 hqnl0246134 sshd[213947]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.81.14.65 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 12:51:44,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.81.14.65', 'timestamp': 1670323904.209208, 'message': 'Dec 6 12:51:42 hqnl0246134 sshd[213947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.14.65 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
WARNING [2022-12-06 12:51:45,840] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:51:45,841] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:51:46,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.81.14.65', 'timestamp': 1670323906.2098682, 'message': 'Dec 6 12:51:45 hqnl0246134 sshd[213947]: Failed password for invalid user ryan from 206.81.14.65 port 50552 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 12:51:48,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.81.14.65', 'timestamp': 1670323908.213131, 'message': 'Dec 6 12:51:47 hqnl0246134 sshd[213947]: Disconnected from invalid user ryan 206.81.14.65 port 50552 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0346 seconds
WARNING [2022-12-06 12:51:53,259] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 12:51:54,132] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:51:54,162] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0387 seconds
INFO [2022-12-06 12:52:05,155] defence360agent.files: Updating all files
INFO [2022-12-06 12:52:10,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323930.2413416, 'message': 'Dec 6 12:52:08 hqnl0246134 sshd[213978]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 12:52:10,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323930.2419455, 'message': 'Dec 6 12:52:08 hqnl0246134 sshd[213978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 12:52:12,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323932.2421541, 'message': 'Dec 6 12:52:10 hqnl0246134 sshd[213978]: Failed password for root from 61.177.173.35 port 31719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 12:52:12,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323932.242509, 'message': 'Dec 6 12:52:10 hqnl0246134 sshd[213978]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0719 seconds
INFO [2022-12-06 12:52:14,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323934.2450056, 'message': 'Dec 6 12:52:12 hqnl0246134 sshd[213978]: Failed password for root from 61.177.173.35 port 31719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 12:52:14,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323934.245287, 'message': 'Dec 6 12:52:13 hqnl0246134 sshd[213978]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 12:52:16,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323936.245207, 'message': 'Dec 6 12:52:15 hqnl0246134 sshd[213978]: Failed password for root from 61.177.173.35 port 31719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 12:52:17,836] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:52:17,836] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:52:17,852] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:52:17,867] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0291 seconds
INFO [2022-12-06 12:52:20,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323940.2490122, 'message': 'Dec 6 12:52:18 hqnl0246134 sshd[213999]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 12:52:20,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323940.2494278, 'message': 'Dec 6 12:52:18 hqnl0246134 sshd[213999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 12:52:20,646] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:52:20,647] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:52:20,654] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:52:20,667] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 12:52:22,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323942.2500226, 'message': 'Dec 6 12:52:21 hqnl0246134 sshd[213999]: Failed password for root from 61.177.173.35 port 13765 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 12:52:24,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323944.2525194, 'message': 'Dec 6 12:52:23 hqnl0246134 sshd[213999]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 12:52:26,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323946.254087, 'message': 'Dec 6 12:52:25 hqnl0246134 sshd[213999]: Failed password for root from 61.177.173.35 port 13765 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 12:52:28,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323948.25628, 'message': 'Dec 6 12:52:27 hqnl0246134 sshd[213999]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 12:52:30,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323950.257879, 'message': 'Dec 6 12:52:29 hqnl0246134 sshd[213999]: Failed password for root from 61.177.173.35 port 13765 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 12:52:32,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323952.266747, 'message': 'Dec 6 12:52:31 hqnl0246134 sshd[214007]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 12:52:32,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323952.2671537, 'message': 'Dec 6 12:52:31 hqnl0246134 sshd[214007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 12:52:34,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323954.268856, 'message': 'Dec 6 12:52:33 hqnl0246134 sshd[214007]: Failed password for root from 61.177.173.35 port 57124 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-06 12:52:34,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323954.269141, 'message': 'Dec 6 12:52:33 hqnl0246134 sshd[214007]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0462 seconds
INFO [2022-12-06 12:52:36,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323956.2712266, 'message': 'Dec 6 12:52:35 hqnl0246134 sshd[214007]: Failed password for root from 61.177.173.35 port 57124 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 12:52:36,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323956.2714496, 'message': 'Dec 6 12:52:35 hqnl0246134 sshd[214007]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 12:52:40,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670323960.280801, 'message': 'Dec 6 12:52:38 hqnl0246134 sshd[214007]: Failed password for root from 61.177.173.35 port 57124 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 12:52:43,418] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:52:43,419] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:52:43,428] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:52:43,442] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
WARNING [2022-12-06 12:52:45,843] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:52:45,844] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:52:54,139] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:52:54,162] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0325 seconds
INFO [2022-12-06 12:53:17,795] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:53:17,796] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:53:17,804] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:53:17,901] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1044 seconds
INFO [2022-12-06 12:53:22,256] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:53:22,257] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:53:22,267] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:53:22,279] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 12:53:44,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324024.373489, 'message': 'Dec 6 12:53:44 hqnl0246134 sshd[214065]: Invalid user composer from 197.165.163.95 port 54550', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 12:53:44,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324024.373808, 'message': 'Dec 6 12:53:44 hqnl0246134 sshd[214065]: pam_imunify(sshd:auth): [IM360_RBL] The IP 197.165.163.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 12:53:44,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324024.3739893, 'message': 'Dec 6 12:53:44 hqnl0246134 sshd[214065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.165.163.95 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0295 seconds
WARNING [2022-12-06 12:53:45,847] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:53:45,848] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:53:46,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324026.3737829, 'message': 'Dec 6 12:53:45 hqnl0246134 sshd[214065]: Failed password for invalid user composer from 197.165.163.95 port 54550 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 12:53:48,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324028.3753648, 'message': 'Dec 6 12:53:47 hqnl0246134 sshd[214065]: Disconnected from invalid user composer 197.165.163.95 port 54550 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0470 seconds
INFO [2022-12-06 12:53:50,270] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:53:50,270] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:53:50,278] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:53:50,290] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
WARNING [2022-12-06 12:53:54,142] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:53:54,163] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0298 seconds
INFO [2022-12-06 12:54:17,900] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:54:17,902] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:54:17,917] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:54:17,938] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0331 seconds
INFO [2022-12-06 12:54:20,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324060.4103003, 'message': 'Dec 6 12:54:20 hqnl0246134 sshd[214118]: Invalid user kai from 206.189.236.198 port 49356', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 12:54:20,524] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:54:20,525] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:54:20,536] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:54:20,549] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0232 seconds
INFO [2022-12-06 12:54:22,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324062.4124815, 'message': 'Dec 6 12:54:20 hqnl0246134 sshd[214118]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.189.236.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0600 seconds
INFO [2022-12-06 12:54:22,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324062.4127555, 'message': 'Dec 6 12:54:20 hqnl0246134 sshd[214118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.236.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0526 seconds
INFO [2022-12-06 12:54:24,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324064.4134967, 'message': 'Dec 6 12:54:22 hqnl0246134 sshd[214118]: Failed password for invalid user kai from 206.189.236.198 port 49356 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 12:54:24,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324064.413667, 'message': 'Dec 6 12:54:22 hqnl0246134 sshd[214118]: Disconnected from invalid user kai 206.189.236.198 port 49356 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 12:54:36,462] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.245.252.34', 'timestamp': 1670324076.4299934, 'message': 'Dec 6 12:54:35 hqnl0246134 sshd[214133]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.245.252.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 12:54:36,463] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324076.4304235, 'message': 'Dec 6 12:54:35 hqnl0246134 sshd[214135]: Invalid user deploy from 46.101.225.227 port 46490', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 12:54:36,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.245.252.34', 'timestamp': 1670324076.430259, 'message': 'Dec 6 12:54:35 hqnl0246134 sshd[214133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.252.34 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 12:54:36,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324076.4305801, 'message': 'Dec 6 12:54:36 hqnl0246134 sshd[214135]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.225.227 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 12:54:36,512] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324076.4306853, 'message': 'Dec 6 12:54:36 hqnl0246134 sshd[214135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.225.227 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 12:54:38,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '157.245.252.34', 'timestamp': 1670324078.4376, 'message': 'Dec 6 12:54:37 hqnl0246134 sshd[214133]: Failed password for root from 157.245.252.34 port 57898 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 12:54:38,468] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324078.4377584, 'message': 'Dec 6 12:54:38 hqnl0246134 sshd[214135]: Failed password for invalid user deploy from 46.101.225.227 port 46490 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 12:54:40,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324080.4338734, 'message': 'Dec 6 12:54:40 hqnl0246134 sshd[214135]: Disconnected from invalid user deploy 46.101.225.227 port 46490 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 12:54:44,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670324084.437978, 'message': 'Dec 6 12:54:44 hqnl0246134 sshd[214137]: Accepted password for supportwwwuser from 212.58.119.251 port 10579 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0281 seconds
WARNING [2022-12-06 12:54:45,850] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:54:45,851] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:54:54,836] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:54:54,876] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.7332 seconds
INFO [2022-12-06 12:55:02,537] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324102.4670906, 'message': 'Dec 6 12:55:01 hqnl0246134 sshd[214201]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.75.234 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0676 seconds
INFO [2022-12-06 12:55:02,592] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324102.4705508, 'message': 'Dec 6 12:55:01 hqnl0246134 sshd[214201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.75.234 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0539 seconds
INFO [2022-12-06 12:55:04,490] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324104.4598086, 'message': 'Dec 6 12:55:03 hqnl0246134 sshd[214201]: Failed password for root from 143.198.75.234 port 54396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 12:55:18,041] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:55:18,042] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:55:18,051] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:55:18,066] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0226 seconds
INFO [2022-12-06 12:55:21,093] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:55:21,093] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:55:21,104] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:55:21,124] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0296 seconds
WARNING [2022-12-06 12:55:45,854] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:55:45,857] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:55:54,205] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:55:55,502] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 1.3108 seconds
INFO [2022-12-06 12:56:19,073] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:56:19,074] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:56:19,169] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:56:19,240] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1653 seconds
INFO [2022-12-06 12:56:22,220] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:56:22,220] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:56:22,231] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:56:22,244] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
WARNING [2022-12-06 12:56:27,168] defence360agent.files: Files update failed with error: urllib/http error while updating files, url: https://files.imunify360.com/static/ossec/v1/description.json, err: <urlopen error [Errno 101] Network is unreachable>, try: 1
INFO [2022-12-06 12:56:28,972] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 12:56:28,972] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 12:56:29,837] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 12:56:29,837] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 12:56:34,215] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 12:56:34,216] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 12:56:36,797] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 12:56:36,798] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 12:56:36,798] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 12:56:41,515] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 10:56:41 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2F02EEBBE53D'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 12:56:41,518] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 12:56:41,520] defence360agent.files: php-immunity files update finished (not updated)
WARNING [2022-12-06 12:56:45,865] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:56:45,866] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:56:45,887] defence360agent.files: Updating sigs files via file by file download
INFO [2022-12-06 12:56:55,281] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 10:56:55 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '13'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"a781b5e949492396aaa50c0a5cb252ce"'), ('Last-Modified', 'Tue, 06 Dec 2022 10:24:32 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E2F0624F265F2'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'e87fea3d-2e93-4da7-ae8f-bc9db48c5c71'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/sigs/v1/aibolit/hyperscan/version.txt'
WARNING [2022-12-06 12:56:59,714] defence360agent.files: Files update failed with error: urllib/http error while updating files, url: https://files.imunify360.com/static/sigs/v1/aibolit/ai-bolit-hoster.db, err: <urlopen error [Errno 104] Connection reset by peer>, try: 1
INFO [2022-12-06 12:57:00,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324220.625036, 'message': 'Dec 6 12:56:59 hqnl0246134 sshd[214339]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0677 seconds
INFO [2022-12-06 12:57:00,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324220.625713, 'message': 'Dec 6 12:56:59 hqnl0246134 sshd[214339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0553 seconds
INFO [2022-12-06 12:57:02,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324222.6308382, 'message': 'Dec 6 12:57:01 hqnl0246134 sshd[214339]: Failed password for root from 61.177.173.50 port 14840 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 12:57:02,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324222.6311939, 'message': 'Dec 6 12:57:01 hqnl0246134 sshd[214339]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 12:57:04,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324224.6286905, 'message': 'Dec 6 12:57:04 hqnl0246134 sshd[214339]: Failed password for root from 61.177.173.50 port 14840 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1128 seconds
INFO [2022-12-06 12:57:06,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324226.630736, 'message': 'Dec 6 12:57:06 hqnl0246134 sshd[214339]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1558 seconds
INFO [2022-12-06 12:57:08,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324228.6379738, 'message': 'Dec 6 12:57:08 hqnl0246134 sshd[214339]: Failed password for root from 61.177.173.50 port 14840 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0463 seconds
INFO [2022-12-06 12:57:16,744] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:57:16,745] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:57:16,756] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:57:16,773] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0269 seconds
INFO [2022-12-06 12:57:18,467] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:57:18,469] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:57:18,479] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:57:18,491] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 12:57:18,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324238.6554155, 'message': 'Dec 6 12:57:16 hqnl0246134 sshd[214359]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 12:57:18,697] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324238.6558, 'message': 'Dec 6 12:57:16 hqnl0246134 sshd[214359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 12:57:20,219] defence360agent.files: Files update failed with error: urllib/http error while updating files, url: https://files.imunify360.com/static/sigs/v1/aibolit/mds-ai-bolit-hoster.db, err: <urlopen error [Errno 101] Network is unreachable>, try: 1
INFO [2022-12-06 12:57:20,698] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324240.654711, 'message': 'Dec 6 12:57:19 hqnl0246134 sshd[214359]: Failed password for root from 61.177.172.98 port 16465 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 12:57:21,690] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:57:21,691] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:57:21,711] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:57:21,725] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 12:57:22,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324242.6567922, 'message': 'Dec 6 12:57:21 hqnl0246134 sshd[214359]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0532 seconds
INFO [2022-12-06 12:57:22,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324242.6569798, 'message': 'Dec 6 12:57:22 hqnl0246134 sshd[214381]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0538 seconds
INFO [2022-12-06 12:57:22,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324242.6572855, 'message': 'Dec 6 12:57:22 hqnl0246134 sshd[214359]: Failed password for root from 61.177.172.98 port 16465 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0646 seconds
INFO [2022-12-06 12:57:22,777] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324242.6571581, 'message': 'Dec 6 12:57:22 hqnl0246134 sshd[214381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0647 seconds
WARNING [2022-12-06 12:57:24,622] defence360agent.files: Files update failed with error: urllib/http error while updating files, url: https://files.imunify360.com/static/sigs/v1/aibolit/procu2.db, err: <urlopen error [Errno 104] Connection reset by peer>, try: 1
INFO [2022-12-06 12:57:24,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324244.6592848, 'message': 'Dec 6 12:57:23 hqnl0246134 sshd[214359]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0564 seconds
INFO [2022-12-06 12:57:24,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.245.252.34', 'timestamp': 1670324244.6594803, 'message': 'Dec 6 12:57:23 hqnl0246134 sshd[214386]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.245.252.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0564 seconds
INFO [2022-12-06 12:57:24,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324244.6597307, 'message': 'Dec 6 12:57:24 hqnl0246134 sshd[214381]: Failed password for root from 61.177.173.50 port 37243 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0652 seconds
INFO [2022-12-06 12:57:24,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.245.252.34', 'timestamp': 1670324244.6596053, 'message': 'Dec 6 12:57:23 hqnl0246134 sshd[214386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.252.34 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0524 seconds
INFO [2022-12-06 12:57:26,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324246.7598305, 'message': 'Dec 6 12:57:24 hqnl0246134 sshd[214381]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0566 seconds
INFO [2022-12-06 12:57:26,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324246.7600703, 'message': 'Dec 6 12:57:25 hqnl0246134 sshd[214359]: Failed password for root from 61.177.172.98 port 16465 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0571 seconds
INFO [2022-12-06 12:57:26,819] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '157.245.252.34', 'timestamp': 1670324246.7602057, 'message': 'Dec 6 12:57:25 hqnl0246134 sshd[214386]: Failed password for root from 157.245.252.34 port 47842 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0573 seconds
INFO [2022-12-06 12:57:26,819] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.114.119.22', 'timestamp': 1670324246.7603111, 'message': 'Dec 6 12:57:25 hqnl0246134 sshd[214388]: Invalid user admin from 85.114.119.22 port 59384', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0570 seconds
INFO [2022-12-06 12:57:26,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '85.114.119.22', 'timestamp': 1670324246.7604754, 'message': 'Dec 6 12:57:26 hqnl0246134 sshd[214388]: pam_imunify(sshd:auth): [IM360_RBL] The IP 85.114.119.22 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 12:57:26,856] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '85.114.119.22', 'timestamp': 1670324246.7606232, 'message': 'Dec 6 12:57:26 hqnl0246134 sshd[214388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.114.119.22 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 12:57:28,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324248.6632543, 'message': 'Dec 6 12:57:26 hqnl0246134 sshd[214381]: Failed password for root from 61.177.173.50 port 37243 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0713 seconds
INFO [2022-12-06 12:57:28,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324248.6636908, 'message': 'Dec 6 12:57:27 hqnl0246134 sshd[214390]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0727 seconds
INFO [2022-12-06 12:57:28,740] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.114.119.22', 'timestamp': 1670324248.6640766, 'message': 'Dec 6 12:57:28 hqnl0246134 sshd[214388]: Failed password for invalid user admin from 85.114.119.22 port 59384 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0728 seconds
INFO [2022-12-06 12:57:28,778] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324248.6639092, 'message': 'Dec 6 12:57:27 hqnl0246134 sshd[214390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-06 12:57:30,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324250.667985, 'message': 'Dec 6 12:57:29 hqnl0246134 sshd[214381]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0698 seconds
INFO [2022-12-06 12:57:30,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324250.6685827, 'message': 'Dec 6 12:57:29 hqnl0246134 sshd[214390]: Failed password for root from 61.177.172.98 port 27506 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0707 seconds
INFO [2022-12-06 12:57:30,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.114.119.22', 'timestamp': 1670324250.6687632, 'message': 'Dec 6 12:57:29 hqnl0246134 sshd[214388]: Disconnected from invalid user admin 85.114.119.22 port 59384 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0709 seconds
INFO [2022-12-06 12:57:30,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324250.6690483, 'message': 'Dec 6 12:57:30 hqnl0246134 sshd[214392]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.135.153.186 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0699 seconds
INFO [2022-12-06 12:57:30,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324250.6689196, 'message': 'Dec 6 12:57:29 hqnl0246134 sshd[214390]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0820 seconds
INFO [2022-12-06 12:57:30,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324250.6692507, 'message': 'Dec 6 12:57:30 hqnl0246134 sshd[214392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.153.186 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0865 seconds
INFO [2022-12-06 12:57:32,786] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670324252.6688886, 'message': 'Dec 6 12:57:30 hqnl0246134 sshd[214381]: Failed password for root from 61.177.173.50 port 37243 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1166 seconds
INFO [2022-12-06 12:57:32,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324252.6692493, 'message': 'Dec 6 12:57:31 hqnl0246134 sshd[214390]: Failed password for root from 61.177.172.98 port 27506 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1241 seconds
INFO [2022-12-06 12:57:32,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324252.6694148, 'message': 'Dec 6 12:57:32 hqnl0246134 sshd[214392]: Failed password for root from 43.135.153.186 port 39612 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1246 seconds
INFO [2022-12-06 12:57:32,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324252.669524, 'message': 'Dec 6 12:57:32 hqnl0246134 sshd[214390]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 12:57:34,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324254.6699903, 'message': 'Dec 6 12:57:33 hqnl0246134 sshd[214396]: Invalid user sftpuser from 212.60.80.58 port 46242', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1273 seconds
INFO [2022-12-06 12:57:34,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324254.6705244, 'message': 'Dec 6 12:57:33 hqnl0246134 sshd[214390]: Failed password for root from 61.177.172.98 port 27506 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1411 seconds
INFO [2022-12-06 12:57:34,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324254.6702816, 'message': 'Dec 6 12:57:33 hqnl0246134 sshd[214396]: pam_imunify(sshd:auth): [IM360_RBL] The IP 212.60.80.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 12:57:34,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324254.6704125, 'message': 'Dec 6 12:57:33 hqnl0246134 sshd[214396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.60.80.58 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 12:57:35,226] defence360agent.files: Files update failed with error: urllib/http error while updating files, url: https://files.imunify360.com/static/sigs/v1/aibolit/mds-procu2.db, err: <urlopen error [Errno 101] Network is unreachable>, try: 1
INFO [2022-12-06 12:57:36,458] defence360agent.files: Validating [sigs]: /var/imunify360/files/sigs/v1_2022-12-06T105650.188503Z
INFO [2022-12-06 12:57:36,899] defence360agent.files: Removing old path on file by file update: /var/imunify360/files/sigs/v1_2022-12-06T084945.532268Z
INFO [2022-12-06 12:57:36,926] defence360agent.files: Updated sigs using file by file download
INFO [2022-12-06 12:57:36,926] im360.malwarelib.subsys.aibolit: ai-bolit service will be restarted
INFO [2022-12-06 12:57:37,074] defence360agent.files: sigs files update finished
INFO [2022-12-06 12:57:37,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324256.9723895, 'message': 'Dec 6 12:57:35 hqnl0246134 sshd[214396]: Failed password for invalid user sftpuser from 212.60.80.58 port 46242 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.2470 seconds
INFO [2022-12-06 12:57:37,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324256.9727848, 'message': 'Dec 6 12:57:36 hqnl0246134 sshd[214399]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.2475 seconds
INFO [2022-12-06 12:57:37,304] defence360agent.internals.the_sink: FilesUpdated({'files_type':'sigs', 'files_index':<Index(type_=sigs) is_blank=False, json={<21 item(s)>}>}) processed in 0.2068 seconds
INFO [2022-12-06 12:57:37,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324256.9731276, 'message': 'Dec 6 12:57:36 hqnl0246134 sshd[214396]: Disconnected from invalid user sftpuser 212.60.80.58 port 46242 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1322 seconds
INFO [2022-12-06 12:57:37,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324256.9729428, 'message': 'Dec 6 12:57:36 hqnl0246134 sshd[214399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1321 seconds
INFO [2022-12-06 12:57:38,090] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 12:57:38,091] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 12:57:38,721] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324258.6855261, 'message': 'Dec 6 12:57:38 hqnl0246134 sshd[214399]: Failed password for root from 61.177.172.98 port 19769 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0355 seconds
WARNING [2022-12-06 12:57:38,956] defence360agent.files: Files update failed with error: urllib/http error while updating files, url: https://files.imunify360.com/static/eula/v1/description.json, err: <urlopen error [Errno 104] Connection reset by peer>, try: 1
INFO [2022-12-06 12:57:40,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324260.6850097, 'message': 'Dec 6 12:57:40 hqnl0246134 sshd[214399]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0507 seconds
INFO [2022-12-06 12:57:41,168] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 12:57:41,252] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 12:57:41,253] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 12:57:41,253] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 12:57:41,254] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 12:57:41,256] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 12:57:41,307] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 12:57:41,349] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0918 seconds
WARNING [2022-12-06 12:57:41,363] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 12:57:41,368] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:57:41,423] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0868 seconds
INFO [2022-12-06 12:57:41,428] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0826 seconds
INFO [2022-12-06 12:57:42,646] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 12:57:42,647] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 12:57:43,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324263.07857, 'message': 'Dec 6 12:57:42 hqnl0246134 sshd[214399]: Failed password for root from 61.177.172.98 port 19769 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0940 seconds
INFO [2022-12-06 12:57:44,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324264.6874864, 'message': 'Dec 6 12:57:42 hqnl0246134 sshd[214399]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0838 seconds
INFO [2022-12-06 12:57:44,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324264.6881418, 'message': 'Dec 6 12:57:44 hqnl0246134 sshd[214399]: Failed password for root from 61.177.172.98 port 19769 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0365 seconds
WARNING [2022-12-06 12:57:45,869] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:57:45,870] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:57:47,241] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 12:57:47,241] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 12:57:48,783] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324268.6941924, 'message': 'Dec 6 12:57:46 hqnl0246134 sshd[214428]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0877 seconds
INFO [2022-12-06 12:57:48,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324268.6947212, 'message': 'Dec 6 12:57:46 hqnl0246134 sshd[214428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0556 seconds
INFO [2022-12-06 12:57:50,893] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324270.7031596, 'message': 'Dec 6 12:57:48 hqnl0246134 sshd[214428]: Failed password for root from 61.177.172.98 port 30910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1881 seconds
INFO [2022-12-06 12:57:52,782] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324272.7062657, 'message': 'Dec 6 12:57:51 hqnl0246134 sshd[214428]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0750 seconds
INFO [2022-12-06 12:57:54,014] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 12:57:54,015] defence360agent.files: geo files update finished (not updated)
WARNING [2022-12-06 12:57:54,219] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:57:54,389] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.1935 seconds
INFO [2022-12-06 12:57:54,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324274.7070243, 'message': 'Dec 6 12:57:53 hqnl0246134 sshd[214428]: Failed password for root from 61.177.172.98 port 30910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 12:57:54,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324274.7072175, 'message': 'Dec 6 12:57:53 hqnl0246134 sshd[214428]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 12:57:56,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670324276.7096596, 'message': 'Dec 6 12:57:55 hqnl0246134 sshd[214428]: Failed password for root from 61.177.172.98 port 30910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 12:58:11,383] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 12:58:11,386] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 12:58:11,387] im360.plugins.client360: Waiting 7 minutes before retry...
INFO [2022-12-06 12:58:25,424] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:58:25,426] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:58:25,466] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:58:25,482] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0266 seconds
INFO [2022-12-06 12:58:28,645] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:58:28,646] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:58:28,654] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:58:28,666] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 12:58:32,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324312.7508237, 'message': 'Dec 6 12:58:32 hqnl0246134 sshd[214510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-06 12:58:32,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324312.7514293, 'message': 'Dec 6 12:58:32 hqnl0246134 sshd[214510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 12:58:34,777] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324314.756193, 'message': 'Dec 6 12:58:34 hqnl0246134 sshd[214510]: Failed password for root from 61.177.172.104 port 11052 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 12:58:36,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324316.7611036, 'message': 'Dec 6 12:58:36 hqnl0246134 sshd[214510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 12:58:38,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324318.7657518, 'message': 'Dec 6 12:58:38 hqnl0246134 sshd[214510]: Failed password for root from 61.177.172.104 port 11052 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 12:58:38,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324318.7659662, 'message': 'Dec 6 12:58:38 hqnl0246134 sshd[214510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 12:58:42,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324322.7776043, 'message': 'Dec 6 12:58:41 hqnl0246134 sshd[214510]: Failed password for root from 61.177.172.104 port 11052 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 12:58:45,744] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:58:45,745] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:58:45,775] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:58:45,796] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0340 seconds
WARNING [2022-12-06 12:58:45,871] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:58:45,872] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 12:58:46,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324326.7873092, 'message': 'Dec 6 12:58:44 hqnl0246134 sshd[214534]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0360 seconds
INFO [2022-12-06 12:58:46,863] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324326.7876425, 'message': 'Dec 6 12:58:44 hqnl0246134 sshd[214534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0378 seconds
INFO [2022-12-06 12:58:48,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324328.7934976, 'message': 'Dec 6 12:58:47 hqnl0246134 sshd[214534]: Failed password for root from 61.177.172.104 port 52237 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 12:58:50,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324330.7986455, 'message': 'Dec 6 12:58:49 hqnl0246134 sshd[214534]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1263 seconds
INFO [2022-12-06 12:58:52,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324332.8025935, 'message': 'Dec 6 12:58:51 hqnl0246134 sshd[214534]: Failed password for root from 61.177.172.104 port 52237 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 12:58:54,206] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:58:54,246] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0481 seconds
INFO [2022-12-06 12:58:54,833] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324334.810779, 'message': 'Dec 6 12:58:53 hqnl0246134 sshd[214534]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 12:58:56,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324336.8185031, 'message': 'Dec 6 12:58:55 hqnl0246134 sshd[214534]: Failed password for root from 61.177.172.104 port 52237 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 12:59:00,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324340.8264318, 'message': 'Dec 6 12:58:59 hqnl0246134 sshd[214555]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 12:59:00,863] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324340.8267846, 'message': 'Dec 6 12:58:59 hqnl0246134 sshd[214555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 12:59:02,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324342.8296258, 'message': 'Dec 6 12:59:01 hqnl0246134 sshd[214555]: Failed password for root from 61.177.172.104 port 49973 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 12:59:04,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324344.8509073, 'message': 'Dec 6 12:59:03 hqnl0246134 sshd[214555]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 12:59:06,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324346.8522859, 'message': 'Dec 6 12:59:05 hqnl0246134 sshd[214555]: Failed password for root from 61.177.172.104 port 49973 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0606 seconds
INFO [2022-12-06 12:59:06,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.100.118', 'timestamp': 1670324346.8528073, 'message': 'Dec 6 12:59:06 hqnl0246134 sshd[214564]: Invalid user suporte from 43.153.100.118 port 48122', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0607 seconds
INFO [2022-12-06 12:59:06,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324346.8526282, 'message': 'Dec 6 12:59:06 hqnl0246134 sshd[214555]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 12:59:06,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.100.118', 'timestamp': 1670324346.8529966, 'message': 'Dec 6 12:59:06 hqnl0246134 sshd[214564]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.100.118 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 12:59:06,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.100.118', 'timestamp': 1670324346.8532305, 'message': 'Dec 6 12:59:06 hqnl0246134 sshd[214564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.100.118 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 12:59:08,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324348.8598287, 'message': 'Dec 6 12:59:08 hqnl0246134 sshd[214555]: Failed password for root from 61.177.172.104 port 49973 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 12:59:10,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.100.118', 'timestamp': 1670324350.8628244, 'message': 'Dec 6 12:59:09 hqnl0246134 sshd[214564]: Failed password for invalid user suporte from 43.153.100.118 port 48122 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 12:59:10,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.100.118', 'timestamp': 1670324350.8631744, 'message': 'Dec 6 12:59:10 hqnl0246134 sshd[214564]: Disconnected from invalid user suporte 43.153.100.118 port 48122 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 12:59:18,769] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:59:18,770] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:59:18,784] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:59:18,807] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0342 seconds
INFO [2022-12-06 12:59:18,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324358.8719447, 'message': 'Dec 6 12:59:16 hqnl0246134 sshd[214576]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 12:59:18,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324358.8722908, 'message': 'Dec 6 12:59:16 hqnl0246134 sshd[214576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 12:59:20,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324360.8787982, 'message': 'Dec 6 12:59:19 hqnl0246134 sshd[214576]: Failed password for root from 61.177.172.104 port 14164 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 12:59:22,485] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 12:59:22,485] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 12:59:22,496] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:59:22,512] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0257 seconds
INFO [2022-12-06 12:59:22,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324362.8807058, 'message': 'Dec 6 12:59:21 hqnl0246134 sshd[214576]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 12:59:24,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324364.882907, 'message': 'Dec 6 12:59:22 hqnl0246134 sshd[214576]: Failed password for root from 61.177.172.104 port 14164 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0528 seconds
INFO [2022-12-06 12:59:24,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324364.8832335, 'message': 'Dec 6 12:59:23 hqnl0246134 sshd[214576]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-06 12:59:26,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324366.8843238, 'message': 'Dec 6 12:59:26 hqnl0246134 sshd[214576]: Failed password for root from 61.177.172.104 port 14164 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 12:59:30,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324370.8935387, 'message': 'Dec 6 12:59:29 hqnl0246134 sshd[214595]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 12:59:30,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324370.8938599, 'message': 'Dec 6 12:59:29 hqnl0246134 sshd[214595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 12:59:32,920] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324372.8945508, 'message': 'Dec 6 12:59:31 hqnl0246134 sshd[214595]: Failed password for root from 61.177.172.104 port 51953 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 12:59:32,950] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324372.8948874, 'message': 'Dec 6 12:59:32 hqnl0246134 sshd[214595]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 12:59:34,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324374.8963864, 'message': 'Dec 6 12:59:34 hqnl0246134 sshd[214595]: Failed password for root from 61.177.172.104 port 51953 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0578 seconds
INFO [2022-12-06 12:59:36,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324376.8975031, 'message': 'Dec 6 12:59:36 hqnl0246134 sshd[214595]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0465 seconds
INFO [2022-12-06 12:59:38,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670324378.9037695, 'message': 'Dec 6 12:59:38 hqnl0246134 sshd[214595]: Failed password for root from 61.177.172.104 port 51953 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
WARNING [2022-12-06 12:59:45,875] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 12:59:45,877] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 12:59:54,221] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 12:59:54,260] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0563 seconds
INFO [2022-12-06 13:00:18,751] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:00:18,753] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:00:18,765] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:00:18,791] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0367 seconds
INFO [2022-12-06 13:00:20,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.252.34', 'timestamp': 1670324420.9546287, 'message': 'Dec 6 13:00:20 hqnl0246134 sshd[214690]: Invalid user eas from 157.245.252.34 port 37800', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 13:00:22,481] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:00:22,482] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:00:22,490] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:00:22,503] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 13:00:22,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.245.252.34', 'timestamp': 1670324422.9545612, 'message': 'Dec 6 13:00:21 hqnl0246134 sshd[214690]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.245.252.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 13:00:23,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.245.252.34', 'timestamp': 1670324422.9548874, 'message': 'Dec 6 13:00:21 hqnl0246134 sshd[214690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.252.34 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 13:00:23,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.252.34', 'timestamp': 1670324422.9550648, 'message': 'Dec 6 13:00:22 hqnl0246134 sshd[214690]: Failed password for invalid user eas from 157.245.252.34 port 37800 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 13:00:24,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.252.34', 'timestamp': 1670324424.9571536, 'message': 'Dec 6 13:00:24 hqnl0246134 sshd[214690]: Disconnected from invalid user eas 157.245.252.34 port 37800 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 13:00:27,488] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:00:27,488] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:00:27,497] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:00:27,511] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 13:00:39,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324438.9755492, 'message': 'Dec 6 13:00:38 hqnl0246134 sshd[214708]: Invalid user user from 43.135.153.186 port 58942', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 13:00:39,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324438.9777675, 'message': 'Dec 6 13:00:38 hqnl0246134 sshd[214708]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.135.153.186 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 13:00:39,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324438.9779015, 'message': 'Dec 6 13:00:38 hqnl0246134 sshd[214708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.153.186 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-06 13:00:43,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324442.9769835, 'message': 'Dec 6 13:00:41 hqnl0246134 sshd[214708]: Failed password for invalid user user from 43.135.153.186 port 58942 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 13:00:45,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324444.9935937, 'message': 'Dec 6 13:00:43 hqnl0246134 sshd[214708]: Disconnected from invalid user user 43.135.153.186 port 58942 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0389 seconds
WARNING [2022-12-06 13:00:45,879] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:00:45,880] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:00:54,223] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:00:54,264] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0553 seconds
INFO [2022-12-06 13:00:57,134] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670324457.027366, 'message': 'Dec 6 13:00:55 hqnl0246134 sshd[214712]: Accepted password for supportwwwuser from 212.58.119.251 port 10669 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.1040 seconds
INFO [2022-12-06 13:01:19,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324479.066474, 'message': 'Dec 6 13:01:18 hqnl0246134 sshd[214780]: pam_imunify(sshd:auth): [IM360_RBL] The IP 197.165.163.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 13:01:19,143] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324479.0680666, 'message': 'Dec 6 13:01:18 hqnl0246134 sshd[214780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.165.163.95 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 13:01:20,332] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:01:20,333] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:01:20,346] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:01:20,365] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0310 seconds
INFO [2022-12-06 13:01:21,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324481.0619357, 'message': 'Dec 6 13:01:20 hqnl0246134 sshd[214780]: Failed password for root from 197.165.163.95 port 54088 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0821 seconds
INFO [2022-12-06 13:01:26,197] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:01:26,198] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:01:26,241] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:01:26,265] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0580 seconds
WARNING [2022-12-06 13:01:45,889] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:01:45,896] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:01:47,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324507.1045709, 'message': 'Dec 6 13:01:46 hqnl0246134 sshd[214813]: Invalid user elk from 43.135.153.186 port 51390', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0792 seconds
INFO [2022-12-06 13:01:47,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324507.106934, 'message': 'Dec 6 13:01:46 hqnl0246134 sshd[214813]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.135.153.186 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 13:01:47,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324507.1145012, 'message': 'Dec 6 13:01:46 hqnl0246134 sshd[214813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.153.186 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 13:01:49,128] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324509.1048307, 'message': 'Dec 6 13:01:48 hqnl0246134 sshd[214813]: Failed password for invalid user elk from 43.135.153.186 port 51390 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 13:01:51,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324511.1079264, 'message': 'Dec 6 13:01:49 hqnl0246134 sshd[214813]: Disconnected from invalid user elk 43.135.153.186 port 51390 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0662 seconds
WARNING [2022-12-06 13:01:53,262] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 13:01:54,292] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:01:54,404] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.1876 seconds
INFO [2022-12-06 13:01:54,874] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:01:54,875] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:01:54,884] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:01:54,897] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 13:02:19,867] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:02:19,869] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:02:19,878] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:02:19,891] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-06 13:02:25,849] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:02:25,850] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:02:25,861] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:02:25,878] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0270 seconds
WARNING [2022-12-06 13:02:45,900] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:02:45,908] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:02:53,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324573.197841, 'message': 'Dec 6 13:02:52 hqnl0246134 sshd[214876]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.135.153.186 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 13:02:53,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324573.1985195, 'message': 'Dec 6 13:02:52 hqnl0246134 sshd[214876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.153.186 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 13:02:54,229] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:02:54,263] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0423 seconds
INFO [2022-12-06 13:02:55,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.135.153.186', 'timestamp': 1670324575.1984904, 'message': 'Dec 6 13:02:54 hqnl0246134 sshd[214876]: Failed password for root from 43.135.153.186 port 37314 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 13:03:05,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324585.2141159, 'message': 'Dec 6 13:03:03 hqnl0246134 sshd[214895]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.225.227 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0794 seconds
INFO [2022-12-06 13:03:05,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324585.2157502, 'message': 'Dec 6 13:03:03 hqnl0246134 sshd[214895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.225.227 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0508 seconds
INFO [2022-12-06 13:03:07,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324587.2115734, 'message': 'Dec 6 13:03:05 hqnl0246134 sshd[214895]: Failed password for root from 46.101.225.227 port 42586 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.2378 seconds
INFO [2022-12-06 13:03:07,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.41.247', 'timestamp': 1670324587.2119336, 'message': 'Dec 6 13:03:06 hqnl0246134 sshd[214906]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.41.247 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.2379 seconds
INFO [2022-12-06 13:03:07,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.41.247', 'timestamp': 1670324587.212292, 'message': 'Dec 6 13:03:06 hqnl0246134 sshd[214906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.41.247 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1012 seconds
INFO [2022-12-06 13:03:09,337] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '137.184.41.247', 'timestamp': 1670324589.218538, 'message': 'Dec 6 13:03:08 hqnl0246134 sshd[214906]: Failed password for root from 137.184.41.247 port 43534 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1187 seconds
INFO [2022-12-06 13:03:19,328] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324599.2544255, 'message': 'Dec 6 13:03:19 hqnl0246134 sshd[214918]: Invalid user jenkins from 143.198.75.234 port 36768', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0704 seconds
INFO [2022-12-06 13:03:19,361] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324599.261219, 'message': 'Dec 6 13:03:19 hqnl0246134 sshd[214918]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.75.234 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 13:03:19,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324599.261528, 'message': 'Dec 6 13:03:19 hqnl0246134 sshd[214918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.75.234 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 13:03:21,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324601.2505913, 'message': 'Dec 6 13:03:21 hqnl0246134 sshd[214918]: Failed password for invalid user jenkins from 143.198.75.234 port 36768 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 13:03:23,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324603.251659, 'message': 'Dec 6 13:03:22 hqnl0246134 sshd[214918]: Disconnected from invalid user jenkins 143.198.75.234 port 36768 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0759 seconds
INFO [2022-12-06 13:03:23,506] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:03:23,507] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:03:23,516] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:03:23,531] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
INFO [2022-12-06 13:03:27,540] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:03:27,541] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:03:27,550] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:03:27,567] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0259 seconds
INFO [2022-12-06 13:03:31,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324611.266638, 'message': 'Dec 6 13:03:30 hqnl0246134 sshd[214939]: Invalid user steam from 206.81.14.65 port 58392', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0520 seconds
INFO [2022-12-06 13:03:31,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324611.2669814, 'message': 'Dec 6 13:03:31 hqnl0246134 sshd[214939]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.81.14.65 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 13:03:31,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324611.2671936, 'message': 'Dec 6 13:03:31 hqnl0246134 sshd[214939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.14.65 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0572 seconds
INFO [2022-12-06 13:03:35,504] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324615.2697523, 'message': 'Dec 6 13:03:33 hqnl0246134 sshd[214939]: Failed password for invalid user steam from 206.81.14.65 port 58392 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.2223 seconds
INFO [2022-12-06 13:03:35,725] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324615.2703586, 'message': 'Dec 6 13:03:34 hqnl0246134 sshd[214939]: Disconnected from invalid user steam 206.81.14.65 port 58392 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.2185 seconds
WARNING [2022-12-06 13:03:45,912] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:03:45,913] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:03:49,357] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324629.2829578, 'message': 'Dec 6 13:03:47 hqnl0246134 sshd[214945]: Invalid user ttt from 206.189.236.198 port 53282', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0735 seconds
INFO [2022-12-06 13:03:49,362] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324629.2835217, 'message': 'Dec 6 13:03:48 hqnl0246134 sshd[214947]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0763 seconds
INFO [2022-12-06 13:03:49,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324629.283232, 'message': 'Dec 6 13:03:47 hqnl0246134 sshd[214945]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.189.236.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0525 seconds
INFO [2022-12-06 13:03:49,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324629.283659, 'message': 'Dec 6 13:03:48 hqnl0246134 sshd[214947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.47 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0497 seconds
INFO [2022-12-06 13:03:49,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324629.2833555, 'message': 'Dec 6 13:03:47 hqnl0246134 sshd[214945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.236.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 13:03:49,458] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324629.283781, 'message': 'Dec 6 13:03:49 hqnl0246134 sshd[214945]: Failed password for invalid user ttt from 206.189.236.198 port 53282 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 13:03:51,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324631.2859354, 'message': 'Dec 6 13:03:49 hqnl0246134 sshd[214945]: Disconnected from invalid user ttt 206.189.236.198 port 53282 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0682 seconds
INFO [2022-12-06 13:03:51,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324631.2863004, 'message': 'Dec 6 13:03:50 hqnl0246134 sshd[214947]: Failed password for root from 61.177.173.47 port 41738 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0683 seconds
INFO [2022-12-06 13:03:53,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324633.2883897, 'message': 'Dec 6 13:03:52 hqnl0246134 sshd[214947]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
WARNING [2022-12-06 13:03:54,231] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:03:54,278] defence360agent.internals.the_sink: SensorIncidentList(<19 item(s)>) processed in 0.0545 seconds
INFO [2022-12-06 13:03:55,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324635.2909946, 'message': 'Dec 6 13:03:54 hqnl0246134 sshd[214947]: Failed password for root from 61.177.173.47 port 41738 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 13:03:57,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324637.2936616, 'message': 'Dec 6 13:03:57 hqnl0246134 sshd[214947]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 13:03:59,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324639.2957075, 'message': 'Dec 6 13:03:58 hqnl0246134 sshd[214947]: Failed password for root from 61.177.173.47 port 41738 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 13:04:01,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324641.3086736, 'message': 'Dec 6 13:04:00 hqnl0246134 sshd[214965]: Invalid user user from 197.165.163.95 port 48840', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0685 seconds
INFO [2022-12-06 13:04:01,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324641.3095107, 'message': 'Dec 6 13:04:00 hqnl0246134 sshd[214960]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0690 seconds
INFO [2022-12-06 13:04:01,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324641.3090239, 'message': 'Dec 6 13:04:00 hqnl0246134 sshd[214965]: pam_imunify(sshd:auth): [IM360_RBL] The IP 197.165.163.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0726 seconds
INFO [2022-12-06 13:04:01,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324641.3096688, 'message': 'Dec 6 13:04:00 hqnl0246134 sshd[214960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.47 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0717 seconds
INFO [2022-12-06 13:04:01,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324641.309387, 'message': 'Dec 6 13:04:00 hqnl0246134 sshd[214965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.165.163.95 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 13:04:03,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.121.113.183', 'timestamp': 1670324643.3111162, 'message': 'Dec 6 13:04:02 hqnl0246134 sshd[214962]: Invalid user ttt from 20.121.113.183 port 1152', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1169 seconds
INFO [2022-12-06 13:04:03,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324643.3120117, 'message': 'Dec 6 13:04:03 hqnl0246134 sshd[214965]: Failed password for invalid user user from 197.165.163.95 port 48840 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1240 seconds
INFO [2022-12-06 13:04:03,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324643.3122258, 'message': 'Dec 6 13:04:03 hqnl0246134 sshd[214960]: Failed password for root from 61.177.173.47 port 40318 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1242 seconds
INFO [2022-12-06 13:04:03,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.121.113.183', 'timestamp': 1670324643.3115551, 'message': 'Dec 6 13:04:03 hqnl0246134 sshd[214962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.121.113.183 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0556 seconds
INFO [2022-12-06 13:04:03,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.121.113.183', 'timestamp': 1670324643.3118691, 'message': 'Dec 6 13:04:03 hqnl0246134 sshd[214962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.121.113.183 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0540 seconds
INFO [2022-12-06 13:04:04,533] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:04:04,534] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:04:04,552] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:04:04,592] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0562 seconds
INFO [2022-12-06 13:04:05,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324645.3112452, 'message': 'Dec 6 13:04:04 hqnl0246134 sshd[214965]: Disconnected from invalid user user 197.165.163.95 port 48840 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0613 seconds
INFO [2022-12-06 13:04:05,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324645.3114374, 'message': 'Dec 6 13:04:05 hqnl0246134 sshd[214960]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0629 seconds
INFO [2022-12-06 13:04:05,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.121.113.183', 'timestamp': 1670324645.3115993, 'message': 'Dec 6 13:04:05 hqnl0246134 sshd[214962]: Failed password for invalid user ttt from 20.121.113.183 port 1152 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0634 seconds
INFO [2022-12-06 13:04:07,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.121.113.183', 'timestamp': 1670324647.3145165, 'message': 'Dec 6 13:04:06 hqnl0246134 sshd[214962]: Disconnected from invalid user ttt 20.121.113.183 port 1152 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0510 seconds
INFO [2022-12-06 13:04:07,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324647.3150768, 'message': 'Dec 6 13:04:07 hqnl0246134 sshd[214960]: Failed password for root from 61.177.173.47 port 40318 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0510 seconds
INFO [2022-12-06 13:04:09,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324649.317143, 'message': 'Dec 6 13:04:07 hqnl0246134 sshd[214960]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 13:04:11,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324651.319372, 'message': 'Dec 6 13:04:09 hqnl0246134 sshd[214960]: Failed password for root from 61.177.173.47 port 40318 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 13:04:15,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324655.323236, 'message': 'Dec 6 13:04:13 hqnl0246134 sshd[214984]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 13:04:15,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324655.3237588, 'message': 'Dec 6 13:04:13 hqnl0246134 sshd[214984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.47 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 13:04:17,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324657.3224235, 'message': 'Dec 6 13:04:15 hqnl0246134 sshd[214984]: Failed password for root from 61.177.173.47 port 19364 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 13:04:17,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324657.3228154, 'message': 'Dec 6 13:04:15 hqnl0246134 sshd[214984]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 13:04:18,231] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:04:18,231] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:04:18,240] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:04:18,255] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0234 seconds
INFO [2022-12-06 13:04:19,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324659.3246932, 'message': 'Dec 6 13:04:17 hqnl0246134 sshd[214984]: Failed password for root from 61.177.173.47 port 19364 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-06 13:04:19,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324659.3259983, 'message': 'Dec 6 13:04:18 hqnl0246134 sshd[214984]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 13:04:21,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670324661.3260102, 'message': 'Dec 6 13:04:19 hqnl0246134 sshd[214984]: Failed password for root from 61.177.173.47 port 19364 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 13:04:21,922] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:04:21,922] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:04:21,931] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:04:21,945] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0224 seconds
WARNING [2022-12-06 13:04:45,917] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:04:45,918] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:04:54,272] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:04:54,312] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0495 seconds
INFO [2022-12-06 13:05:03,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '35.200.141.182', 'timestamp': 1670324703.3836026, 'message': 'Dec 6 13:05:01 hqnl0246134 sshd[215029]: Invalid user test02 from 35.200.141.182 port 48754', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 13:05:03,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '35.200.141.182', 'timestamp': 1670324703.3841002, 'message': 'Dec 6 13:05:01 hqnl0246134 sshd[215029]: pam_imunify(sshd:auth): [IM360_RBL] The IP 35.200.141.182 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 13:05:03,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '35.200.141.182', 'timestamp': 1670324703.3846173, 'message': 'Dec 6 13:05:01 hqnl0246134 sshd[215029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.141.182 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 13:05:05,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '35.200.141.182', 'timestamp': 1670324705.3843608, 'message': 'Dec 6 13:05:04 hqnl0246134 sshd[215029]: Failed password for invalid user test02 from 35.200.141.182 port 48754 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 13:05:05,455] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '35.200.141.182', 'timestamp': 1670324705.3846931, 'message': 'Dec 6 13:05:05 hqnl0246134 sshd[215029]: Disconnected from invalid user test02 35.200.141.182 port 48754 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 13:05:10,384] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:05:10,385] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:05:10,408] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:05:10,448] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0549 seconds
INFO [2022-12-06 13:05:18,160] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:05:18,160] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:05:18,169] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:05:18,185] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0237 seconds
INFO [2022-12-06 13:05:22,266] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:05:22,267] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:05:22,275] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:05:22,288] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 13:05:23,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324723.4025185, 'message': 'Dec 6 13:05:21 hqnl0246134 sshd[215080]: Invalid user trace from 212.60.80.58 port 37663', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 13:05:23,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324723.402745, 'message': 'Dec 6 13:05:21 hqnl0246134 sshd[215080]: pam_imunify(sshd:auth): [IM360_RBL] The IP 212.60.80.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 13:05:23,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324723.402872, 'message': 'Dec 6 13:05:21 hqnl0246134 sshd[215080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.60.80.58 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 13:05:25,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324725.4062855, 'message': 'Dec 6 13:05:24 hqnl0246134 sshd[215080]: Failed password for invalid user trace from 212.60.80.58 port 37663 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1765 seconds
INFO [2022-12-06 13:05:25,688] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324725.4067984, 'message': 'Dec 6 13:05:24 hqnl0246134 sshd[215080]: Disconnected from invalid user trace 212.60.80.58 port 37663 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0945 seconds
INFO [2022-12-06 13:05:28,385] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:05:28,465] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:05:28,468] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:05:28,471] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:05:28,471] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:05:28,472] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:05:28,603] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:05:28,699] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.2232 seconds
WARNING [2022-12-06 13:05:28,718] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:05:28,727] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:05:28,854] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.1861 seconds
INFO [2022-12-06 13:05:28,886] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.1953 seconds
WARNING [2022-12-06 13:05:45,921] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:05:45,924] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:05:53,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.188.184', 'timestamp': 1670324753.4456553, 'message': 'Dec 6 13:05:51 hqnl0246134 sshd[215108]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.188.184 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 13:05:53,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.188.184', 'timestamp': 1670324753.4464533, 'message': 'Dec 6 13:05:51 hqnl0246134 sshd[215108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.188.184 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0225 seconds
WARNING [2022-12-06 13:05:54,283] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:05:54,315] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0443 seconds
INFO [2022-12-06 13:05:55,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '128.199.188.184', 'timestamp': 1670324755.445575, 'message': 'Dec 6 13:05:54 hqnl0246134 sshd[215108]: Failed password for root from 128.199.188.184 port 56892 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 13:05:58,606] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:05:58,607] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:05:58,608] im360.plugins.client360: Waiting 2 minutes before retry...
INFO [2022-12-06 13:06:05,511] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324765.4545405, 'message': 'Dec 6 13:06:04 hqnl0246134 sshd[215132]: Invalid user argo from 206.81.14.65 port 49290', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0552 seconds
INFO [2022-12-06 13:06:05,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324765.4552305, 'message': 'Dec 6 13:06:04 hqnl0246134 sshd[215132]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.81.14.65 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 13:06:05,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324765.4569783, 'message': 'Dec 6 13:06:04 hqnl0246134 sshd[215132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.14.65 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1309 seconds
INFO [2022-12-06 13:06:07,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324767.4575465, 'message': 'Dec 6 13:06:06 hqnl0246134 sshd[215132]: Failed password for invalid user argo from 206.81.14.65 port 49290 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0394 seconds
INFO [2022-12-06 13:06:07,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324767.457738, 'message': 'Dec 6 13:06:06 hqnl0246134 sshd[215132]: Disconnected from invalid user argo 206.81.14.65 port 49290 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0484 seconds
INFO [2022-12-06 13:06:11,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324771.463671, 'message': 'Dec 6 13:06:10 hqnl0246134 sshd[215138]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.75.234 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 13:06:11,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324771.4640827, 'message': 'Dec 6 13:06:10 hqnl0246134 sshd[215138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.75.234 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 13:06:13,493] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324773.4655173, 'message': 'Dec 6 13:06:12 hqnl0246134 sshd[215138]: Failed password for root from 143.198.75.234 port 60332 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 13:06:19,167] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:06:19,168] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:06:19,180] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:06:19,228] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0582 seconds
INFO [2022-12-06 13:06:25,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324785.488326, 'message': 'Dec 6 13:06:24 hqnl0246134 sshd[215158]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.225.227 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0915 seconds
INFO [2022-12-06 13:06:25,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324785.4941266, 'message': 'Dec 6 13:06:24 hqnl0246134 sshd[215158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.225.227 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0433 seconds
INFO [2022-12-06 13:06:25,818] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:06:25,818] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:06:25,836] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:06:25,850] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 13:06:27,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324787.4879856, 'message': 'Dec 6 13:06:27 hqnl0246134 sshd[215158]: Failed password for root from 46.101.225.227 port 60300 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 13:06:33,425] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:06:33,425] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:06:33,434] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:06:33,516] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0897 seconds
INFO [2022-12-06 13:06:45,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324805.5227745, 'message': 'Dec 6 13:06:43 hqnl0246134 sshd[215173]: pam_imunify(sshd:auth): [IM360_RBL] The IP 197.165.163.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0522 seconds
INFO [2022-12-06 13:06:45,595] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324805.5232525, 'message': 'Dec 6 13:06:43 hqnl0246134 sshd[215173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.165.163.95 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 13:06:45,930] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:06:45,931] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:06:47,542] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '197.165.163.95', 'timestamp': 1670324807.5213366, 'message': 'Dec 6 13:06:46 hqnl0246134 sshd[215173]: Failed password for root from 197.165.163.95 port 34874 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 13:06:49,545] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324809.5249364, 'message': 'Dec 6 13:06:47 hqnl0246134 sshd[215175]: Invalid user marie from 206.189.236.198 port 54342', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 13:06:49,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324809.525213, 'message': 'Dec 6 13:06:48 hqnl0246134 sshd[215175]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.189.236.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 13:06:49,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324809.5253727, 'message': 'Dec 6 13:06:48 hqnl0246134 sshd[215175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.236.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 13:06:51,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324811.5292752, 'message': 'Dec 6 13:06:50 hqnl0246134 sshd[215175]: Failed password for invalid user marie from 206.189.236.198 port 54342 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 13:06:53,548] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324813.5314724, 'message': 'Dec 6 13:06:52 hqnl0246134 sshd[215175]: Disconnected from invalid user marie 206.189.236.198 port 54342 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0166 seconds
WARNING [2022-12-06 13:06:54,284] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:06:54,321] defence360agent.internals.the_sink: SensorIncidentList(<16 item(s)>) processed in 0.0472 seconds
INFO [2022-12-06 13:07:18,891] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:07:18,892] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:07:18,902] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:07:18,917] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0236 seconds
INFO [2022-12-06 13:07:21,796] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:07:21,797] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:07:21,805] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:07:21,819] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 13:07:31,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324851.5889187, 'message': 'Dec 6 13:07:31 hqnl0246134 sshd[215227]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 13:07:31,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324851.5893438, 'message': 'Dec 6 13:07:31 hqnl0246134 sshd[215227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 13:07:33,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324853.5904334, 'message': 'Dec 6 13:07:33 hqnl0246134 sshd[215227]: Failed password for root from 61.177.173.46 port 20206 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 13:07:33,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.121.113.183', 'timestamp': 1670324853.5906973, 'message': 'Dec 6 13:07:33 hqnl0246134 sshd[215229]: Invalid user dm from 20.121.113.183 port 1153', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 13:07:33,639] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.121.113.183', 'timestamp': 1670324853.5909483, 'message': 'Dec 6 13:07:33 hqnl0246134 sshd[215229]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.121.113.183 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 13:07:33,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.121.113.183', 'timestamp': 1670324853.5911267, 'message': 'Dec 6 13:07:33 hqnl0246134 sshd[215229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.121.113.183 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 13:07:35,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.121.113.183', 'timestamp': 1670324855.5928223, 'message': 'Dec 6 13:07:34 hqnl0246134 sshd[215229]: Failed password for invalid user dm from 20.121.113.183 port 1153 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 13:07:35,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324855.5930083, 'message': 'Dec 6 13:07:35 hqnl0246134 sshd[215227]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 13:07:37,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.121.113.183', 'timestamp': 1670324857.5936291, 'message': 'Dec 6 13:07:35 hqnl0246134 sshd[215229]: Disconnected from invalid user dm 20.121.113.183 port 1153 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 13:07:39,616] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324859.5959158, 'message': 'Dec 6 13:07:37 hqnl0246134 sshd[215227]: Failed password for root from 61.177.173.46 port 20206 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 13:07:41,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324861.5984924, 'message': 'Dec 6 13:07:39 hqnl0246134 sshd[215227]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 13:07:41,653] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324861.5987391, 'message': 'Dec 6 13:07:41 hqnl0246134 sshd[215227]: Failed password for root from 61.177.173.46 port 20206 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
WARNING [2022-12-06 13:07:45,933] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:07:45,934] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:07:47,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324867.6053872, 'message': 'Dec 6 13:07:45 hqnl0246134 sshd[215232]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 13:07:47,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324867.6057813, 'message': 'Dec 6 13:07:45 hqnl0246134 sshd[215232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 13:07:47,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324867.605951, 'message': 'Dec 6 13:07:46 hqnl0246134 sshd[215232]: Failed password for root from 61.177.173.46 port 62887 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 13:07:49,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324869.6077545, 'message': 'Dec 6 13:07:48 hqnl0246134 sshd[215232]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 13:07:51,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324871.609967, 'message': 'Dec 6 13:07:50 hqnl0246134 sshd[215232]: Failed password for root from 61.177.173.46 port 62887 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 13:07:53,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324873.6126294, 'message': 'Dec 6 13:07:52 hqnl0246134 sshd[215232]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
WARNING [2022-12-06 13:07:54,346] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:07:55,176] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.8788 seconds
INFO [2022-12-06 13:07:55,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670324875.6145241, 'message': 'Dec 6 13:07:54 hqnl0246134 sshd[215232]: Failed password for root from 61.177.173.46 port 62887 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 13:07:57,976] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:07:57,977] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:07:57,987] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:07:58,005] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0268 seconds
INFO [2022-12-06 13:08:18,092] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:08:18,092] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:08:18,107] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:08:18,145] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0440 seconds
INFO [2022-12-06 13:08:22,321] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:08:22,322] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:08:22,345] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:08:22,370] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0408 seconds
INFO [2022-12-06 13:08:27,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.158.139.57', 'timestamp': 1670324907.6531487, 'message': 'Dec 6 13:08:27 hqnl0246134 sshd[215289]: Invalid user ubuntu from 202.158.139.57 port 38510', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0572 seconds
INFO [2022-12-06 13:08:29,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.158.139.57', 'timestamp': 1670324909.6539757, 'message': 'Dec 6 13:08:27 hqnl0246134 sshd[215289]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.158.139.57 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 13:08:29,697] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.158.139.57', 'timestamp': 1670324909.6550443, 'message': 'Dec 6 13:08:27 hqnl0246134 sshd[215289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 13:08:29,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.158.139.57', 'timestamp': 1670324909.6552196, 'message': 'Dec 6 13:08:29 hqnl0246134 sshd[215289]: Failed password for invalid user ubuntu from 202.158.139.57 port 38510 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 13:08:31,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.158.139.57', 'timestamp': 1670324911.6564052, 'message': 'Dec 6 13:08:29 hqnl0246134 sshd[215289]: Disconnected from invalid user ubuntu 202.158.139.57 port 38510 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 13:08:33,703] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324913.6593308, 'message': 'Dec 6 13:08:33 hqnl0246134 sshd[215292]: Invalid user celery from 212.60.80.58 port 33886', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0431 seconds
INFO [2022-12-06 13:08:33,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324913.6607714, 'message': 'Dec 6 13:08:33 hqnl0246134 sshd[215294]: Invalid user ips from 206.81.14.65 port 33900', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 13:08:33,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324913.660445, 'message': 'Dec 6 13:08:33 hqnl0246134 sshd[215292]: pam_imunify(sshd:auth): [IM360_RBL] The IP 212.60.80.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 13:08:33,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324913.6608872, 'message': 'Dec 6 13:08:33 hqnl0246134 sshd[215294]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.81.14.65 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 13:08:33,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324913.6606205, 'message': 'Dec 6 13:08:33 hqnl0246134 sshd[215292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.60.80.58 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0402 seconds
INFO [2022-12-06 13:08:33,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324913.6610482, 'message': 'Dec 6 13:08:33 hqnl0246134 sshd[215294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.14.65 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0399 seconds
INFO [2022-12-06 13:08:35,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324915.6608684, 'message': 'Dec 6 13:08:35 hqnl0246134 sshd[215292]: Failed password for invalid user celery from 212.60.80.58 port 33886 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 13:08:35,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324915.6611912, 'message': 'Dec 6 13:08:35 hqnl0246134 sshd[215294]: Failed password for invalid user ips from 206.81.14.65 port 33900 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0492 seconds
INFO [2022-12-06 13:08:37,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.81.14.65', 'timestamp': 1670324917.6618204, 'message': 'Dec 6 13:08:35 hqnl0246134 sshd[215294]: Disconnected from invalid user ips 206.81.14.65 port 33900 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 13:08:37,696] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670324917.6620562, 'message': 'Dec 6 13:08:36 hqnl0246134 sshd[215292]: Disconnected from invalid user celery 212.60.80.58 port 33886 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
WARNING [2022-12-06 13:08:45,937] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:08:45,939] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:08:54,342] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:08:54,400] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0946 seconds
INFO [2022-12-06 13:08:55,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324935.726969, 'message': 'Dec 6 13:08:54 hqnl0246134 sshd[215303]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.75.234 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0785 seconds
INFO [2022-12-06 13:08:55,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324935.727468, 'message': 'Dec 6 13:08:54 hqnl0246134 sshd[215303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.75.234 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 13:08:57,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '143.198.75.234', 'timestamp': 1670324937.720345, 'message': 'Dec 6 13:08:55 hqnl0246134 sshd[215303]: Failed password for root from 143.198.75.234 port 37734 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 13:08:57,843] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:08:57,916] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:08:57,917] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:08:57,918] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:08:57,918] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:08:57,919] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:08:57,936] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:08:57,965] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0451 seconds
WARNING [2022-12-06 13:08:57,978] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:08:57,983] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:08:58,016] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0607 seconds
INFO [2022-12-06 13:08:58,018] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0571 seconds
INFO [2022-12-06 13:08:59,633] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:08:59,634] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:08:59,642] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:08:59,654] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 13:09:09,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.68.82.194', 'timestamp': 1670324949.7405474, 'message': 'Dec 6 13:09:07 hqnl0246134 sshd[215455]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.68.82.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 13:09:09,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.68.82.194', 'timestamp': 1670324949.740765, 'message': 'Dec 6 13:09:07 hqnl0246134 sshd[215455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.82.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 13:09:11,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.68.82.194', 'timestamp': 1670324951.7651007, 'message': 'Dec 6 13:09:10 hqnl0246134 sshd[215455]: Failed password for root from 138.68.82.194 port 34548 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0492 seconds
INFO [2022-12-06 13:09:11,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324951.7653866, 'message': 'Dec 6 13:09:10 hqnl0246134 sshd[215458]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.225.227 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0502 seconds
INFO [2022-12-06 13:09:11,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324951.765555, 'message': 'Dec 6 13:09:10 hqnl0246134 sshd[215458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.225.227 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 13:09:13,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '46.101.225.227', 'timestamp': 1670324953.766009, 'message': 'Dec 6 13:09:11 hqnl0246134 sshd[215458]: Failed password for root from 46.101.225.227 port 49778 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0687 seconds
INFO [2022-12-06 13:09:18,309] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:09:18,309] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:09:18,318] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:09:18,358] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0476 seconds
INFO [2022-12-06 13:09:21,645] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:09:21,646] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:09:21,659] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:09:21,681] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0335 seconds
INFO [2022-12-06 13:09:28,054] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:09:28,056] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:09:28,067] im360.plugins.client360: Waiting 2 minutes before retry...
INFO [2022-12-06 13:09:33,876] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.17.230.180', 'timestamp': 1670324973.7857382, 'message': 'Dec 6 13:09:32 hqnl0246134 sshd[215484]: Invalid user claudio from 217.17.230.180 port 38842', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0878 seconds
INFO [2022-12-06 13:09:33,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670324973.791136, 'message': 'Dec 6 13:09:33 hqnl0246134 sshd[215474]: Accepted password for supportwwwuser from 212.58.119.251 port 10538 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0858 seconds
INFO [2022-12-06 13:09:33,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.17.230.180', 'timestamp': 1670324973.7904825, 'message': 'Dec 6 13:09:33 hqnl0246134 sshd[215484]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.17.230.180 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 13:09:33,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.17.230.180', 'timestamp': 1670324973.7908387, 'message': 'Dec 6 13:09:33 hqnl0246134 sshd[215484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.17.230.180 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 13:09:35,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.17.230.180', 'timestamp': 1670324975.7845483, 'message': 'Dec 6 13:09:35 hqnl0246134 sshd[215484]: Failed password for invalid user claudio from 217.17.230.180 port 38842 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 13:09:37,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.17.230.180', 'timestamp': 1670324977.7856684, 'message': 'Dec 6 13:09:36 hqnl0246134 sshd[215484]: Disconnected from invalid user claudio 217.17.230.180 port 38842 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 13:09:41,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324981.7917159, 'message': 'Dec 6 13:09:41 hqnl0246134 sshd[215531]: Invalid user dm from 206.189.236.198 port 32968', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 13:09:41,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324981.792955, 'message': 'Dec 6 13:09:41 hqnl0246134 sshd[215531]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.189.236.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 13:09:41,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324981.7931542, 'message': 'Dec 6 13:09:41 hqnl0246134 sshd[215531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.236.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 13:09:43,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324983.7925227, 'message': 'Dec 6 13:09:43 hqnl0246134 sshd[215531]: Failed password for invalid user dm from 206.189.236.198 port 32968 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 13:09:43,833] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.236.198', 'timestamp': 1670324983.7927394, 'message': 'Dec 6 13:09:43 hqnl0246134 sshd[215531]: Disconnected from invalid user dm 206.189.236.198 port 32968 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
WARNING [2022-12-06 13:09:45,943] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:09:45,944] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:09:54,329] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:09:54,381] defence360agent.internals.the_sink: SensorIncidentList(<16 item(s)>) processed in 0.0683 seconds
INFO [2022-12-06 13:09:57,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.41.247', 'timestamp': 1670324997.8070097, 'message': 'Dec 6 13:09:56 hqnl0246134 sshd[215535]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.41.247 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 13:09:57,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.41.247', 'timestamp': 1670324997.8074882, 'message': 'Dec 6 13:09:56 hqnl0246134 sshd[215535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.41.247 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 13:09:59,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '137.184.41.247', 'timestamp': 1670324999.806272, 'message': 'Dec 6 13:09:58 hqnl0246134 sshd[215535]: Failed password for root from 137.184.41.247 port 44182 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 13:10:05,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670325005.8130846, 'message': 'Dec 6 13:10:04 hqnl0246134 sshd[215562]: Accepted password for supportwwwuser from 212.58.119.251 port 10541 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 13:10:09,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325009.8198433, 'message': 'Dec 6 13:10:08 hqnl0246134 sshd[215605]: Invalid user python from 157.230.113.181 port 39572', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 13:10:09,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325009.8205483, 'message': 'Dec 6 13:10:08 hqnl0246134 sshd[215605]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.230.113.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 13:10:09,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325009.8207371, 'message': 'Dec 6 13:10:08 hqnl0246134 sshd[215605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.181 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 13:10:11,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325011.8206184, 'message': 'Dec 6 13:10:11 hqnl0246134 sshd[215605]: Failed password for invalid user python from 157.230.113.181 port 39572 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 13:10:13,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325013.820468, 'message': 'Dec 6 13:10:12 hqnl0246134 sshd[215605]: Disconnected from invalid user python 157.230.113.181 port 39572 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0403 seconds
INFO [2022-12-06 13:10:16,276] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:10:16,277] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:10:16,285] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:10:16,301] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0224 seconds
INFO [2022-12-06 13:10:19,348] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:10:19,349] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:10:19,363] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:10:19,390] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0405 seconds
INFO [2022-12-06 13:10:24,291] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:10:24,292] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:10:24,304] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:10:24,318] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 13:10:43,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325043.8533425, 'message': 'Dec 6 13:10:43 hqnl0246134 sshd[215652]: Invalid user ftpsecure from 128.199.188.184 port 54436', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0482 seconds
INFO [2022-12-06 13:10:43,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325043.8540714, 'message': 'Dec 6 13:10:43 hqnl0246134 sshd[215652]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.188.184 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 13:10:43,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325043.8543463, 'message': 'Dec 6 13:10:43 hqnl0246134 sshd[215652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.188.184 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 13:10:45,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325045.8542511, 'message': 'Dec 6 13:10:45 hqnl0246134 sshd[215652]: Failed password for invalid user ftpsecure from 128.199.188.184 port 54436 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0470 seconds
WARNING [2022-12-06 13:10:45,946] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:10:45,947] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:10:47,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325047.856882, 'message': 'Dec 6 13:10:47 hqnl0246134 sshd[215652]: Disconnected from invalid user ftpsecure 128.199.188.184 port 54436 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0351 seconds
WARNING [2022-12-06 13:10:54,347] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:10:54,430] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0935 seconds
INFO [2022-12-06 13:11:03,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.121.113.183', 'timestamp': 1670325063.8946495, 'message': 'Dec 6 13:11:02 hqnl0246134 sshd[215666]: Invalid user marie from 20.121.113.183 port 1152', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0617 seconds
INFO [2022-12-06 13:11:03,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325063.896445, 'message': 'Dec 6 13:11:02 hqnl0246134 sshd[215668]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0595 seconds
INFO [2022-12-06 13:11:04,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.121.113.183', 'timestamp': 1670325063.8957798, 'message': 'Dec 6 13:11:02 hqnl0246134 sshd[215666]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.121.113.183 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0406 seconds
INFO [2022-12-06 13:11:04,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325063.8967214, 'message': 'Dec 6 13:11:02 hqnl0246134 sshd[215668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0387 seconds
INFO [2022-12-06 13:11:04,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.121.113.183', 'timestamp': 1670325063.8961494, 'message': 'Dec 6 13:11:02 hqnl0246134 sshd[215666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.121.113.183 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 13:11:05,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.121.113.183', 'timestamp': 1670325065.8828747, 'message': 'Dec 6 13:11:05 hqnl0246134 sshd[215666]: Failed password for invalid user marie from 20.121.113.183 port 1152 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0529 seconds
INFO [2022-12-06 13:11:05,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325065.883538, 'message': 'Dec 6 13:11:05 hqnl0246134 sshd[215668]: Failed password for root from 61.177.172.114 port 38325 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0533 seconds
INFO [2022-12-06 13:11:07,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.121.113.183', 'timestamp': 1670325067.8934023, 'message': 'Dec 6 13:11:06 hqnl0246134 sshd[215666]: Disconnected from invalid user marie 20.121.113.183 port 1152 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 13:11:07,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325067.8937864, 'message': 'Dec 6 13:11:07 hqnl0246134 sshd[215668]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 13:11:09,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '212.58.119.251', 'timestamp': 1670325069.8870049, 'message': 'Dec 6 13:11:08 hqnl0246134 sshd[215677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.58.119.251 user=supportwwwuser', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1098 seconds
INFO [2022-12-06 13:11:09,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325069.8872852, 'message': 'Dec 6 13:11:09 hqnl0246134 sshd[215668]: Failed password for root from 61.177.172.114 port 38325 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1096 seconds
INFO [2022-12-06 13:11:11,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '212.58.119.251', 'timestamp': 1670325071.889211, 'message': 'Dec 6 13:11:10 hqnl0246134 sshd[215677]: Failed password for supportwwwuser from 212.58.119.251 port 10546 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 13:11:11,922] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325071.8894968, 'message': 'Dec 6 13:11:11 hqnl0246134 sshd[215668]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 13:11:14,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325073.9108112, 'message': 'Dec 6 13:11:12 hqnl0246134 sshd[215679]: Invalid user pavel from 43.153.100.118 port 60800', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1277 seconds
INFO [2022-12-06 13:11:14,051] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325073.9111707, 'message': 'Dec 6 13:11:12 hqnl0246134 sshd[215680]: Invalid user felix from 35.200.141.182 port 39416', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1306 seconds
INFO [2022-12-06 13:11:14,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325073.9118302, 'message': 'Dec 6 13:11:12 hqnl0246134 sshd[215679]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.100.118 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1919 seconds
INFO [2022-12-06 13:11:14,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325073.9113276, 'message': 'Dec 6 13:11:12 hqnl0246134 sshd[215680]: pam_imunify(sshd:auth): [IM360_RBL] The IP 35.200.141.182 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1907 seconds
INFO [2022-12-06 13:11:14,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325073.9121342, 'message': 'Dec 6 13:11:13 hqnl0246134 sshd[215668]: Failed password for root from 61.177.172.114 port 38325 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1901 seconds
INFO [2022-12-06 13:11:14,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325073.911961, 'message': 'Dec 6 13:11:12 hqnl0246134 sshd[215679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.100.118 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 13:11:14,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325073.9114566, 'message': 'Dec 6 13:11:12 hqnl0246134 sshd[215680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.141.182 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 13:11:16,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325075.8943594, 'message': 'Dec 6 13:11:14 hqnl0246134 sshd[215680]: Failed password for invalid user felix from 35.200.141.182 port 39416 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1763 seconds
INFO [2022-12-06 13:11:16,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325075.8962529, 'message': 'Dec 6 13:11:14 hqnl0246134 sshd[215679]: Failed password for invalid user pavel from 43.153.100.118 port 60800 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1887 seconds
INFO [2022-12-06 13:11:16,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325075.896572, 'message': 'Dec 6 13:11:15 hqnl0246134 sshd[215680]: Disconnected from invalid user felix 35.200.141.182 port 39416 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0723 seconds
INFO [2022-12-06 13:11:17,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325077.8968098, 'message': 'Dec 6 13:11:16 hqnl0246134 sshd[215679]: Disconnected from invalid user pavel 43.153.100.118 port 60800 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0620 seconds
INFO [2022-12-06 13:11:17,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325077.8971312, 'message': 'Dec 6 13:11:17 hqnl0246134 sshd[215686]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0628 seconds
INFO [2022-12-06 13:11:17,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325077.897311, 'message': 'Dec 6 13:11:17 hqnl0246134 sshd[215686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 13:11:20,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325079.9004931, 'message': 'Dec 6 13:11:18 hqnl0246134 sshd[215686]: Failed password for root from 61.177.172.114 port 37199 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1064 seconds
INFO [2022-12-06 13:11:20,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325079.900957, 'message': 'Dec 6 13:11:19 hqnl0246134 sshd[215686]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0437 seconds
INFO [2022-12-06 13:11:21,323] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:11:21,323] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:11:21,343] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:11:21,378] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0416 seconds
INFO [2022-12-06 13:11:21,958] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '212.58.119.251', 'timestamp': 1670325081.9019017, 'message': 'Dec 6 13:11:20 hqnl0246134 sshd[215677]: Failed password for supportwwwuser from 212.58.119.251 port 10546 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0560 seconds
INFO [2022-12-06 13:11:21,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325081.902956, 'message': 'Dec 6 13:11:21 hqnl0246134 sshd[215686]: Failed password for root from 61.177.172.114 port 37199 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0557 seconds
INFO [2022-12-06 13:11:24,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325083.907002, 'message': 'Dec 6 13:11:23 hqnl0246134 sshd[215686]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1065 seconds
INFO [2022-12-06 13:11:25,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325085.9060206, 'message': 'Dec 6 13:11:25 hqnl0246134 sshd[215686]: Failed password for root from 61.177.172.114 port 37199 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 13:11:27,453] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:11:27,453] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:11:27,487] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:11:27,533] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0644 seconds
INFO [2022-12-06 13:11:29,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325089.9108734, 'message': 'Dec 6 13:11:29 hqnl0246134 sshd[215707]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0632 seconds
INFO [2022-12-06 13:11:30,017] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325089.9112446, 'message': 'Dec 6 13:11:29 hqnl0246134 sshd[215707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-06 13:11:31,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325091.9132855, 'message': 'Dec 6 13:11:31 hqnl0246134 sshd[215707]: Failed password for root from 61.177.172.114 port 12867 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 13:11:31,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325091.9137182, 'message': 'Dec 6 13:11:31 hqnl0246134 sshd[215707]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 13:11:35,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325095.9172, 'message': 'Dec 6 13:11:33 hqnl0246134 sshd[215707]: Failed password for root from 61.177.172.114 port 12867 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0589 seconds
INFO [2022-12-06 13:11:37,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325097.9194107, 'message': 'Dec 6 13:11:36 hqnl0246134 sshd[215707]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 13:11:39,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325099.9188654, 'message': 'Dec 6 13:11:38 hqnl0246134 sshd[215707]: Failed password for root from 61.177.172.114 port 12867 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0540 seconds
INFO [2022-12-06 13:11:40,005] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325099.937324, 'message': 'Dec 6 13:11:39 hqnl0246134 sshd[215710]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 13:11:40,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325099.937522, 'message': 'Dec 6 13:11:39 hqnl0246134 sshd[215710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 13:11:44,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325103.9242601, 'message': 'Dec 6 13:11:42 hqnl0246134 sshd[215710]: Failed password for root from 61.177.172.114 port 37058 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1940 seconds
INFO [2022-12-06 13:11:44,133] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '212.60.80.58', 'timestamp': 1670325103.924938, 'message': 'Dec 6 13:11:43 hqnl0246134 sshd[215716]: pam_imunify(sshd:auth): [IM360_RBL] The IP 212.60.80.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.2070 seconds
INFO [2022-12-06 13:11:44,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '212.60.80.58', 'timestamp': 1670325103.9251008, 'message': 'Dec 6 13:11:43 hqnl0246134 sshd[215716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.60.80.58 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1353 seconds
WARNING [2022-12-06 13:11:45,950] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:11:45,952] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:11:46,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325105.9251568, 'message': 'Dec 6 13:11:44 hqnl0246134 sshd[215710]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0823 seconds
INFO [2022-12-06 13:11:46,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '212.60.80.58', 'timestamp': 1670325105.9264596, 'message': 'Dec 6 13:11:45 hqnl0246134 sshd[215716]: Failed password for root from 212.60.80.58 port 57038 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0823 seconds
INFO [2022-12-06 13:11:47,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325107.9264607, 'message': 'Dec 6 13:11:46 hqnl0246134 sshd[215710]: Failed password for root from 61.177.172.114 port 37058 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0557 seconds
INFO [2022-12-06 13:11:50,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325109.9339173, 'message': 'Dec 6 13:11:48 hqnl0246134 sshd[215710]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1089 seconds
INFO [2022-12-06 13:11:51,287] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:11:51,288] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:11:51,306] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:11:51,321] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0233 seconds
INFO [2022-12-06 13:11:51,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670325111.935932, 'message': 'Dec 6 13:11:50 hqnl0246134 sshd[215710]: Failed password for root from 61.177.172.114 port 37058 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0508 seconds
WARNING [2022-12-06 13:11:53,266] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 13:11:54,366] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:11:54,446] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.1024 seconds
INFO [2022-12-06 13:12:02,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.249.59.34', 'timestamp': 1670325121.9508007, 'message': 'Dec 6 13:12:01 hqnl0246134 sshd[215741]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.249.59.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0854 seconds
INFO [2022-12-06 13:12:02,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.249.59.34', 'timestamp': 1670325121.9519193, 'message': 'Dec 6 13:12:01 hqnl0246134 sshd[215741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.249.59.34 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 13:12:03,971] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.249.59.34', 'timestamp': 1670325123.9507918, 'message': 'Dec 6 13:12:02 hqnl0246134 sshd[215741]: Failed password for root from 20.249.59.34 port 6016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 13:12:05,781] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:12:05,853] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:12:05,853] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:12:05,853] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:12:05,854] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:12:05,854] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:12:05,876] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:12:05,907] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0522 seconds
WARNING [2022-12-06 13:12:05,921] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:12:05,926] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:12:05,956] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0584 seconds
INFO [2022-12-06 13:12:05,960] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0572 seconds
INFO [2022-12-06 13:12:08,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670325127.9564826, 'message': 'Dec 6 13:12:06 hqnl0246134 sshd[215677]: Accepted password for supportwwwuser from 212.58.119.251 port 10546 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0446 seconds
INFO [2022-12-06 13:12:20,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325139.9739547, 'message': 'Dec 6 13:12:19 hqnl0246134 sshd[215791]: Invalid user wialon from 167.71.4.124 port 56948', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0882 seconds
INFO [2022-12-06 13:12:20,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325139.987454, 'message': 'Dec 6 13:12:19 hqnl0246134 sshd[215791]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.71.4.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-06 13:12:20,146] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325139.9877565, 'message': 'Dec 6 13:12:19 hqnl0246134 sshd[215791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.4.124 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 13:12:21,902] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:12:21,904] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:12:21,919] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:12:21,942] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0359 seconds
INFO [2022-12-06 13:12:21,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325141.9698992, 'message': 'Dec 6 13:12:21 hqnl0246134 sshd[215791]: Failed password for invalid user wialon from 167.71.4.124 port 56948 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 13:12:24,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325143.9730227, 'message': 'Dec 6 13:12:23 hqnl0246134 sshd[215791]: Disconnected from invalid user wialon 167.71.4.124 port 56948 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0468 seconds
INFO [2022-12-06 13:12:26,437] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:12:26,437] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:12:26,446] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:12:26,459] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 13:12:36,434] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:12:36,458] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:12:36,470] im360.plugins.client360: Waiting 4 minutes before retry...
WARNING [2022-12-06 13:12:45,956] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:12:45,963] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:12:48,158] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.41.247', 'timestamp': 1670325168.0084844, 'message': 'Dec 6 13:12:46 hqnl0246134 sshd[215818]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.41.247 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1334 seconds
INFO [2022-12-06 13:12:48,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.41.247', 'timestamp': 1670325168.0098567, 'message': 'Dec 6 13:12:46 hqnl0246134 sshd[215818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.41.247 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0577 seconds
INFO [2022-12-06 13:12:50,037] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '137.184.41.247', 'timestamp': 1670325170.0039954, 'message': 'Dec 6 13:12:48 hqnl0246134 sshd[215818]: Failed password for root from 137.184.41.247 port 33948 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0317 seconds
WARNING [2022-12-06 13:12:54,369] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:12:54,447] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0979 seconds
INFO [2022-12-06 13:13:08,991] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 13:13:09,019] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:13:09,062] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0622 seconds
INFO [2022-12-06 13:13:27,839] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:13:27,841] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:13:27,854] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:13:27,873] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0305 seconds
INFO [2022-12-06 13:13:34,767] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:13:34,777] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:13:34,798] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:13:34,841] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0617 seconds
WARNING [2022-12-06 13:13:45,966] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:13:45,968] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:14:10,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325250.2078435, 'message': 'Dec 6 13:14:08 hqnl0246134 sshd[215902]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.100.118 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0527 seconds
INFO [2022-12-06 13:14:10,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325250.2172964, 'message': 'Dec 6 13:14:08 hqnl0246134 sshd[215902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.100.118 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0516 seconds
INFO [2022-12-06 13:14:12,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325252.208313, 'message': 'Dec 6 13:14:10 hqnl0246134 sshd[215902]: Failed password for root from 43.153.100.118 port 48818 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0551 seconds
INFO [2022-12-06 13:14:16,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325256.2113886, 'message': 'Dec 6 13:14:14 hqnl0246134 sshd[215904]: Invalid user backups from 128.199.188.184 port 56214', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0845 seconds
INFO [2022-12-06 13:14:16,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325256.2121325, 'message': 'Dec 6 13:14:14 hqnl0246134 sshd[215904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.188.184 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0638 seconds
INFO [2022-12-06 13:14:16,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325256.2168305, 'message': 'Dec 6 13:14:14 hqnl0246134 sshd[215904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.188.184 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0791 seconds
INFO [2022-12-06 13:14:18,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325258.2099566, 'message': 'Dec 6 13:14:16 hqnl0246134 sshd[215904]: Failed password for invalid user backups from 128.199.188.184 port 56214 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0756 seconds
INFO [2022-12-06 13:14:18,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325258.2102077, 'message': 'Dec 6 13:14:17 hqnl0246134 sshd[215904]: Disconnected from invalid user backups 128.199.188.184 port 56214 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1267 seconds
INFO [2022-12-06 13:14:20,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670325260.2125793, 'message': 'Dec 6 13:14:18 hqnl0246134 sshd[215911]: Invalid user roland from 137.184.196.76 port 48186', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0531 seconds
INFO [2022-12-06 13:14:20,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.196.76', 'timestamp': 1670325260.2128425, 'message': 'Dec 6 13:14:18 hqnl0246134 sshd[215911]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.196.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0997 seconds
INFO [2022-12-06 13:14:20,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.196.76', 'timestamp': 1670325260.2132473, 'message': 'Dec 6 13:14:18 hqnl0246134 sshd[215911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.196.76 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 13:14:20,800] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:14:20,801] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 13:14:20,909] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:14:20,910] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:14:20,928] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:14:20,931] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:14:21,003] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1999 seconds
INFO [2022-12-06 13:14:21,004] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0931 seconds
INFO [2022-12-06 13:14:22,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670325262.2155435, 'message': 'Dec 6 13:14:20 hqnl0246134 sshd[215911]: Failed password for invalid user roland from 137.184.196.76 port 48186 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1105 seconds
INFO [2022-12-06 13:14:22,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670325262.2160072, 'message': 'Dec 6 13:14:20 hqnl0246134 sshd[215911]: Disconnected from invalid user roland 137.184.196.76 port 48186 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1021 seconds
INFO [2022-12-06 13:14:26,553] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:14:26,554] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:14:26,585] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:14:26,633] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0600 seconds
INFO [2022-12-06 13:14:28,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325268.2261117, 'message': 'Dec 6 13:14:26 hqnl0246134 sshd[215925]: Invalid user mikael from 35.200.141.182 port 56866', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0589 seconds
INFO [2022-12-06 13:14:28,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325268.2268207, 'message': 'Dec 6 13:14:26 hqnl0246134 sshd[215925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 35.200.141.182 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 13:14:28,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325268.2270818, 'message': 'Dec 6 13:14:26 hqnl0246134 sshd[215925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.141.182 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 13:14:30,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325270.2264407, 'message': 'Dec 6 13:14:28 hqnl0246134 sshd[215925]: Failed password for invalid user mikael from 35.200.141.182 port 56866 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0998 seconds
INFO [2022-12-06 13:14:30,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325270.226865, 'message': 'Dec 6 13:14:29 hqnl0246134 sshd[215925]: Disconnected from invalid user mikael 35.200.141.182 port 56866 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 13:14:32,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325272.228065, 'message': 'Dec 6 13:14:31 hqnl0246134 sshd[215938]: pam_imunify(sshd:auth): [IM360_RBL] The IP 67.229.48.227 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0536 seconds
INFO [2022-12-06 13:14:32,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325272.2285442, 'message': 'Dec 6 13:14:31 hqnl0246134 sshd[215938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.229.48.227 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0530 seconds
INFO [2022-12-06 13:14:34,285] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325274.2371175, 'message': 'Dec 6 13:14:33 hqnl0246134 sshd[215938]: Failed password for root from 67.229.48.227 port 54014 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 13:14:40,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670325280.2423909, 'message': 'Dec 6 13:14:39 hqnl0246134 sshd[215942]: Accepted password for supportwwwuser from 212.58.119.251 port 10733 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0822 seconds
WARNING [2022-12-06 13:14:45,971] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:14:45,973] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:14:54,380] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:14:54,467] defence360agent.internals.the_sink: SensorIncidentList(<16 item(s)>) processed in 0.1050 seconds
INFO [2022-12-06 13:15:02,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325302.2776775, 'message': 'Dec 6 13:15:01 hqnl0246134 sshd[215988]: Invalid user odoo from 87.98.174.163 port 58400', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0604 seconds
INFO [2022-12-06 13:15:02,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325302.2886121, 'message': 'Dec 6 13:15:01 hqnl0246134 sshd[215988]: pam_imunify(sshd:auth): [IM360_RBL] The IP 87.98.174.163 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 13:15:02,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325302.2890944, 'message': 'Dec 6 13:15:01 hqnl0246134 sshd[215988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.174.163 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 13:15:04,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325304.2767909, 'message': 'Dec 6 13:15:03 hqnl0246134 sshd[215988]: Failed password for invalid user odoo from 87.98.174.163 port 58400 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0538 seconds
INFO [2022-12-06 13:15:06,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325306.2788196, 'message': 'Dec 6 13:15:05 hqnl0246134 sshd[215988]: Disconnected from invalid user odoo 87.98.174.163 port 58400 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 13:15:20,695] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:15:20,697] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:15:20,740] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:15:20,799] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0929 seconds
INFO [2022-12-06 13:15:28,062] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:15:28,062] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:15:28,094] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:15:28,146] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0689 seconds
INFO [2022-12-06 13:15:28,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325328.3235247, 'message': 'Dec 6 13:15:27 hqnl0246134 sshd[216033]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1812 seconds
INFO [2022-12-06 13:15:28,615] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325328.324899, 'message': 'Dec 6 13:15:27 hqnl0246134 sshd[216033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1074 seconds
INFO [2022-12-06 13:15:30,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325330.315501, 'message': 'Dec 6 13:15:29 hqnl0246134 sshd[216033]: Failed password for root from 61.177.173.35 port 48800 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 13:15:32,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325332.3152556, 'message': 'Dec 6 13:15:32 hqnl0246134 sshd[216033]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 13:15:34,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325334.3188257, 'message': 'Dec 6 13:15:34 hqnl0246134 sshd[216033]: Failed password for root from 61.177.173.35 port 48800 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 13:15:36,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325336.3197677, 'message': 'Dec 6 13:15:34 hqnl0246134 sshd[216033]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0731 seconds
INFO [2022-12-06 13:15:36,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.41.247', 'timestamp': 1670325336.3205469, 'message': 'Dec 6 13:15:34 hqnl0246134 sshd[216049]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.41.247 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0731 seconds
INFO [2022-12-06 13:15:36,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325336.3212466, 'message': 'Dec 6 13:15:36 hqnl0246134 sshd[216033]: Failed password for root from 61.177.173.35 port 48800 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 13:15:36,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.41.247', 'timestamp': 1670325336.3209472, 'message': 'Dec 6 13:15:34 hqnl0246134 sshd[216049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.41.247 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 13:15:36,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '137.184.41.247', 'timestamp': 1670325336.3214633, 'message': 'Dec 6 13:15:36 hqnl0246134 sshd[216049]: Failed password for root from 137.184.41.247 port 51914 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 13:15:40,040] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:15:40,041] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:15:40,050] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:15:40,089] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0470 seconds
INFO [2022-12-06 13:15:40,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325340.3223865, 'message': 'Dec 6 13:15:38 hqnl0246134 sshd[216053]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 13:15:40,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325340.3227074, 'message': 'Dec 6 13:15:38 hqnl0246134 sshd[216053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 13:15:40,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325340.322882, 'message': 'Dec 6 13:15:40 hqnl0246134 sshd[216053]: Failed password for root from 61.177.173.35 port 25220 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 13:15:42,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325342.3264034, 'message': 'Dec 6 13:15:40 hqnl0246134 sshd[216053]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 13:15:44,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325344.3278725, 'message': 'Dec 6 13:15:42 hqnl0246134 sshd[216053]: Failed password for root from 61.177.173.35 port 25220 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0488 seconds
INFO [2022-12-06 13:15:44,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325344.3280742, 'message': 'Dec 6 13:15:43 hqnl0246134 sshd[216053]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0348 seconds
WARNING [2022-12-06 13:15:45,976] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:15:45,976] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:15:46,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325346.329501, 'message': 'Dec 6 13:15:45 hqnl0246134 sshd[216053]: Failed password for root from 61.177.173.35 port 25220 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 13:15:50,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325350.3353302, 'message': 'Dec 6 13:15:48 hqnl0246134 sshd[216059]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 13:15:50,372] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325350.335535, 'message': 'Dec 6 13:15:48 hqnl0246134 sshd[216059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 13:15:52,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325352.33836, 'message': 'Dec 6 13:15:50 hqnl0246134 sshd[216059]: Failed password for root from 61.177.173.35 port 51591 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 13:15:52,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325352.3385823, 'message': 'Dec 6 13:15:51 hqnl0246134 sshd[216059]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
WARNING [2022-12-06 13:15:54,379] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:15:54,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670325354.341092, 'message': 'Dec 6 13:15:52 hqnl0246134 sshd[216061]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0396 seconds
INFO [2022-12-06 13:15:54,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325354.341432, 'message': 'Dec 6 13:15:53 hqnl0246134 sshd[216059]: Failed password for root from 61.177.173.35 port 51591 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 13:15:54,417] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0530 seconds
INFO [2022-12-06 13:15:54,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670325354.341319, 'message': 'Dec 6 13:15:52 hqnl0246134 sshd[216061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0418 seconds
INFO [2022-12-06 13:15:54,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '152.89.196.220', 'timestamp': 1670325354.341535, 'message': 'Dec 6 13:15:54 hqnl0246134 sshd[216061]: Failed password for root from 152.89.196.220 port 22672 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 13:15:56,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325356.3420677, 'message': 'Dec 6 13:15:55 hqnl0246134 sshd[216059]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 13:15:58,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670325358.344311, 'message': 'Dec 6 13:15:57 hqnl0246134 sshd[216059]: Failed password for root from 61.177.173.35 port 51591 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 13:16:08,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.114.119.22', 'timestamp': 1670325368.3587885, 'message': 'Dec 6 13:16:06 hqnl0246134 sshd[216083]: Invalid user terraria from 85.114.119.22 port 39553', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0559 seconds
INFO [2022-12-06 13:16:08,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '85.114.119.22', 'timestamp': 1670325368.3595655, 'message': 'Dec 6 13:16:06 hqnl0246134 sshd[216083]: pam_imunify(sshd:auth): [IM360_RBL] The IP 85.114.119.22 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0446 seconds
INFO [2022-12-06 13:16:08,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '85.114.119.22', 'timestamp': 1670325368.3599148, 'message': 'Dec 6 13:16:06 hqnl0246134 sshd[216083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.114.119.22 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 13:16:10,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.114.119.22', 'timestamp': 1670325370.3651025, 'message': 'Dec 6 13:16:08 hqnl0246134 sshd[216083]: Failed password for invalid user terraria from 85.114.119.22 port 39553 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0667 seconds
INFO [2022-12-06 13:16:10,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.114.119.22', 'timestamp': 1670325370.3653598, 'message': 'Dec 6 13:16:09 hqnl0246134 sshd[216083]: Disconnected from invalid user terraria 85.114.119.22 port 39553 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 13:16:18,033] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:16:18,034] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:16:18,044] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:16:18,058] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 13:16:21,335] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:16:21,336] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:16:21,356] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:16:21,372] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0340 seconds
INFO [2022-12-06 13:16:24,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325384.37343, 'message': 'Dec 6 13:16:23 hqnl0246134 sshd[216100]: Invalid user admin from 34.126.71.110 port 57070', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 13:16:24,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325384.3737671, 'message': 'Dec 6 13:16:24 hqnl0246134 sshd[216100]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.126.71.110 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 13:16:24,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325384.3811374, 'message': 'Dec 6 13:16:24 hqnl0246134 sshd[216100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.126.71.110 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 13:16:26,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325386.3754067, 'message': 'Dec 6 13:16:25 hqnl0246134 sshd[216100]: Failed password for invalid user admin from 34.126.71.110 port 57070 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 13:16:26,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325386.375672, 'message': 'Dec 6 13:16:26 hqnl0246134 sshd[216100]: Disconnected from invalid user admin 34.126.71.110 port 57070 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-06 13:16:45,981] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:16:45,982] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:16:47,200] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:16:47,267] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:16:47,268] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:16:47,268] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:16:47,268] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:16:47,269] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:16:47,282] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:16:47,302] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0322 seconds
WARNING [2022-12-06 13:16:47,317] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:16:47,320] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:16:47,339] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0434 seconds
INFO [2022-12-06 13:16:47,340] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0409 seconds
WARNING [2022-12-06 13:16:54,387] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:16:54,421] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0529 seconds
INFO [2022-12-06 13:17:08,493] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325428.4593847, 'message': 'Dec 6 13:17:08 hqnl0246134 sshd[216150]: Invalid user lyy from 43.153.100.118 port 59938', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 13:17:08,521] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325428.459843, 'message': 'Dec 6 13:17:08 hqnl0246134 sshd[216150]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.100.118 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 13:17:08,554] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325428.4600055, 'message': 'Dec 6 13:17:08 hqnl0246134 sshd[216150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.100.118 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 13:17:12,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325432.439347, 'message': 'Dec 6 13:17:10 hqnl0246134 sshd[216150]: Failed password for invalid user lyy from 43.153.100.118 port 59938 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0453 seconds
INFO [2022-12-06 13:17:12,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.100.118', 'timestamp': 1670325432.4398887, 'message': 'Dec 6 13:17:12 hqnl0246134 sshd[216150]: Disconnected from invalid user lyy 43.153.100.118 port 59938 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 13:17:16,934] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:17:16,935] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:17:16,947] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:17:16,967] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0306 seconds
INFO [2022-12-06 13:17:19,337] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:17:19,338] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:17:19,345] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:17:19,357] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 13:17:19,764] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:17:19,764] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:17:19,765] im360.plugins.client360: Waiting 2 minutes before retry...
INFO [2022-12-06 13:17:23,187] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:17:23,188] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:17:23,206] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:17:23,222] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0333 seconds
INFO [2022-12-06 13:17:26,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325446.4534159, 'message': 'Dec 6 13:17:24 hqnl0246134 sshd[216172]: Invalid user kk from 35.200.141.182 port 46066', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 13:17:26,515] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325446.4537182, 'message': 'Dec 6 13:17:24 hqnl0246134 sshd[216172]: pam_imunify(sshd:auth): [IM360_RBL] The IP 35.200.141.182 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 13:17:26,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325446.45388, 'message': 'Dec 6 13:17:24 hqnl0246134 sshd[216172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.141.182 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 13:17:28,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325448.4553313, 'message': 'Dec 6 13:17:27 hqnl0246134 sshd[216172]: Failed password for invalid user kk from 35.200.141.182 port 46066 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 13:17:30,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '35.200.141.182', 'timestamp': 1670325450.4588466, 'message': 'Dec 6 13:17:29 hqnl0246134 sshd[216172]: Disconnected from invalid user kk 35.200.141.182 port 46066 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0326 seconds
WARNING [2022-12-06 13:17:45,987] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:17:45,989] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:17:46,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325466.476664, 'message': 'Dec 6 13:17:44 hqnl0246134 sshd[216194]: Invalid user testing from 128.199.188.184 port 54052', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 13:17:46,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325466.4780369, 'message': 'Dec 6 13:17:44 hqnl0246134 sshd[216194]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.188.184 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 13:17:46,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325466.4781451, 'message': 'Dec 6 13:17:44 hqnl0246134 sshd[216194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.188.184 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 13:17:48,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670325468.4785633, 'message': 'Dec 6 13:17:46 hqnl0246134 sshd[216196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 13:17:48,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325468.4791706, 'message': 'Dec 6 13:17:46 hqnl0246134 sshd[216194]: Failed password for invalid user testing from 128.199.188.184 port 54052 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 13:17:48,537] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670325468.47902, 'message': 'Dec 6 13:17:46 hqnl0246134 sshd[216196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 13:17:48,560] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670325468.4793391, 'message': 'Dec 6 13:17:48 hqnl0246134 sshd[216196]: Failed password for root from 61.177.173.50 port 39967 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 13:17:50,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670325470.4813845, 'message': 'Dec 6 13:17:48 hqnl0246134 sshd[216196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0858 seconds
INFO [2022-12-06 13:17:50,569] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.188.184', 'timestamp': 1670325470.483115, 'message': 'Dec 6 13:17:49 hqnl0246134 sshd[216194]: Disconnected from invalid user testing 128.199.188.184 port 54052 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0854 seconds
INFO [2022-12-06 13:17:50,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.195.123', 'timestamp': 1670325470.4833162, 'message': 'Dec 6 13:17:49 hqnl0246134 sshd[216198]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.195.123 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0848 seconds
INFO [2022-12-06 13:17:50,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.195.123', 'timestamp': 1670325470.4835224, 'message': 'Dec 6 13:17:49 hqnl0246134 sshd[216198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.123 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 13:17:52,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670325472.484132, 'message': 'Dec 6 13:17:50 hqnl0246134 sshd[216196]: Failed password for root from 61.177.173.50 port 39967 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0554 seconds
INFO [2022-12-06 13:17:52,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.197.195.123', 'timestamp': 1670325472.4849858, 'message': 'Dec 6 13:17:51 hqnl0246134 sshd[216198]: Failed password for root from 138.197.195.123 port 58898 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0562 seconds
INFO [2022-12-06 13:17:52,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670325472.4846628, 'message': 'Dec 6 13:17:51 hqnl0246134 sshd[216196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0332 seconds
WARNING [2022-12-06 13:17:54,383] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:17:54,416] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0431 seconds
INFO [2022-12-06 13:17:54,521] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670325474.486494, 'message': 'Dec 6 13:17:53 hqnl0246134 sshd[216196]: Failed password for root from 61.177.173.50 port 39967 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 13:18:18,329] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:18:18,330] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:18:18,338] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:18:18,357] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0265 seconds
INFO [2022-12-06 13:18:21,550] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:18:21,551] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:18:21,566] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:18:21,577] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0254 seconds
INFO [2022-12-06 13:18:28,563] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325508.5343502, 'message': 'Dec 6 13:18:27 hqnl0246134 sshd[216234]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 13:18:28,592] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325508.5348134, 'message': 'Dec 6 13:18:27 hqnl0246134 sshd[216234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 13:18:30,708] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325510.5340874, 'message': 'Dec 6 13:18:29 hqnl0246134 sshd[216234]: Failed password for root from 61.177.173.37 port 46641 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1737 seconds
INFO [2022-12-06 13:18:32,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325512.5364523, 'message': 'Dec 6 13:18:31 hqnl0246134 sshd[216234]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 13:18:34,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325514.5409868, 'message': 'Dec 6 13:18:34 hqnl0246134 sshd[216234]: Failed password for root from 61.177.173.37 port 46641 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0441 seconds
INFO [2022-12-06 13:18:38,567] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325518.5461104, 'message': 'Dec 6 13:18:36 hqnl0246134 sshd[216234]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 13:18:40,569] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325520.5475438, 'message': 'Dec 6 13:18:38 hqnl0246134 sshd[216234]: Failed password for root from 61.177.173.37 port 46641 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 13:18:43,791] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:18:43,791] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:18:43,804] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:18:43,818] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-06 13:18:44,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.22.44.198', 'timestamp': 1670325524.552606, 'message': 'Dec 6 13:18:42 hqnl0246134 sshd[216253]: Invalid user admin from 84.22.44.198 port 44392', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 13:18:44,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '84.22.44.198', 'timestamp': 1670325524.5528898, 'message': 'Dec 6 13:18:43 hqnl0246134 sshd[216253]: pam_imunify(sshd:auth): [IM360_RBL] The IP 84.22.44.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 13:18:44,685] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '84.22.44.198', 'timestamp': 1670325524.5530944, 'message': 'Dec 6 13:18:43 hqnl0246134 sshd[216253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.22.44.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0832 seconds
WARNING [2022-12-06 13:18:45,994] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:18:45,995] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:18:46,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.22.44.198', 'timestamp': 1670325526.5539484, 'message': 'Dec 6 13:18:45 hqnl0246134 sshd[216253]: Failed password for invalid user admin from 84.22.44.198 port 44392 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0391 seconds
INFO [2022-12-06 13:18:48,660] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325528.5582561, 'message': 'Dec 6 13:18:47 hqnl0246134 sshd[216259]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1011 seconds
INFO [2022-12-06 13:18:48,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325528.5585444, 'message': 'Dec 6 13:18:47 hqnl0246134 sshd[216259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0985 seconds
INFO [2022-12-06 13:18:50,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325530.5581543, 'message': 'Dec 6 13:18:49 hqnl0246134 sshd[216259]: Failed password for root from 61.177.173.37 port 12126 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 13:18:50,616] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325530.5585332, 'message': 'Dec 6 13:18:49 hqnl0246134 sshd[216259]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 13:18:52,599] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325532.5617945, 'message': 'Dec 6 13:18:51 hqnl0246134 sshd[216259]: Failed password for root from 61.177.173.37 port 12126 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 13:18:52,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325532.5621858, 'message': 'Dec 6 13:18:52 hqnl0246134 sshd[216259]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
WARNING [2022-12-06 13:18:54,391] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:18:54,433] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0530 seconds
INFO [2022-12-06 13:18:54,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325534.5663865, 'message': 'Dec 6 13:18:53 hqnl0246134 sshd[216259]: Failed password for root from 61.177.173.37 port 12126 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 13:19:06,628] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325546.602636, 'message': 'Dec 6 13:19:06 hqnl0246134 sshd[216286]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 13:19:06,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325546.6031744, 'message': 'Dec 6 13:19:06 hqnl0246134 sshd[216286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 13:19:08,625] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325548.6021369, 'message': 'Dec 6 13:19:08 hqnl0246134 sshd[216286]: Failed password for root from 61.177.173.37 port 25606 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 13:19:08,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325548.602423, 'message': 'Dec 6 13:19:08 hqnl0246134 sshd[216286]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 13:19:12,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325552.6098754, 'message': 'Dec 6 13:19:10 hqnl0246134 sshd[216286]: Failed password for root from 61.177.173.37 port 25606 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0503 seconds
INFO [2022-12-06 13:19:14,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325554.6093183, 'message': 'Dec 6 13:19:12 hqnl0246134 sshd[216286]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 13:19:16,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325556.6101058, 'message': 'Dec 6 13:19:15 hqnl0246134 sshd[216286]: Failed password for root from 61.177.173.37 port 25606 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 13:19:18,201] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:19:18,202] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:19:18,215] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:19:18,232] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0234 seconds
INFO [2022-12-06 13:19:20,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325560.6152987, 'message': 'Dec 6 13:19:18 hqnl0246134 sshd[216295]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-06 13:19:20,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325560.6158302, 'message': 'Dec 6 13:19:18 hqnl0246134 sshd[216295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0378 seconds
INFO [2022-12-06 13:19:21,622] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:19:21,623] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:19:21,637] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:19:21,655] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0303 seconds
INFO [2022-12-06 13:19:22,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325562.6172001, 'message': 'Dec 6 13:19:20 hqnl0246134 sshd[216295]: Failed password for root from 61.177.173.37 port 52579 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0685 seconds
INFO [2022-12-06 13:19:22,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325562.6175628, 'message': 'Dec 6 13:19:21 hqnl0246134 sshd[216295]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 13:19:24,651] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325564.618206, 'message': 'Dec 6 13:19:23 hqnl0246134 sshd[216295]: Failed password for root from 61.177.173.37 port 52579 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 13:19:26,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325566.6200624, 'message': 'Dec 6 13:19:25 hqnl0246134 sshd[216295]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 13:19:28,644] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325568.6217432, 'message': 'Dec 6 13:19:26 hqnl0246134 sshd[216295]: Failed password for root from 61.177.173.37 port 52579 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 13:19:30,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325570.6248105, 'message': 'Dec 6 13:19:29 hqnl0246134 sshd[216306]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-06 13:19:30,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325570.625001, 'message': 'Dec 6 13:19:29 hqnl0246134 sshd[216306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0723 seconds
INFO [2022-12-06 13:19:32,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325572.6258795, 'message': 'Dec 6 13:19:30 hqnl0246134 sshd[216306]: Failed password for root from 61.177.173.37 port 62440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0778 seconds
INFO [2022-12-06 13:19:32,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325572.6262088, 'message': 'Dec 6 13:19:31 hqnl0246134 sshd[216306]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0704 seconds
INFO [2022-12-06 13:19:34,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325574.6291237, 'message': 'Dec 6 13:19:33 hqnl0246134 sshd[216306]: Failed password for root from 61.177.173.37 port 62440 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0611 seconds
INFO [2022-12-06 13:19:36,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325576.6320558, 'message': 'Dec 6 13:19:35 hqnl0246134 sshd[216306]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 13:19:38,653] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670325578.6334627, 'message': 'Dec 6 13:19:37 hqnl0246134 sshd[216306]: Failed password for root from 61.177.173.37 port 62440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 13:19:40,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.68.82.194', 'timestamp': 1670325580.6356752, 'message': 'Dec 6 13:19:40 hqnl0246134 sshd[216347]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.68.82.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 13:19:40,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.68.82.194', 'timestamp': 1670325580.6360993, 'message': 'Dec 6 13:19:40 hqnl0246134 sshd[216347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.82.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 13:19:42,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.68.82.194', 'timestamp': 1670325582.6384902, 'message': 'Dec 6 13:19:42 hqnl0246134 sshd[216347]: Failed password for root from 138.68.82.194 port 60286 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0270 seconds
WARNING [2022-12-06 13:19:45,999] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:19:46,000] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:19:46,891] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:19:46,891] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:19:46,909] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:19:46,933] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0400 seconds
INFO [2022-12-06 13:19:52,696] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325592.6731286, 'message': 'Dec 6 13:19:51 hqnl0246134 sshd[216357]: Invalid user stack from 157.230.113.181 port 48940', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 13:19:52,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325592.67335, 'message': 'Dec 6 13:19:51 hqnl0246134 sshd[216357]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.230.113.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 13:19:52,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325592.6734867, 'message': 'Dec 6 13:19:51 hqnl0246134 sshd[216357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.181 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0251 seconds
WARNING [2022-12-06 13:19:54,393] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:19:54,418] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0343 seconds
INFO [2022-12-06 13:19:54,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325594.674008, 'message': 'Dec 6 13:19:54 hqnl0246134 sshd[216357]: Failed password for invalid user stack from 157.230.113.181 port 48940 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 13:19:56,713] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325596.6820686, 'message': 'Dec 6 13:19:55 hqnl0246134 sshd[216357]: Disconnected from invalid user stack 157.230.113.181 port 48940 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 13:20:07,970] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:20:08,038] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:20:08,039] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:20:08,039] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:20:08,039] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:20:08,040] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:20:08,056] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:20:08,073] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0328 seconds
WARNING [2022-12-06 13:20:08,080] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:20:08,083] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:20:08,124] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0557 seconds
INFO [2022-12-06 13:20:08,126] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0546 seconds
INFO [2022-12-06 13:20:18,766] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:20:18,767] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:20:18,776] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:20:18,788] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 13:20:21,724] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:20:21,725] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:20:21,732] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:20:21,745] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 13:20:36,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.223.96.213', 'timestamp': 1670325636.7520628, 'message': 'Dec 6 13:20:35 hqnl0246134 sshd[216424]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.223.96.213 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 13:20:36,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.223.96.213', 'timestamp': 1670325636.7525442, 'message': 'Dec 6 13:20:35 hqnl0246134 sshd[216424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.96.213 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 13:20:38,757] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:20:38,757] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:20:38,758] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 13:20:38,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '159.223.96.213', 'timestamp': 1670325638.75963, 'message': 'Dec 6 13:20:37 hqnl0246134 sshd[216424]: Failed password for root from 159.223.96.213 port 59224 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 13:20:44,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670325644.764927, 'message': 'Dec 6 13:20:44 hqnl0246134 sshd[216428]: Accepted password for supportwwwuser from 212.58.119.251 port 10663 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0354 seconds
WARNING [2022-12-06 13:20:46,003] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:20:46,005] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:20:52,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670325652.77072, 'message': 'Dec 6 13:20:51 hqnl0246134 sshd[216464]: Accepted password for supportwwwuser from 212.58.119.251 port 10662 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0262 seconds
WARNING [2022-12-06 13:20:54,417] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:20:54,445] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0389 seconds
INFO [2022-12-06 13:20:56,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325656.788507, 'message': 'Dec 6 13:20:56 hqnl0246134 sshd[216496]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.71.4.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0462 seconds
INFO [2022-12-06 13:20:56,876] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325656.7888317, 'message': 'Dec 6 13:20:56 hqnl0246134 sshd[216496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.4.124 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-06 13:20:58,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325658.7902763, 'message': 'Dec 6 13:20:58 hqnl0246134 sshd[216496]: Failed password for root from 167.71.4.124 port 46990 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 13:21:01,161] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:21:01,162] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:21:01,184] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:21:01,291] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1146 seconds
INFO [2022-12-06 13:21:08,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.196.76', 'timestamp': 1670325668.8064382, 'message': 'Dec 6 13:21:08 hqnl0246134 sshd[216526]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.196.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0402 seconds
INFO [2022-12-06 13:21:08,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.196.76', 'timestamp': 1670325668.807062, 'message': 'Dec 6 13:21:08 hqnl0246134 sshd[216526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.196.76 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 13:21:10,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '137.184.196.76', 'timestamp': 1670325670.808252, 'message': 'Dec 6 13:21:09 hqnl0246134 sshd[216526]: Failed password for root from 137.184.196.76 port 48578 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 13:21:14,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.17.230.180', 'timestamp': 1670325674.812581, 'message': 'Dec 6 13:21:14 hqnl0246134 sshd[216530]: Invalid user support from 217.17.230.180 port 37072', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 13:21:14,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.17.230.180', 'timestamp': 1670325674.8220294, 'message': 'Dec 6 13:21:14 hqnl0246134 sshd[216530]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.17.230.180 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 13:21:14,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.17.230.180', 'timestamp': 1670325674.8223944, 'message': 'Dec 6 13:21:14 hqnl0246134 sshd[216530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.17.230.180 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 13:21:16,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.17.230.180', 'timestamp': 1670325676.8136384, 'message': 'Dec 6 13:21:16 hqnl0246134 sshd[216530]: Failed password for invalid user support from 217.17.230.180 port 37072 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 13:21:18,433] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:21:18,434] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:21:18,446] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:21:18,462] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0269 seconds
INFO [2022-12-06 13:21:18,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.17.230.180', 'timestamp': 1670325678.8164167, 'message': 'Dec 6 13:21:17 hqnl0246134 sshd[216530]: Disconnected from invalid user support 217.17.230.180 port 37072 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 13:21:21,359] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:21:21,360] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:21:21,368] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:21:21,382] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-06 13:21:44,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325704.8538706, 'message': 'Dec 6 13:21:43 hqnl0246134 sshd[216555]: Invalid user network from 67.229.48.227 port 58620', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0537 seconds
INFO [2022-12-06 13:21:44,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325704.8543425, 'message': 'Dec 6 13:21:43 hqnl0246134 sshd[216555]: pam_imunify(sshd:auth): [IM360_RBL] The IP 67.229.48.227 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0360 seconds
INFO [2022-12-06 13:21:44,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325704.8545578, 'message': 'Dec 6 13:21:43 hqnl0246134 sshd[216555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.229.48.227 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 13:21:45,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325704.8547626, 'message': 'Dec 6 13:21:44 hqnl0246134 sshd[216555]: Failed password for invalid user network from 67.229.48.227 port 58620 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0340 seconds
WARNING [2022-12-06 13:21:46,007] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:21:46,009] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:21:46,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325706.8537846, 'message': 'Dec 6 13:21:45 hqnl0246134 sshd[216555]: Disconnected from invalid user network 67.229.48.227 port 58620 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 13:21:50,897] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325710.8609512, 'message': 'Dec 6 13:21:50 hqnl0246134 sshd[216559]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.126.71.110 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 13:21:50,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325710.861475, 'message': 'Dec 6 13:21:50 hqnl0246134 sshd[216559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.126.71.110 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 13:21:52,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.61.75.88', 'timestamp': 1670325712.8671112, 'message': 'Dec 6 13:21:51 hqnl0246134 sshd[216557]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.61.75.88 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 13:21:52,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325712.867541, 'message': 'Dec 6 13:21:51 hqnl0246134 sshd[216559]: Failed password for root from 34.126.71.110 port 41648 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 13:21:52,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.61.75.88', 'timestamp': 1670325712.8673913, 'message': 'Dec 6 13:21:51 hqnl0246134 sshd[216557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.61.75.88 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 13:21:53,268] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 13:21:54,420] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:21:54,454] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0418 seconds
INFO [2022-12-06 13:21:54,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.61.75.88', 'timestamp': 1670325714.869594, 'message': 'Dec 6 13:21:53 hqnl0246134 sshd[216557]: Failed password for root from 20.61.75.88 port 44410 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0396 seconds
INFO [2022-12-06 13:21:54,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325714.8698308, 'message': 'Dec 6 13:21:53 hqnl0246134 sshd[216569]: pam_imunify(sshd:auth): [IM360_RBL] The IP 87.98.174.163 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 13:21:54,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325714.8699956, 'message': 'Dec 6 13:21:53 hqnl0246134 sshd[216569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.174.163 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 13:21:56,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325716.8700268, 'message': 'Dec 6 13:21:55 hqnl0246134 sshd[216569]: Failed password for root from 87.98.174.163 port 59246 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 13:22:08,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '112.221.4.3', 'timestamp': 1670325728.8877618, 'message': 'Dec 6 13:22:08 hqnl0246134 sshd[216597]: pam_imunify(sshd:auth): [IM360_RBL] The IP 112.221.4.3 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 13:22:08,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '112.221.4.3', 'timestamp': 1670325728.8883235, 'message': 'Dec 6 13:22:08 hqnl0246134 sshd[216597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.221.4.3 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 13:22:10,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '112.221.4.3', 'timestamp': 1670325730.889684, 'message': 'Dec 6 13:22:10 hqnl0246134 sshd[216597]: Failed password for root from 112.221.4.3 port 52994 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 13:22:10,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.68.82.194', 'timestamp': 1670325730.8898823, 'message': 'Dec 6 13:22:10 hqnl0246134 sshd[216599]: Invalid user hbase from 138.68.82.194 port 44438', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 13:22:10,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.68.82.194', 'timestamp': 1670325730.8926044, 'message': 'Dec 6 13:22:10 hqnl0246134 sshd[216599]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.68.82.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 13:22:10,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.68.82.194', 'timestamp': 1670325730.8927438, 'message': 'Dec 6 13:22:10 hqnl0246134 sshd[216599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.82.194 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 13:22:12,924] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.68.82.194', 'timestamp': 1670325732.8901322, 'message': 'Dec 6 13:22:12 hqnl0246134 sshd[216599]: Failed password for invalid user hbase from 138.68.82.194 port 44438 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 13:22:12,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.68.82.194', 'timestamp': 1670325732.8903894, 'message': 'Dec 6 13:22:12 hqnl0246134 sshd[216599]: Disconnected from invalid user hbase 138.68.82.194 port 44438 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 13:22:13,154] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:22:13,155] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:22:13,165] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:22:13,177] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 13:22:17,788] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:22:17,789] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:22:17,796] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:22:17,806] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-06 13:22:20,316] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:22:20,316] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:22:20,325] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:22:20,338] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 13:22:38,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325758.9427576, 'message': 'Dec 6 13:22:37 hqnl0246134 sshd[216630]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.230.113.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 13:22:38,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325758.9435477, 'message': 'Dec 6 13:22:37 hqnl0246134 sshd[216630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.181 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 13:22:40,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325760.9435318, 'message': 'Dec 6 13:22:39 hqnl0246134 sshd[216630]: Failed password for root from 157.230.113.181 port 49582 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
WARNING [2022-12-06 13:22:46,013] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:22:46,014] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:22:54,426] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:22:54,469] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0539 seconds
INFO [2022-12-06 13:23:18,243] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:23:18,244] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:23:18,252] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:23:18,266] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 13:23:21,039] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:23:21,039] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:23:21,046] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:23:21,057] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 13:23:33,068] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '85.114.119.22', 'timestamp': 1670325813.0465488, 'message': 'Dec 6 13:23:32 hqnl0246134 sshd[216676]: pam_imunify(sshd:auth): [IM360_RBL] The IP 85.114.119.22 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 13:23:33,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '85.114.119.22', 'timestamp': 1670325813.046932, 'message': 'Dec 6 13:23:32 hqnl0246134 sshd[216676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.114.119.22 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 13:23:35,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325815.0594368, 'message': 'Dec 6 13:23:33 hqnl0246134 sshd[216686]: Invalid user newuser from 167.71.4.124 port 36948', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 13:23:35,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '85.114.119.22', 'timestamp': 1670325815.060025, 'message': 'Dec 6 13:23:34 hqnl0246134 sshd[216676]: Failed password for root from 85.114.119.22 port 35436 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 13:23:35,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325815.05971, 'message': 'Dec 6 13:23:33 hqnl0246134 sshd[216686]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.71.4.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 13:23:35,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325815.0598822, 'message': 'Dec 6 13:23:33 hqnl0246134 sshd[216686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.4.124 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 13:23:37,076] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325817.0578294, 'message': 'Dec 6 13:23:35 hqnl0246134 sshd[216686]: Failed password for invalid user newuser from 167.71.4.124 port 36948 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 13:23:37,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325817.0584085, 'message': 'Dec 6 13:23:36 hqnl0246134 sshd[216686]: Disconnected from invalid user newuser 167.71.4.124 port 36948 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 13:23:39,449] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:23:39,450] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:23:39,457] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:23:39,469] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
WARNING [2022-12-06 13:23:46,019] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:23:46,020] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:23:49,098] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.195.123', 'timestamp': 1670325829.0748353, 'message': 'Dec 6 13:23:47 hqnl0246134 sshd[216694]: Invalid user victor from 138.197.195.123 port 41830', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 13:23:49,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.195.123', 'timestamp': 1670325829.075236, 'message': 'Dec 6 13:23:47 hqnl0246134 sshd[216694]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.195.123 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 13:23:49,136] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.195.123', 'timestamp': 1670325829.0753915, 'message': 'Dec 6 13:23:47 hqnl0246134 sshd[216694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.123 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 13:23:51,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.195.123', 'timestamp': 1670325831.0763123, 'message': 'Dec 6 13:23:49 hqnl0246134 sshd[216694]: Failed password for invalid user victor from 138.197.195.123 port 41830 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 13:23:51,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.158.139.57', 'timestamp': 1670325831.0765839, 'message': 'Dec 6 13:23:50 hqnl0246134 sshd[216696]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.158.139.57 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 13:23:51,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.158.139.57', 'timestamp': 1670325831.0767107, 'message': 'Dec 6 13:23:50 hqnl0246134 sshd[216696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 13:23:53,125] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.195.123', 'timestamp': 1670325833.0777621, 'message': 'Dec 6 13:23:51 hqnl0246134 sshd[216694]: Disconnected from invalid user victor 138.197.195.123 port 41830 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0473 seconds
INFO [2022-12-06 13:23:53,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '202.158.139.57', 'timestamp': 1670325833.077974, 'message': 'Dec 6 13:23:52 hqnl0246134 sshd[216696]: Failed password for root from 202.158.139.57 port 51910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0473 seconds
WARNING [2022-12-06 13:23:54,427] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:23:54,457] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0392 seconds
INFO [2022-12-06 13:24:01,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.196.76', 'timestamp': 1670325841.0863378, 'message': 'Dec 6 13:23:59 hqnl0246134 sshd[216706]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.196.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 13:24:01,156] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.196.76', 'timestamp': 1670325841.0867171, 'message': 'Dec 6 13:23:59 hqnl0246134 sshd[216706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.196.76 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 13:24:03,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '137.184.196.76', 'timestamp': 1670325843.088546, 'message': 'Dec 6 13:24:01 hqnl0246134 sshd[216706]: Failed password for root from 137.184.196.76 port 48796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 13:24:17,750] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:24:17,751] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:24:17,760] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:24:17,772] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 13:24:20,260] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:24:20,260] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:24:20,271] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:24:20,286] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0252 seconds
INFO [2022-12-06 13:24:23,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '188.32.176.34', 'timestamp': 1670325863.128894, 'message': 'Dec 6 13:24:22 hqnl0246134 sshd[216744]: Accepted publickey for root from 188.32.176.34 port 55100 ssh2: RSA SHA256:M5XvbkooZmQvvjfo3fKHU5lbqUaXL4LET3qhCF0FT28', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 13:24:27,169] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.17.230.180', 'timestamp': 1670325867.1346176, 'message': 'Dec 6 13:24:25 hqnl0246134 sshd[216799]: Invalid user vbox from 217.17.230.180 port 40966', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 13:24:27,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.249.59.34', 'timestamp': 1670325867.135311, 'message': 'Dec 6 13:24:25 hqnl0246134 sshd[216788]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.249.59.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 13:24:27,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.17.230.180', 'timestamp': 1670325867.1349463, 'message': 'Dec 6 13:24:25 hqnl0246134 sshd[216799]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.17.230.180 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 13:24:27,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.249.59.34', 'timestamp': 1670325867.1354554, 'message': 'Dec 6 13:24:25 hqnl0246134 sshd[216788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.249.59.34 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 13:24:27,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.17.230.180', 'timestamp': 1670325867.135206, 'message': 'Dec 6 13:24:25 hqnl0246134 sshd[216799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.17.230.180 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 13:24:29,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325869.139068, 'message': 'Dec 6 13:24:27 hqnl0246134 sshd[216804]: Invalid user gateway from 67.229.48.227 port 48974', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0588 seconds
INFO [2022-12-06 13:24:29,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.17.230.180', 'timestamp': 1670325869.1396856, 'message': 'Dec 6 13:24:28 hqnl0246134 sshd[216799]: Failed password for invalid user vbox from 217.17.230.180 port 40966 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0598 seconds
INFO [2022-12-06 13:24:29,202] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.249.59.34', 'timestamp': 1670325869.1398253, 'message': 'Dec 6 13:24:28 hqnl0246134 sshd[216788]: Failed password for root from 20.249.59.34 port 6016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0602 seconds
INFO [2022-12-06 13:24:29,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325869.139401, 'message': 'Dec 6 13:24:27 hqnl0246134 sshd[216804]: pam_imunify(sshd:auth): [IM360_RBL] The IP 67.229.48.227 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 13:24:29,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325869.1395469, 'message': 'Dec 6 13:24:27 hqnl0246134 sshd[216804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.229.48.227 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 13:24:31,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.17.230.180', 'timestamp': 1670325871.1444843, 'message': 'Dec 6 13:24:29 hqnl0246134 sshd[216799]: Disconnected from invalid user vbox 217.17.230.180 port 40966 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 13:24:31,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325871.1447248, 'message': 'Dec 6 13:24:29 hqnl0246134 sshd[216804]: Failed password for invalid user gateway from 67.229.48.227 port 48974 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 13:24:31,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.229.48.227', 'timestamp': 1670325871.1448517, 'message': 'Dec 6 13:24:30 hqnl0246134 sshd[216804]: Disconnected from invalid user gateway 67.229.48.227 port 48974 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 13:24:41,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.68.82.194', 'timestamp': 1670325881.155199, 'message': 'Dec 6 13:24:39 hqnl0246134 sshd[216824]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.68.82.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 13:24:41,208] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.68.82.194', 'timestamp': 1670325881.1559703, 'message': 'Dec 6 13:24:39 hqnl0246134 sshd[216824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.82.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 13:24:43,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.68.82.194', 'timestamp': 1670325883.1547449, 'message': 'Dec 6 13:24:41 hqnl0246134 sshd[216824]: Failed password for root from 138.68.82.194 port 56804 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 13:24:43,886] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:24:43,886] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:24:43,893] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:24:43,915] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0282 seconds
INFO [2022-12-06 13:24:45,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325885.1554976, 'message': 'Dec 6 13:24:44 hqnl0246134 sshd[216835]: Invalid user roland from 34.126.71.110 port 57554', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 13:24:45,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325885.1558003, 'message': 'Dec 6 13:24:44 hqnl0246134 sshd[216835]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.126.71.110 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 13:24:45,209] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325885.155913, 'message': 'Dec 6 13:24:44 hqnl0246134 sshd[216835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.126.71.110 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 13:24:46,024] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:24:46,025] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:24:47,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325887.1573029, 'message': 'Dec 6 13:24:46 hqnl0246134 sshd[216835]: Failed password for invalid user roland from 34.126.71.110 port 57554 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 13:24:49,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.126.71.110', 'timestamp': 1670325889.1574447, 'message': 'Dec 6 13:24:47 hqnl0246134 sshd[216835]: Disconnected from invalid user roland 34.126.71.110 port 57554 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0253 seconds
WARNING [2022-12-06 13:24:54,432] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:24:54,463] defence360agent.internals.the_sink: SensorIncidentList(<19 item(s)>) processed in 0.0408 seconds
INFO [2022-12-06 13:24:57,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325897.1869178, 'message': 'Dec 6 13:24:55 hqnl0246134 sshd[216861]: Invalid user yy from 87.98.174.163 port 59792', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 13:24:57,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325897.187092, 'message': 'Dec 6 13:24:55 hqnl0246134 sshd[216861]: pam_imunify(sshd:auth): [IM360_RBL] The IP 87.98.174.163 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 13:24:57,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325897.1872077, 'message': 'Dec 6 13:24:55 hqnl0246134 sshd[216861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.174.163 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 13:24:59,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325899.191279, 'message': 'Dec 6 13:24:58 hqnl0246134 sshd[216864]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 13:24:59,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325899.1916723, 'message': 'Dec 6 13:24:58 hqnl0246134 sshd[216861]: Failed password for invalid user yy from 87.98.174.163 port 59792 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 13:24:59,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325899.1915174, 'message': 'Dec 6 13:24:58 hqnl0246134 sshd[216864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 13:24:59,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.174.163', 'timestamp': 1670325899.19178, 'message': 'Dec 6 13:24:59 hqnl0246134 sshd[216861]: Disconnected from invalid user yy 87.98.174.163 port 59792 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 13:25:01,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325901.193156, 'message': 'Dec 6 13:25:00 hqnl0246134 sshd[216864]: Failed password for root from 61.177.172.108 port 42798 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 13:25:03,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325903.1942022, 'message': 'Dec 6 13:25:02 hqnl0246134 sshd[216864]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 13:25:05,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325905.20083, 'message': 'Dec 6 13:25:03 hqnl0246134 sshd[216864]: Failed password for root from 61.177.172.108 port 42798 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0444 seconds
INFO [2022-12-06 13:25:05,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325905.2024076, 'message': 'Dec 6 13:25:04 hqnl0246134 sshd[216864]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 13:25:07,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325907.1979048, 'message': 'Dec 6 13:25:06 hqnl0246134 sshd[216864]: Failed password for root from 61.177.172.108 port 42798 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 13:25:09,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325909.2005775, 'message': 'Dec 6 13:25:08 hqnl0246134 sshd[216896]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 13:25:09,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.94.86.84', 'timestamp': 1670325909.2010176, 'message': 'Dec 6 13:25:08 hqnl0246134 sshd[216902]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.94.86.84 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 13:25:09,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325909.2008474, 'message': 'Dec 6 13:25:08 hqnl0246134 sshd[216896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0396 seconds
INFO [2022-12-06 13:25:09,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.94.86.84', 'timestamp': 1670325909.201123, 'message': 'Dec 6 13:25:08 hqnl0246134 sshd[216902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.94.86.84 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0394 seconds
INFO [2022-12-06 13:25:11,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325911.2017386, 'message': 'Dec 6 13:25:10 hqnl0246134 sshd[216896]: Failed password for root from 61.177.172.108 port 13892 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 13:25:11,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '200.94.86.84', 'timestamp': 1670325911.2019715, 'message': 'Dec 6 13:25:11 hqnl0246134 sshd[216902]: Failed password for root from 200.94.86.84 port 37356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 13:25:13,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325913.2033036, 'message': 'Dec 6 13:25:12 hqnl0246134 sshd[216896]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0596 seconds
INFO [2022-12-06 13:25:15,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325915.2042596, 'message': 'Dec 6 13:25:15 hqnl0246134 sshd[216896]: Failed password for root from 61.177.172.108 port 13892 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 13:25:17,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.255.8.153', 'timestamp': 1670325917.20625, 'message': 'Dec 6 13:25:15 hqnl0246134 sshd[216909]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.255.8.153 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0570 seconds
INFO [2022-12-06 13:25:17,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325917.2069845, 'message': 'Dec 6 13:25:16 hqnl0246134 sshd[216896]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0571 seconds
INFO [2022-12-06 13:25:17,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.255.8.153', 'timestamp': 1670325917.206809, 'message': 'Dec 6 13:25:15 hqnl0246134 sshd[216909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.8.153 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0755 seconds
INFO [2022-12-06 13:25:18,796] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:25:18,797] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:25:18,807] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:25:18,822] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0243 seconds
INFO [2022-12-06 13:25:19,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.255.8.153', 'timestamp': 1670325919.2081733, 'message': 'Dec 6 13:25:17 hqnl0246134 sshd[216909]: Failed password for root from 36.255.8.153 port 40906 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 13:25:19,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325919.2083833, 'message': 'Dec 6 13:25:19 hqnl0246134 sshd[216896]: Failed password for root from 61.177.172.108 port 13892 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 13:25:22,137] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:25:22,138] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:25:22,145] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:25:22,157] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 13:25:23,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325923.2128572, 'message': 'Dec 6 13:25:22 hqnl0246134 sshd[216925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 13:25:23,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325923.2130585, 'message': 'Dec 6 13:25:22 hqnl0246134 sshd[216925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 13:25:25,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325925.2134392, 'message': 'Dec 6 13:25:24 hqnl0246134 sshd[216925]: Failed password for root from 61.177.172.108 port 13148 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 13:25:25,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325925.2145193, 'message': 'Dec 6 13:25:25 hqnl0246134 sshd[216925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 13:25:29,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325929.2193484, 'message': 'Dec 6 13:25:27 hqnl0246134 sshd[216925]: Failed password for root from 61.177.172.108 port 13148 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 13:25:31,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325931.2208433, 'message': 'Dec 6 13:25:29 hqnl0246134 sshd[216925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 13:25:33,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325933.222091, 'message': 'Dec 6 13:25:31 hqnl0246134 sshd[216925]: Failed password for root from 61.177.172.108 port 13148 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 13:25:35,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325935.2242012, 'message': 'Dec 6 13:25:33 hqnl0246134 sshd[216930]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 13:25:35,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325935.2246058, 'message': 'Dec 6 13:25:33 hqnl0246134 sshd[216930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 13:25:37,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325937.2260964, 'message': 'Dec 6 13:25:35 hqnl0246134 sshd[216940]: Invalid user gateway from 157.230.113.181 port 56054', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 13:25:37,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325937.226686, 'message': 'Dec 6 13:25:35 hqnl0246134 sshd[216930]: Failed password for root from 61.177.172.108 port 37893 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-06 13:25:37,290] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325937.226382, 'message': 'Dec 6 13:25:35 hqnl0246134 sshd[216940]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.230.113.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 13:25:37,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325937.226521, 'message': 'Dec 6 13:25:35 hqnl0246134 sshd[216940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.181 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 13:25:39,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325939.2329876, 'message': 'Dec 6 13:25:37 hqnl0246134 sshd[216940]: Failed password for invalid user gateway from 157.230.113.181 port 56054 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1463 seconds
INFO [2022-12-06 13:25:39,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325939.2336383, 'message': 'Dec 6 13:25:37 hqnl0246134 sshd[216930]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1404 seconds
INFO [2022-12-06 13:25:39,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.113.181', 'timestamp': 1670325939.2339318, 'message': 'Dec 6 13:25:38 hqnl0246134 sshd[216940]: Disconnected from invalid user gateway 157.230.113.181 port 56054 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1054 seconds
INFO [2022-12-06 13:25:41,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325941.2320304, 'message': 'Dec 6 13:25:40 hqnl0246134 sshd[216930]: Failed password for root from 61.177.172.108 port 37893 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 13:25:43,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325943.2351308, 'message': 'Dec 6 13:25:42 hqnl0246134 sshd[216930]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 13:25:45,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670325945.2378983, 'message': 'Dec 6 13:25:44 hqnl0246134 sshd[216930]: Failed password for root from 61.177.172.108 port 37893 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 13:25:46,028] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:25:46,029] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:25:54,437] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:25:54,469] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0429 seconds
INFO [2022-12-06 13:26:19,965] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:26:19,967] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:26:19,979] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:26:19,996] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0278 seconds
INFO [2022-12-06 13:26:23,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325983.2756832, 'message': 'Dec 6 13:26:21 hqnl0246134 sshd[216981]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.71.4.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 13:26:23,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325983.2763064, 'message': 'Dec 6 13:26:21 hqnl0246134 sshd[216981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.4.124 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 13:26:23,603] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:26:23,604] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:26:23,627] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:26:23,642] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0275 seconds
INFO [2022-12-06 13:26:25,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '167.71.4.124', 'timestamp': 1670325985.2790995, 'message': 'Dec 6 13:26:24 hqnl0246134 sshd[216981]: Failed password for root from 167.71.4.124 port 55148 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 13:26:29,058] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:26:29,059] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:26:29,067] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:26:29,082] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0228 seconds
WARNING [2022-12-06 13:26:46,032] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:26:46,033] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:26:47,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.158.139.57', 'timestamp': 1670326007.2995436, 'message': 'Dec 6 13:26:45 hqnl0246134 sshd[217008]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.158.139.57 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 13:26:47,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.158.139.57', 'timestamp': 1670326007.2998822, 'message': 'Dec 6 13:26:45 hqnl0246134 sshd[217008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 13:26:49,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '202.158.139.57', 'timestamp': 1670326009.3011038, 'message': 'Dec 6 13:26:48 hqnl0246134 sshd[217008]: Failed password for root from 202.158.139.57 port 33928 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 13:26:53,995] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:26:54,066] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:26:54,067] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:26:54,067] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:26:54,067] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:26:54,067] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:26:54,081] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:26:54,098] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0303 seconds
WARNING [2022-12-06 13:26:54,105] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:26:54,107] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:26:54,125] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0324 seconds
INFO [2022-12-06 13:26:54,126] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0306 seconds
WARNING [2022-12-06 13:26:54,443] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:26:54,479] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0492 seconds
INFO [2022-12-06 13:26:57,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670326017.3104625, 'message': 'Dec 6 13:26:56 hqnl0246134 sshd[217006]: Accepted password for supportwwwuser from 212.58.119.251 port 10721 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 13:26:59,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670326019.3126128, 'message': 'Dec 6 13:26:58 hqnl0246134 sshd[217004]: Accepted password for supportwwwuser from 212.58.119.251 port 10720 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 13:26:59,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670326019.31283, 'message': 'Dec 6 13:26:59 hqnl0246134 sshd[217058]: Invalid user admin from 137.184.196.76 port 49012', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 13:26:59,361] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.196.76', 'timestamp': 1670326019.3129835, 'message': 'Dec 6 13:26:59 hqnl0246134 sshd[217058]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.196.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 13:26:59,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.196.76', 'timestamp': 1670326019.3131196, 'message': 'Dec 6 13:26:59 hqnl0246134 sshd[217058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.196.76 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 13:27:01,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670326021.3143353, 'message': 'Dec 6 13:27:00 hqnl0246134 sshd[217058]: Failed password for invalid user admin from 137.184.196.76 port 49012 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 13:27:01,357] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670326021.3147078, 'message': 'Dec 6 13:27:00 hqnl0246134 sshd[217058]: Disconnected from invalid user admin 137.184.196.76 port 49012 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 13:27:09,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326029.3278058, 'message': 'Dec 6 13:27:09 hqnl0246134 sshd[217105]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0530 seconds
INFO [2022-12-06 13:27:09,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326029.3298435, 'message': 'Dec 6 13:27:09 hqnl0246134 sshd[217105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 13:27:11,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326031.324327, 'message': 'Dec 6 13:27:10 hqnl0246134 sshd[217105]: Failed password for root from 61.177.173.39 port 64282 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 13:27:11,361] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326031.3245206, 'message': 'Dec 6 13:27:11 hqnl0246134 sshd[217105]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 13:27:15,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326035.33084, 'message': 'Dec 6 13:27:13 hqnl0246134 sshd[217105]: Failed password for root from 61.177.173.39 port 64282 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 13:27:17,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326037.3347485, 'message': 'Dec 6 13:27:15 hqnl0246134 sshd[217105]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 13:27:17,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326037.3439693, 'message': 'Dec 6 13:27:17 hqnl0246134 sshd[217105]: Failed password for root from 61.177.173.39 port 64282 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 13:27:18,425] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:27:18,426] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:27:18,435] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:27:18,446] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 13:27:19,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326039.3375528, 'message': 'Dec 6 13:27:19 hqnl0246134 sshd[217115]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0389 seconds
INFO [2022-12-06 13:27:19,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326039.3379412, 'message': 'Dec 6 13:27:19 hqnl0246134 sshd[217115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0514 seconds
INFO [2022-12-06 13:27:21,560] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:27:21,561] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:27:21,576] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:27:21,589] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 13:27:23,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326043.3398676, 'message': 'Dec 6 13:27:21 hqnl0246134 sshd[217115]: Failed password for root from 61.177.173.39 port 39164 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0568 seconds
INFO [2022-12-06 13:27:23,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.229.48.227', 'timestamp': 1670326043.3408172, 'message': 'Dec 6 13:27:21 hqnl0246134 sshd[217122]: Invalid user tt from 67.229.48.227 port 39320', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0578 seconds
INFO [2022-12-06 13:27:23,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '67.229.48.227', 'timestamp': 1670326043.3410683, 'message': 'Dec 6 13:27:22 hqnl0246134 sshd[217122]: pam_imunify(sshd:auth): [IM360_RBL] The IP 67.229.48.227 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 13:27:23,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '67.229.48.227', 'timestamp': 1670326043.3412218, 'message': 'Dec 6 13:27:22 hqnl0246134 sshd[217122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.229.48.227 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 13:27:24,194] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:27:24,195] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:27:24,197] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 13:27:25,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326045.3405566, 'message': 'Dec 6 13:27:23 hqnl0246134 sshd[217115]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 13:27:25,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.229.48.227', 'timestamp': 1670326045.340822, 'message': 'Dec 6 13:27:23 hqnl0246134 sshd[217122]: Failed password for invalid user tt from 67.229.48.227 port 39320 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 13:27:27,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '67.229.48.227', 'timestamp': 1670326047.342082, 'message': 'Dec 6 13:27:25 hqnl0246134 sshd[217122]: Disconnected from invalid user tt 67.229.48.227 port 39320 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 13:27:27,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326047.3423254, 'message': 'Dec 6 13:27:25 hqnl0246134 sshd[217115]: Failed password for root from 61.177.173.39 port 39164 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 13:27:29,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326049.345207, 'message': 'Dec 6 13:27:27 hqnl0246134 sshd[217115]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 13:27:29,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.249.59.34', 'timestamp': 1670326049.3454194, 'message': 'Dec 6 13:27:29 hqnl0246134 sshd[217124]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.249.59.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 13:27:29,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.249.59.34', 'timestamp': 1670326049.345556, 'message': 'Dec 6 13:27:29 hqnl0246134 sshd[217124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.249.59.34 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 13:27:31,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326051.3467615, 'message': 'Dec 6 13:27:29 hqnl0246134 sshd[217115]: Failed password for root from 61.177.173.39 port 39164 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0415 seconds
INFO [2022-12-06 13:27:31,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.195.123', 'timestamp': 1670326051.3470445, 'message': 'Dec 6 13:27:29 hqnl0246134 sshd[217126]: Invalid user rick from 138.197.195.123 port 59302', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 13:27:31,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.195.123', 'timestamp': 1670326051.3471668, 'message': 'Dec 6 13:27:29 hqnl0246134 sshd[217126]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.195.123 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 13:27:31,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.195.123', 'timestamp': 1670326051.3472736, 'message': 'Dec 6 13:27:29 hqnl0246134 sshd[217126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.123 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 13:27:33,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.249.59.34', 'timestamp': 1670326053.3497245, 'message': 'Dec 6 13:27:31 hqnl0246134 sshd[217124]: Failed password for root from 20.249.59.34 port 6016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0488 seconds
INFO [2022-12-06 13:27:33,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326053.3501246, 'message': 'Dec 6 13:27:31 hqnl0246134 sshd[217129]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 13:27:33,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.195.123', 'timestamp': 1670326053.3504274, 'message': 'Dec 6 13:27:32 hqnl0246134 sshd[217126]: Failed password for invalid user rick from 138.197.195.123 port 59302 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0483 seconds
INFO [2022-12-06 13:27:33,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326053.350283, 'message': 'Dec 6 13:27:31 hqnl0246134 sshd[217129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 13:27:35,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326055.3510447, 'message': 'Dec 6 13:27:34 hqnl0246134 sshd[217129]: Failed password for root from 61.177.173.39 port 22268 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 13:27:35,382] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.195.123', 'timestamp': 1670326055.351359, 'message': 'Dec 6 13:27:35 hqnl0246134 sshd[217126]: Disconnected from invalid user rick 138.197.195.123 port 59302 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 13:27:37,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326057.3532634, 'message': 'Dec 6 13:27:36 hqnl0246134 sshd[217129]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0413 seconds
INFO [2022-12-06 13:27:37,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326057.353615, 'message': 'Dec 6 13:27:36 hqnl0246134 sshd[217141]: Invalid user administrator from 167.172.187.120 port 56418', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0417 seconds
INFO [2022-12-06 13:27:37,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326057.353806, 'message': 'Dec 6 13:27:36 hqnl0246134 sshd[217141]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.187.120 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 13:27:37,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326057.353983, 'message': 'Dec 6 13:27:36 hqnl0246134 sshd[217141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.187.120 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 13:27:39,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326059.355169, 'message': 'Dec 6 13:27:38 hqnl0246134 sshd[217129]: Failed password for root from 61.177.173.39 port 22268 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0623 seconds
INFO [2022-12-06 13:27:39,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.126.71.110', 'timestamp': 1670326059.3557222, 'message': 'Dec 6 13:27:38 hqnl0246134 sshd[217143]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.126.71.110 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0631 seconds
INFO [2022-12-06 13:27:39,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326059.3560214, 'message': 'Dec 6 13:27:38 hqnl0246134 sshd[217141]: Failed password for invalid user administrator from 167.172.187.120 port 56418 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0610 seconds
INFO [2022-12-06 13:27:39,474] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326059.3555648, 'message': 'Dec 6 13:27:38 hqnl0246134 sshd[217129]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0542 seconds
INFO [2022-12-06 13:27:39,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.17.230.180', 'timestamp': 1670326059.3561523, 'message': 'Dec 6 13:27:39 hqnl0246134 sshd[217145]: Invalid user vps from 217.17.230.180 port 41606', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0544 seconds
INFO [2022-12-06 13:27:39,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.126.71.110', 'timestamp': 1670326059.3558767, 'message': 'Dec 6 13:27:38 hqnl0246134 sshd[217143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.126.71.110 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0541 seconds
INFO [2022-12-06 13:27:39,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.17.230.180', 'timestamp': 1670326059.3563077, 'message': 'Dec 6 13:27:39 hqnl0246134 sshd[217145]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.17.230.180 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 13:27:39,514] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.17.230.180', 'timestamp': 1670326059.3564787, 'message': 'Dec 6 13:27:39 hqnl0246134 sshd[217145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.17.230.180 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 13:27:41,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326061.3576503, 'message': 'Dec 6 13:27:40 hqnl0246134 sshd[217129]: Failed password for root from 61.177.173.39 port 22268 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0691 seconds
INFO [2022-12-06 13:27:41,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '34.126.71.110', 'timestamp': 1670326061.35805, 'message': 'Dec 6 13:27:40 hqnl0246134 sshd[217143]: Failed password for root from 34.126.71.110 port 45260 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0698 seconds
INFO [2022-12-06 13:27:41,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326061.3582063, 'message': 'Dec 6 13:27:40 hqnl0246134 sshd[217141]: Disconnected from invalid user administrator 167.172.187.120 port 56418 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0697 seconds
INFO [2022-12-06 13:27:43,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.17.230.180', 'timestamp': 1670326063.3582304, 'message': 'Dec 6 13:27:41 hqnl0246134 sshd[217145]: Failed password for invalid user vps from 217.17.230.180 port 41606 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 13:27:45,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.17.230.180', 'timestamp': 1670326065.3612056, 'message': 'Dec 6 13:27:43 hqnl0246134 sshd[217145]: Disconnected from invalid user vps 217.17.230.180 port 41606 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0268 seconds
WARNING [2022-12-06 13:27:46,036] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:27:46,037] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:27:54,035] defence360agent.files: Updating all files
INFO [2022-12-06 13:27:54,354] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 13:27:54,355] defence360agent.files: ossec files update finished (not updated)
WARNING [2022-12-06 13:27:54,462] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:27:54,502] defence360agent.internals.the_sink: SensorIncidentList(<25 item(s)>) processed in 0.0576 seconds
INFO [2022-12-06 13:27:54,708] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 13:27:54,708] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 13:27:54,981] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 13:27:54,982] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 13:27:55,288] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 13:27:55,289] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 13:27:55,289] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 13:27:55,559] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 11:27:55 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E30B746D633B0'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 13:27:55,564] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 13:27:55,565] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 13:27:56,415] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 13:27:56,415] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 13:27:56,678] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 13:27:56,679] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 13:27:56,939] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 13:27:56,940] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 13:27:57,574] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 13:27:57,574] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 13:27:58,183] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 13:27:58,185] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 13:28:15,455] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670326095.3937068, 'message': 'Dec 6 13:28:13 hqnl0246134 sshd[217172]: Accepted password for supportwwwuser from 212.58.119.251 port 10498 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0590 seconds
INFO [2022-12-06 13:28:17,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.174.163', 'timestamp': 1670326097.3958151, 'message': 'Dec 6 13:28:16 hqnl0246134 sshd[217212]: Invalid user cactiuser from 87.98.174.163 port 60358', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0485 seconds
INFO [2022-12-06 13:28:17,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '87.98.174.163', 'timestamp': 1670326097.3959923, 'message': 'Dec 6 13:28:16 hqnl0246134 sshd[217212]: pam_imunify(sshd:auth): [IM360_RBL] The IP 87.98.174.163 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 13:28:17,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '87.98.174.163', 'timestamp': 1670326097.3987732, 'message': 'Dec 6 13:28:16 hqnl0246134 sshd[217212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.174.163 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0499 seconds
INFO [2022-12-06 13:28:19,448] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.174.163', 'timestamp': 1670326099.400897, 'message': 'Dec 6 13:28:18 hqnl0246134 sshd[217212]: Failed password for invalid user cactiuser from 87.98.174.163 port 60358 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0465 seconds
INFO [2022-12-06 13:28:19,690] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:28:19,691] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:28:19,707] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:28:19,721] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0285 seconds
INFO [2022-12-06 13:28:21,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.174.163', 'timestamp': 1670326101.4095044, 'message': 'Dec 6 13:28:20 hqnl0246134 sshd[217212]: Disconnected from invalid user cactiuser 87.98.174.163 port 60358 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.2366 seconds
INFO [2022-12-06 13:28:25,775] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:28:25,776] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:28:25,812] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:28:25,846] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0642 seconds
INFO [2022-12-06 13:28:26,373] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:28:26,374] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:28:26,390] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:28:26,414] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0389 seconds
WARNING [2022-12-06 13:28:46,041] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:28:46,043] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:28:54,467] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:28:54,504] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0530 seconds
INFO [2022-12-06 13:29:19,879] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:29:19,881] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:29:19,899] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:29:19,940] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0568 seconds
INFO [2022-12-06 13:29:22,812] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:29:22,813] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:29:22,827] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:29:22,840] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 13:29:29,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.158.139.57', 'timestamp': 1670326169.4768376, 'message': 'Dec 6 13:29:28 hqnl0246134 sshd[217284]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.158.139.57 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 13:29:29,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.158.139.57', 'timestamp': 1670326169.4776475, 'message': 'Dec 6 13:29:28 hqnl0246134 sshd[217284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 13:29:31,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '202.158.139.57', 'timestamp': 1670326171.475034, 'message': 'Dec 6 13:29:30 hqnl0246134 sshd[217284]: Failed password for root from 202.158.139.57 port 44178 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0403 seconds
WARNING [2022-12-06 13:29:46,047] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:29:46,050] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:29:54,482] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:29:54,531] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0670 seconds
INFO [2022-12-06 13:30:21,380] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:30:21,382] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:30:21,433] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:30:21,493] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0987 seconds
INFO [2022-12-06 13:30:27,585] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:30:27,586] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:30:27,607] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:30:27,659] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0692 seconds
INFO [2022-12-06 13:30:28,614] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:30:28,686] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:30:28,687] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:30:28,687] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:30:28,688] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:30:28,688] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:30:28,731] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:30:28,771] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0821 seconds
WARNING [2022-12-06 13:30:28,779] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:30:28,782] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:30:28,799] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0392 seconds
INFO [2022-12-06 13:30:28,801] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0322 seconds
INFO [2022-12-06 13:30:29,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.249.59.34', 'timestamp': 1670326229.5536652, 'message': 'Dec 6 13:30:28 hqnl0246134 sshd[217358]: Invalid user marcela from 20.249.59.34 port 3520', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 13:30:29,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.249.59.34', 'timestamp': 1670326229.5541255, 'message': 'Dec 6 13:30:28 hqnl0246134 sshd[217358]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.249.59.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 13:30:29,628] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.249.59.34', 'timestamp': 1670326229.5543084, 'message': 'Dec 6 13:30:28 hqnl0246134 sshd[217358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.249.59.34 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 13:30:31,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.249.59.34', 'timestamp': 1670326231.55382, 'message': 'Dec 6 13:30:31 hqnl0246134 sshd[217358]: Failed password for invalid user marcela from 20.249.59.34 port 3520 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 13:30:33,591] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.249.59.34', 'timestamp': 1670326233.5556762, 'message': 'Dec 6 13:30:32 hqnl0246134 sshd[217358]: Disconnected from invalid user marcela 20.249.59.34 port 3520 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 13:30:39,284] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:30:39,286] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:30:39,297] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:30:39,314] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0267 seconds
INFO [2022-12-06 13:30:45,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.195.123', 'timestamp': 1670326245.5764718, 'message': 'Dec 6 13:30:45 hqnl0246134 sshd[217384]: Invalid user go from 138.197.195.123 port 48534', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 13:30:45,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.195.123', 'timestamp': 1670326245.5814304, 'message': 'Dec 6 13:30:45 hqnl0246134 sshd[217384]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.195.123 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 13:30:45,653] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.195.123', 'timestamp': 1670326245.581895, 'message': 'Dec 6 13:30:45 hqnl0246134 sshd[217384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.123 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 13:30:46,052] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:30:46,053] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:30:47,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.195.123', 'timestamp': 1670326247.5772462, 'message': 'Dec 6 13:30:47 hqnl0246134 sshd[217384]: Failed password for invalid user go from 138.197.195.123 port 48534 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0569 seconds
INFO [2022-12-06 13:30:49,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.195.123', 'timestamp': 1670326249.5792673, 'message': 'Dec 6 13:30:48 hqnl0246134 sshd[217384]: Disconnected from invalid user go 138.197.195.123 port 48534 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1293 seconds
WARNING [2022-12-06 13:30:54,482] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:30:54,536] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0676 seconds
INFO [2022-12-06 13:30:55,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.114.119.22', 'timestamp': 1670326255.5861683, 'message': 'Dec 6 13:30:53 hqnl0246134 sshd[217396]: Invalid user server from 85.114.119.22 port 59551', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1035 seconds
INFO [2022-12-06 13:30:55,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '85.114.119.22', 'timestamp': 1670326255.5865176, 'message': 'Dec 6 13:30:54 hqnl0246134 sshd[217396]: pam_imunify(sshd:auth): [IM360_RBL] The IP 85.114.119.22 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0953 seconds
INFO [2022-12-06 13:30:55,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '85.114.119.22', 'timestamp': 1670326255.5867887, 'message': 'Dec 6 13:30:54 hqnl0246134 sshd[217396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.114.119.22 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0906 seconds
INFO [2022-12-06 13:30:57,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.114.119.22', 'timestamp': 1670326257.5868518, 'message': 'Dec 6 13:30:56 hqnl0246134 sshd[217396]: Failed password for invalid user server from 85.114.119.22 port 59551 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 13:30:59,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.114.119.22', 'timestamp': 1670326259.591194, 'message': 'Dec 6 13:30:57 hqnl0246134 sshd[217396]: Disconnected from invalid user server 85.114.119.22 port 59551 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0430 seconds
INFO [2022-12-06 13:31:03,783] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:31:03,787] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:31:03,804] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 13:31:20,290] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:31:20,292] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:31:20,306] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:31:20,326] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0322 seconds
INFO [2022-12-06 13:31:27,324] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:31:27,332] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:31:27,343] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:31:27,358] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0246 seconds
WARNING [2022-12-06 13:31:46,058] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:31:46,063] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:31:53,272] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 13:31:54,546] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:31:54,706] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.2320 seconds
INFO [2022-12-06 13:32:19,614] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:32:19,615] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:32:19,623] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:32:19,637] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
INFO [2022-12-06 13:32:22,998] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:32:22,999] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:32:23,015] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:32:23,041] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0409 seconds
INFO [2022-12-06 13:32:31,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326351.7112594, 'message': 'Dec 6 13:32:30 hqnl0246134 sshd[217501]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.187.120 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0463 seconds
INFO [2022-12-06 13:32:31,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326351.712231, 'message': 'Dec 6 13:32:30 hqnl0246134 sshd[217501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.187.120 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 13:32:33,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326353.7098598, 'message': 'Dec 6 13:32:32 hqnl0246134 sshd[217501]: Failed password for root from 167.172.187.120 port 41378 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 13:32:38,074] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:32:38,075] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:32:38,092] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:32:38,116] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0389 seconds
WARNING [2022-12-06 13:32:46,066] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:32:46,068] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:32:54,494] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:32:54,547] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0670 seconds
INFO [2022-12-06 13:32:57,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5555, 'attackers_ip': None, 'timestamp': 1670326377.7337368, 'message': 'Dec 6 13:32:56 hqnl0246134 passwd[217516]: pam_unix(passwd:chauthtok): password changed for root', 'severity': 4, 'name': 'User changed password.', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 13:33:03,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326383.740016, 'message': 'Dec 6 13:33:02 hqnl0246134 sshd[217528]: Invalid user ruser from 159.223.96.213 port 59392', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 13:33:03,792] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326383.7408059, 'message': 'Dec 6 13:33:02 hqnl0246134 sshd[217528]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.223.96.213 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 13:33:03,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326383.7411582, 'message': 'Dec 6 13:33:02 hqnl0246134 sshd[217528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.96.213 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 13:33:05,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326385.7386622, 'message': 'Dec 6 13:33:04 hqnl0246134 sshd[217528]: Failed password for invalid user ruser from 159.223.96.213 port 59392 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 13:33:05,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326385.738929, 'message': 'Dec 6 13:33:04 hqnl0246134 sshd[217528]: Disconnected from invalid user ruser 159.223.96.213 port 59392 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 13:33:19,053] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:33:19,055] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:33:19,064] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:33:19,078] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0226 seconds
INFO [2022-12-06 13:33:22,321] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:33:22,322] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:33:22,340] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:33:22,371] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0463 seconds
INFO [2022-12-06 13:33:23,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326403.7564094, 'message': 'Dec 6 13:33:23 hqnl0246134 sshd[217552]: Invalid user test123 from 200.94.86.84 port 57666', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 13:33:23,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326403.7567606, 'message': 'Dec 6 13:33:23 hqnl0246134 sshd[217552]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.94.86.84 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 13:33:23,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326403.7569945, 'message': 'Dec 6 13:33:23 hqnl0246134 sshd[217552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.94.86.84 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 13:33:25,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326405.762113, 'message': 'Dec 6 13:33:25 hqnl0246134 sshd[217552]: Failed password for invalid user test123 from 200.94.86.84 port 57666 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0529 seconds
INFO [2022-12-06 13:33:25,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.221.4.3', 'timestamp': 1670326405.762361, 'message': 'Dec 6 13:33:25 hqnl0246134 sshd[217555]: Invalid user ftp_user from 112.221.4.3 port 38468', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0532 seconds
INFO [2022-12-06 13:33:25,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '112.221.4.3', 'timestamp': 1670326405.7624989, 'message': 'Dec 6 13:33:25 hqnl0246134 sshd[217555]: pam_imunify(sshd:auth): [IM360_RBL] The IP 112.221.4.3 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 13:33:25,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '112.221.4.3', 'timestamp': 1670326405.7626476, 'message': 'Dec 6 13:33:25 hqnl0246134 sshd[217555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.221.4.3 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 13:33:27,785] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326407.7629566, 'message': 'Dec 6 13:33:26 hqnl0246134 sshd[217552]: Disconnected from invalid user test123 200.94.86.84 port 57666 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 13:33:29,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.221.4.3', 'timestamp': 1670326409.7694163, 'message': 'Dec 6 13:33:27 hqnl0246134 sshd[217555]: Failed password for invalid user ftp_user from 112.221.4.3 port 38468 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 13:33:31,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.221.4.3', 'timestamp': 1670326411.7667823, 'message': 'Dec 6 13:33:29 hqnl0246134 sshd[217555]: Disconnected from invalid user ftp_user 112.221.4.3 port 38468 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0315 seconds
WARNING [2022-12-06 13:33:46,072] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:33:46,074] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:33:54,512] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:33:54,513] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:33:54,587] defence360agent.internals.the_sink: LocalIncidentList(<1 item(s)>) processed in 0.1003 seconds
INFO [2022-12-06 13:33:54,588] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0992 seconds
INFO [2022-12-06 13:34:21,907] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:34:21,909] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:34:21,927] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:34:21,967] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0567 seconds
INFO [2022-12-06 13:34:26,298] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:34:26,299] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:34:26,308] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:34:26,323] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
WARNING [2022-12-06 13:34:46,078] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:34:46,080] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:35:05,949] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326505.9197788, 'message': 'Dec 6 13:35:04 hqnl0246134 sshd[217667]: Invalid user ninja from 167.172.187.120 port 60020', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 13:35:05,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326505.9205256, 'message': 'Dec 6 13:35:04 hqnl0246134 sshd[217667]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.187.120 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 13:35:05,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326505.9207861, 'message': 'Dec 6 13:35:04 hqnl0246134 sshd[217667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.187.120 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 13:35:07,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326507.918773, 'message': 'Dec 6 13:35:06 hqnl0246134 sshd[217667]: Failed password for invalid user ninja from 167.172.187.120 port 60020 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 13:35:09,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326509.920805, 'message': 'Dec 6 13:35:08 hqnl0246134 sshd[217667]: Disconnected from invalid user ninja 167.172.187.120 port 60020 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 13:35:10,358] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:35:10,428] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:35:10,429] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:35:10,430] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:35:10,430] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:35:10,430] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:35:10,443] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:35:10,461] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0301 seconds
WARNING [2022-12-06 13:35:10,469] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:35:10,473] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:35:10,491] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0378 seconds
INFO [2022-12-06 13:35:10,493] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0348 seconds
INFO [2022-12-06 13:35:11,129] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:35:11,130] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:35:11,138] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:35:11,151] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 13:35:17,970] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:35:17,970] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:35:17,978] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:35:17,990] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 13:35:20,734] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:35:20,735] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:35:20,743] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:35:20,755] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 13:35:40,568] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:35:40,569] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:35:40,570] im360.plugins.client360: Waiting 2 minutes before retry...
WARNING [2022-12-06 13:35:46,084] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:35:46,085] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:35:50,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326549.9682212, 'message': 'Dec 6 13:35:48 hqnl0246134 sshd[217724]: Invalid user user1 from 159.223.96.213 port 43694', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 13:35:50,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326549.9688997, 'message': 'Dec 6 13:35:48 hqnl0246134 sshd[217724]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.223.96.213 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 13:35:50,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326549.9691072, 'message': 'Dec 6 13:35:48 hqnl0246134 sshd[217724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.96.213 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 13:35:51,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326551.9728987, 'message': 'Dec 6 13:35:50 hqnl0246134 sshd[217724]: Failed password for invalid user user1 from 159.223.96.213 port 43694 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 13:35:53,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326553.9760857, 'message': 'Dec 6 13:35:52 hqnl0246134 sshd[217724]: Disconnected from invalid user user1 159.223.96.213 port 43694 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 13:35:54,508] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:35:54,544] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0491 seconds
INFO [2022-12-06 13:36:14,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326574.008819, 'message': 'Dec 6 13:36:12 hqnl0246134 sshd[217748]: Invalid user dbuser from 200.94.86.84 port 52730', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 13:36:14,051] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326574.00919, 'message': 'Dec 6 13:36:12 hqnl0246134 sshd[217748]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.94.86.84 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 13:36:14,068] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326574.0105653, 'message': 'Dec 6 13:36:12 hqnl0246134 sshd[217748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.94.86.84 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 13:36:16,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326576.0093157, 'message': 'Dec 6 13:36:14 hqnl0246134 sshd[217748]: Failed password for invalid user dbuser from 200.94.86.84 port 52730 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 13:36:18,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326578.0117757, 'message': 'Dec 6 13:36:16 hqnl0246134 sshd[217748]: Disconnected from invalid user dbuser 200.94.86.84 port 52730 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0442 seconds
INFO [2022-12-06 13:36:18,965] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:36:18,965] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:36:19,007] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:36:19,042] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0574 seconds
INFO [2022-12-06 13:36:22,767] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:36:22,767] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:36:22,797] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:36:22,818] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0417 seconds
INFO [2022-12-06 13:36:30,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '112.221.4.3', 'timestamp': 1670326590.0249395, 'message': 'Dec 6 13:36:28 hqnl0246134 sshd[217770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 112.221.4.3 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 13:36:30,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '112.221.4.3', 'timestamp': 1670326590.0252311, 'message': 'Dec 6 13:36:28 hqnl0246134 sshd[217770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.221.4.3 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 13:36:32,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '112.221.4.3', 'timestamp': 1670326592.026938, 'message': 'Dec 6 13:36:30 hqnl0246134 sshd[217770]: Failed password for root from 112.221.4.3 port 56736 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-06 13:36:46,088] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:36:46,089] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:36:54,515] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:36:54,555] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0547 seconds
INFO [2022-12-06 13:37:17,994] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:37:17,995] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:37:18,004] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:37:18,018] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-06 13:37:20,612] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:37:20,613] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:37:20,628] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:37:20,649] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0351 seconds
INFO [2022-12-06 13:37:36,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326656.1173615, 'message': 'Dec 6 13:37:34 hqnl0246134 sshd[217826]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 13:37:36,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326656.1176322, 'message': 'Dec 6 13:37:34 hqnl0246134 sshd[217826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 13:37:38,140] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326658.119679, 'message': 'Dec 6 13:37:36 hqnl0246134 sshd[217826]: Failed password for root from 61.177.172.104 port 30280 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 13:37:40,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326660.1296504, 'message': 'Dec 6 13:37:38 hqnl0246134 sshd[217826]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 13:37:42,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326662.1278727, 'message': 'Dec 6 13:37:41 hqnl0246134 sshd[217826]: Failed password for root from 61.177.172.104 port 30280 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 13:37:44,169] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326664.1355417, 'message': 'Dec 6 13:37:43 hqnl0246134 sshd[217845]: Invalid user liuhai from 167.172.187.120 port 50418', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 13:37:44,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326664.136052, 'message': 'Dec 6 13:37:43 hqnl0246134 sshd[217826]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 13:37:44,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326664.1357584, 'message': 'Dec 6 13:37:43 hqnl0246134 sshd[217845]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.187.120 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 13:37:44,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326664.1359437, 'message': 'Dec 6 13:37:43 hqnl0246134 sshd[217845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.187.120 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 13:37:46,092] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:37:46,092] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:37:46,167] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326666.1373637, 'message': 'Dec 6 13:37:45 hqnl0246134 sshd[217845]: Failed password for invalid user liuhai from 167.172.187.120 port 50418 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 13:37:46,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326666.1376371, 'message': 'Dec 6 13:37:45 hqnl0246134 sshd[217826]: Failed password for root from 61.177.172.104 port 30280 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 13:37:48,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670326668.1378136, 'message': 'Dec 6 13:37:47 hqnl0246134 sshd[217845]: Disconnected from invalid user liuhai 167.172.187.120 port 50418 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0475 seconds
INFO [2022-12-06 13:37:50,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326670.1416256, 'message': 'Dec 6 13:37:50 hqnl0246134 sshd[217849]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 13:37:50,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326670.1419806, 'message': 'Dec 6 13:37:50 hqnl0246134 sshd[217849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 13:37:50,953] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:37:50,954] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:37:50,962] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:37:50,975] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 13:37:54,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326674.1456559, 'message': 'Dec 6 13:37:52 hqnl0246134 sshd[217849]: Failed password for root from 61.177.172.104 port 27650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-06 13:37:54,510] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:37:54,546] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0434 seconds
INFO [2022-12-06 13:37:56,177] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326676.1494095, 'message': 'Dec 6 13:37:54 hqnl0246134 sshd[217849]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 13:37:58,172] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326678.15284, 'message': 'Dec 6 13:37:56 hqnl0246134 sshd[217849]: Failed password for root from 61.177.172.104 port 27650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 13:38:00,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326680.154012, 'message': 'Dec 6 13:37:58 hqnl0246134 sshd[217849]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 13:38:02,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326682.1544075, 'message': 'Dec 6 13:38:00 hqnl0246134 sshd[217849]: Failed password for root from 61.177.172.104 port 27650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 13:38:04,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326684.159171, 'message': 'Dec 6 13:38:02 hqnl0246134 sshd[217865]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 13:38:04,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326684.159369, 'message': 'Dec 6 13:38:02 hqnl0246134 sshd[217865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 13:38:06,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326686.1614587, 'message': 'Dec 6 13:38:05 hqnl0246134 sshd[217865]: Failed password for root from 61.177.172.104 port 63389 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 13:38:08,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326688.164172, 'message': 'Dec 6 13:38:07 hqnl0246134 sshd[217865]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 13:38:10,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326690.1658196, 'message': 'Dec 6 13:38:09 hqnl0246134 sshd[217865]: Failed password for root from 61.177.172.104 port 63389 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 13:38:12,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326692.1672964, 'message': 'Dec 6 13:38:11 hqnl0246134 sshd[217865]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 13:38:13,850] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:38:13,915] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:38:13,915] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:38:13,916] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:38:13,916] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:38:13,916] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:38:13,926] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:38:13,943] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0263 seconds
WARNING [2022-12-06 13:38:13,950] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:38:13,953] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:38:13,971] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0339 seconds
INFO [2022-12-06 13:38:13,972] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0319 seconds
INFO [2022-12-06 13:38:14,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326694.1707008, 'message': 'Dec 6 13:38:14 hqnl0246134 sshd[217865]: Failed password for root from 61.177.172.104 port 63389 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 13:38:17,961] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:38:17,962] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:38:17,972] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:38:17,986] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-06 13:38:18,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326698.176174, 'message': 'Dec 6 13:38:17 hqnl0246134 sshd[217885]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 13:38:18,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326698.1764348, 'message': 'Dec 6 13:38:17 hqnl0246134 sshd[217885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 13:38:20,642] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:38:20,643] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:38:20,649] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:38:20,660] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0165 seconds
INFO [2022-12-06 13:38:22,211] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326702.1830156, 'message': 'Dec 6 13:38:20 hqnl0246134 sshd[217885]: Failed password for root from 61.177.172.104 port 48599 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 13:38:22,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326702.183201, 'message': 'Dec 6 13:38:20 hqnl0246134 sshd[217893]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 13:38:22,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326702.1833227, 'message': 'Dec 6 13:38:20 hqnl0246134 sshd[217893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.124 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 13:38:24,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326704.1852086, 'message': 'Dec 6 13:38:22 hqnl0246134 sshd[217885]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 13:38:24,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326704.1855106, 'message': 'Dec 6 13:38:23 hqnl0246134 sshd[217893]: Failed password for root from 61.177.172.124 port 63127 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 13:38:24,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326704.1856241, 'message': 'Dec 6 13:38:23 hqnl0246134 sshd[217885]: Failed password for root from 61.177.172.104 port 48599 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 13:38:26,216] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326706.18801, 'message': 'Dec 6 13:38:24 hqnl0246134 sshd[217885]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 13:38:26,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326706.1883047, 'message': 'Dec 6 13:38:24 hqnl0246134 sshd[217893]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 13:38:28,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670326708.1904624, 'message': 'Dec 6 13:38:26 hqnl0246134 sshd[217900]: Accepted password for supportwwwuser from 212.58.119.251 port 10674 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0410 seconds
INFO [2022-12-06 13:38:28,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326708.1913807, 'message': 'Dec 6 13:38:27 hqnl0246134 sshd[217885]: Failed password for root from 61.177.172.104 port 48599 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0411 seconds
INFO [2022-12-06 13:38:28,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326708.1915064, 'message': 'Dec 6 13:38:27 hqnl0246134 sshd[217893]: Failed password for root from 61.177.172.124 port 63127 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0410 seconds
INFO [2022-12-06 13:38:30,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326710.1940742, 'message': 'Dec 6 13:38:29 hqnl0246134 sshd[217893]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 13:38:32,290] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670326712.1971555, 'message': 'Dec 6 13:38:30 hqnl0246134 sshd[217942]: Accepted password for supportwwwuser from 212.58.119.251 port 10675 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0924 seconds
INFO [2022-12-06 13:38:32,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326712.1974444, 'message': 'Dec 6 13:38:31 hqnl0246134 sshd[217893]: Failed password for root from 61.177.172.124 port 63127 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0929 seconds
INFO [2022-12-06 13:38:32,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326712.1976473, 'message': 'Dec 6 13:38:31 hqnl0246134 sshd[217939]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0929 seconds
INFO [2022-12-06 13:38:32,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326712.1979082, 'message': 'Dec 6 13:38:31 hqnl0246134 sshd[217939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 13:38:34,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326714.1978447, 'message': 'Dec 6 13:38:33 hqnl0246134 sshd[217939]: Failed password for root from 61.177.172.104 port 24013 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 13:38:36,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326716.2004383, 'message': 'Dec 6 13:38:35 hqnl0246134 sshd[217969]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0446 seconds
INFO [2022-12-06 13:38:36,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326716.2008393, 'message': 'Dec 6 13:38:35 hqnl0246134 sshd[217939]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-06 13:38:36,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326716.200965, 'message': 'Dec 6 13:38:36 hqnl0246134 sshd[217971]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-06 13:38:36,285] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326716.200686, 'message': 'Dec 6 13:38:35 hqnl0246134 sshd[217969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.124 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0393 seconds
INFO [2022-12-06 13:38:36,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326716.2010813, 'message': 'Dec 6 13:38:36 hqnl0246134 sshd[217971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-06 13:38:38,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326718.2038426, 'message': 'Dec 6 13:38:37 hqnl0246134 sshd[217969]: Failed password for root from 61.177.172.124 port 62787 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-06 13:38:40,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326720.205737, 'message': 'Dec 6 13:38:38 hqnl0246134 sshd[217939]: Failed password for root from 61.177.172.104 port 24013 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0575 seconds
INFO [2022-12-06 13:38:40,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326720.2070043, 'message': 'Dec 6 13:38:38 hqnl0246134 sshd[217971]: Failed password for root from 61.177.173.39 port 39493 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0575 seconds
INFO [2022-12-06 13:38:40,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326720.2071111, 'message': 'Dec 6 13:38:39 hqnl0246134 sshd[217969]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0574 seconds
INFO [2022-12-06 13:38:42,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326722.2065728, 'message': 'Dec 6 13:38:40 hqnl0246134 sshd[217939]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0432 seconds
INFO [2022-12-06 13:38:42,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326722.2068071, 'message': 'Dec 6 13:38:40 hqnl0246134 sshd[217971]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0436 seconds
INFO [2022-12-06 13:38:42,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326722.2069614, 'message': 'Dec 6 13:38:41 hqnl0246134 sshd[217969]: Failed password for root from 61.177.172.124 port 62787 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0432 seconds
INFO [2022-12-06 13:38:42,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326722.2070675, 'message': 'Dec 6 13:38:41 hqnl0246134 sshd[217969]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 13:38:44,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670326724.2097793, 'message': 'Dec 6 13:38:42 hqnl0246134 sshd[217939]: Failed password for root from 61.177.172.104 port 24013 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0445 seconds
INFO [2022-12-06 13:38:44,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326724.2100549, 'message': 'Dec 6 13:38:42 hqnl0246134 sshd[218006]: Invalid user rf from 159.223.96.213 port 49428', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0448 seconds
INFO [2022-12-06 13:38:44,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326724.2104545, 'message': 'Dec 6 13:38:42 hqnl0246134 sshd[217971]: Failed password for root from 61.177.173.39 port 39493 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-06 13:38:44,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326724.21019, 'message': 'Dec 6 13:38:42 hqnl0246134 sshd[218006]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.223.96.213 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 13:38:44,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326724.2105644, 'message': 'Dec 6 13:38:43 hqnl0246134 sshd[217969]: Failed password for root from 61.177.172.124 port 62787 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 13:38:44,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326724.2103455, 'message': 'Dec 6 13:38:42 hqnl0246134 sshd[218006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.96.213 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 13:38:45,198] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:38:45,199] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:38:45,200] im360.plugins.client360: Waiting 6 minutes before retry...
WARNING [2022-12-06 13:38:46,097] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:38:46,097] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:38:46,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326726.2122684, 'message': 'Dec 6 13:38:44 hqnl0246134 sshd[218006]: Failed password for invalid user rf from 159.223.96.213 port 49428 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 13:38:46,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326726.2124922, 'message': 'Dec 6 13:38:45 hqnl0246134 sshd[217971]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 13:38:46,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.223.96.213', 'timestamp': 1670326726.2126262, 'message': 'Dec 6 13:38:45 hqnl0246134 sshd[218006]: Disconnected from invalid user rf 159.223.96.213 port 49428 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 13:38:48,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326728.2159636, 'message': 'Dec 6 13:38:46 hqnl0246134 sshd[218008]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 13:38:48,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326728.216309, 'message': 'Dec 6 13:38:46 hqnl0246134 sshd[217971]: Failed password for root from 61.177.173.39 port 39493 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 13:38:48,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326728.2161674, 'message': 'Dec 6 13:38:46 hqnl0246134 sshd[218008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.124 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 13:38:50,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326730.219973, 'message': 'Dec 6 13:38:48 hqnl0246134 sshd[218008]: Failed password for root from 61.177.172.124 port 37295 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 13:38:50,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326730.220431, 'message': 'Dec 6 13:38:48 hqnl0246134 sshd[218010]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 13:38:50,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326730.2202392, 'message': 'Dec 6 13:38:48 hqnl0246134 sshd[218008]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 13:38:50,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326730.2205358, 'message': 'Dec 6 13:38:48 hqnl0246134 sshd[218010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 13:38:52,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326732.2223132, 'message': 'Dec 6 13:38:51 hqnl0246134 sshd[218008]: Failed password for root from 61.177.172.124 port 37295 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 13:38:52,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326732.2230325, 'message': 'Dec 6 13:38:51 hqnl0246134 sshd[218010]: Failed password for root from 61.177.173.39 port 32675 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 13:38:54,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326734.2258296, 'message': 'Dec 6 13:38:52 hqnl0246134 sshd[218008]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0457 seconds
INFO [2022-12-06 13:38:54,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326734.2261162, 'message': 'Dec 6 13:38:53 hqnl0246134 sshd[218010]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0459 seconds
WARNING [2022-12-06 13:38:54,513] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:38:54,556] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0501 seconds
INFO [2022-12-06 13:38:56,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326736.2257655, 'message': 'Dec 6 13:38:54 hqnl0246134 sshd[218010]: Failed password for root from 61.177.173.39 port 32675 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 13:38:56,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326736.2260416, 'message': 'Dec 6 13:38:55 hqnl0246134 sshd[218008]: Failed password for root from 61.177.172.124 port 37295 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 13:38:56,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326736.2291126, 'message': 'Dec 6 13:38:55 hqnl0246134 sshd[218010]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 13:38:58,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326738.2288043, 'message': 'Dec 6 13:38:57 hqnl0246134 sshd[218010]: Failed password for root from 61.177.173.39 port 32675 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0475 seconds
INFO [2022-12-06 13:39:00,203] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:39:00,204] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:39:00,214] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:39:00,227] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0228 seconds
INFO [2022-12-06 13:39:00,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326740.2298539, 'message': 'Dec 6 13:38:58 hqnl0246134 sshd[218016]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 13:39:00,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326740.2300322, 'message': 'Dec 6 13:38:58 hqnl0246134 sshd[218016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.124 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 13:39:02,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326742.2339542, 'message': 'Dec 6 13:39:00 hqnl0246134 sshd[218016]: Failed password for root from 61.177.172.124 port 32447 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0528 seconds
INFO [2022-12-06 13:39:02,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326742.2345536, 'message': 'Dec 6 13:39:01 hqnl0246134 sshd[218023]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0524 seconds
INFO [2022-12-06 13:39:02,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326742.2343872, 'message': 'Dec 6 13:39:01 hqnl0246134 sshd[218016]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0550 seconds
INFO [2022-12-06 13:39:02,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326742.2347097, 'message': 'Dec 6 13:39:01 hqnl0246134 sshd[218023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0550 seconds
INFO [2022-12-06 13:39:04,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326744.2387567, 'message': 'Dec 6 13:39:03 hqnl0246134 sshd[218016]: Failed password for root from 61.177.172.124 port 32447 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 13:39:04,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326744.2390387, 'message': 'Dec 6 13:39:03 hqnl0246134 sshd[218023]: Failed password for root from 61.177.173.39 port 22539 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 13:39:06,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326746.2424312, 'message': 'Dec 6 13:39:05 hqnl0246134 sshd[218016]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 13:39:06,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326746.2425964, 'message': 'Dec 6 13:39:05 hqnl0246134 sshd[218023]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 13:39:08,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670326748.2479482, 'message': 'Dec 6 13:39:07 hqnl0246134 sshd[218016]: Failed password for root from 61.177.172.124 port 32447 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 13:39:08,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326748.248293, 'message': 'Dec 6 13:39:07 hqnl0246134 sshd[218023]: Failed password for root from 61.177.173.39 port 22539 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 13:39:08,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326748.2484248, 'message': 'Dec 6 13:39:07 hqnl0246134 sshd[218023]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 13:39:10,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670326750.249964, 'message': 'Dec 6 13:39:09 hqnl0246134 sshd[218023]: Failed password for root from 61.177.173.39 port 22539 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 13:39:14,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326754.255365, 'message': 'Dec 6 13:39:13 hqnl0246134 sshd[218165]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.94.86.84 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 13:39:14,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326754.255618, 'message': 'Dec 6 13:39:13 hqnl0246134 sshd[218165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.94.86.84 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 13:39:16,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '200.94.86.84', 'timestamp': 1670326756.2573957, 'message': 'Dec 6 13:39:15 hqnl0246134 sshd[218165]: Failed password for root from 200.94.86.84 port 47811 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 13:39:17,923] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:39:17,924] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:39:17,931] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:39:17,943] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 13:39:20,549] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:39:20,549] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:39:20,555] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:39:20,566] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0164 seconds
INFO [2022-12-06 13:39:44,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '112.221.4.3', 'timestamp': 1670326784.315277, 'message': 'Dec 6 13:39:42 hqnl0246134 sshd[218189]: pam_imunify(sshd:auth): [IM360_RBL] The IP 112.221.4.3 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0496 seconds
INFO [2022-12-06 13:39:44,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '112.221.4.3', 'timestamp': 1670326784.3163157, 'message': 'Dec 6 13:39:42 hqnl0246134 sshd[218189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.221.4.3 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0386 seconds
WARNING [2022-12-06 13:39:46,102] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:39:46,103] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:39:46,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '112.221.4.3', 'timestamp': 1670326786.313621, 'message': 'Dec 6 13:39:44 hqnl0246134 sshd[218189]: Failed password for root from 112.221.4.3 port 46758 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 13:39:54,520] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:39:54,547] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0367 seconds
INFO [2022-12-06 13:40:17,994] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:40:17,994] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:40:18,003] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:40:18,016] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 13:40:20,897] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:40:20,897] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:40:20,905] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:40:20,917] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
WARNING [2022-12-06 13:40:46,110] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:40:46,113] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:41:17,951] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:41:17,953] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:41:17,965] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:41:17,979] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0249 seconds
INFO [2022-12-06 13:41:20,644] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:41:20,645] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:41:20,654] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:41:20,666] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 13:41:44,548] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.255.8.153', 'timestamp': 1670326904.5189228, 'message': 'Dec 6 13:41:42 hqnl0246134 sshd[218313]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.255.8.153 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 13:41:44,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.255.8.153', 'timestamp': 1670326904.5199955, 'message': 'Dec 6 13:41:42 hqnl0246134 sshd[218313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.8.153 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 13:41:44,587] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.255.8.153', 'timestamp': 1670326904.5202043, 'message': 'Dec 6 13:41:44 hqnl0246134 sshd[218313]: Failed password for root from 36.255.8.153 port 41506 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 13:41:46,116] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:41:46,117] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:41:52,681] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:41:52,682] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:41:52,729] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:41:52,757] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0635 seconds
WARNING [2022-12-06 13:41:53,280] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 13:41:54,523] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:41:54,543] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0267 seconds
INFO [2022-12-06 13:42:18,006] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:42:18,007] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:42:18,017] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:42:18,030] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 13:42:20,821] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:42:20,822] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:42:20,829] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:42:20,841] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 13:42:36,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670326956.5858285, 'message': 'Dec 6 13:42:35 hqnl0246134 sshd[218356]: Accepted password for supportwwwuser from 212.58.119.251 port 10560 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0908 seconds
WARNING [2022-12-06 13:42:46,120] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:42:46,123] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:42:54,532] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:42:54,557] defence360agent.internals.the_sink: SensorIncidentList(<1 item(s)>) processed in 0.0356 seconds
INFO [2022-12-06 13:43:18,130] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:43:18,131] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:43:18,142] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:43:18,164] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0310 seconds
INFO [2022-12-06 13:43:21,297] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:43:21,298] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:43:21,306] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:43:21,319] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 13:43:40,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670327020.665188, 'message': 'Dec 6 13:43:39 hqnl0246134 sshd[218460]: Accepted password for supportwwwuser from 212.58.119.251 port 10588 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0247 seconds
WARNING [2022-12-06 13:43:46,125] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:43:46,127] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:43:46,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.255.8.153', 'timestamp': 1670327026.672863, 'message': 'Dec 6 13:43:45 hqnl0246134 sshd[218508]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.255.8.153 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 13:43:46,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.255.8.153', 'timestamp': 1670327026.6731563, 'message': 'Dec 6 13:43:45 hqnl0246134 sshd[218508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.8.153 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 13:43:48,693] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.255.8.153', 'timestamp': 1670327028.674426, 'message': 'Dec 6 13:43:47 hqnl0246134 sshd[218508]: Failed password for root from 36.255.8.153 port 33386 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 13:43:54,624] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:43:54,714] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.1847 seconds
INFO [2022-12-06 13:44:18,311] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:44:18,312] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:44:18,324] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:44:18,340] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0260 seconds
INFO [2022-12-06 13:44:21,674] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:44:21,675] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:44:21,684] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:44:21,696] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
WARNING [2022-12-06 13:44:46,130] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:44:46,132] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:45:19,093] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:45:19,094] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:45:19,106] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:45:19,121] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0258 seconds
INFO [2022-12-06 13:45:22,527] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:45:22,528] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:45:22,535] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:45:22,548] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 13:45:26,090] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:45:26,176] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:45:26,177] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:45:26,177] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:45:26,178] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:45:26,178] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:45:26,194] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:45:26,218] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0390 seconds
WARNING [2022-12-06 13:45:26,226] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:45:26,229] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:45:26,247] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0377 seconds
INFO [2022-12-06 13:45:26,266] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0517 seconds
INFO [2022-12-06 13:45:42,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.255.8.153', 'timestamp': 1670327142.8150873, 'message': 'Dec 6 13:45:42 hqnl0246134 sshd[218640]: Invalid user ftp_user from 36.255.8.153 port 36800', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 13:45:42,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.255.8.153', 'timestamp': 1670327142.8159857, 'message': 'Dec 6 13:45:42 hqnl0246134 sshd[218640]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.255.8.153 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 13:45:42,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.255.8.153', 'timestamp': 1670327142.8161876, 'message': 'Dec 6 13:45:42 hqnl0246134 sshd[218640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.8.153 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 13:45:44,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.255.8.153', 'timestamp': 1670327144.8113663, 'message': 'Dec 6 13:45:44 hqnl0246134 sshd[218640]: Failed password for invalid user ftp_user from 36.255.8.153 port 36800 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0418 seconds
WARNING [2022-12-06 13:45:46,136] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:45:46,137] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:45:46,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.255.8.153', 'timestamp': 1670327146.8145337, 'message': 'Dec 6 13:45:44 hqnl0246134 sshd[218640]: Disconnected from invalid user ftp_user 36.255.8.153 port 36800 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 13:45:48,373] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:45:48,374] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:45:48,382] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:45:48,394] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
WARNING [2022-12-06 13:45:54,551] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:45:54,602] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0641 seconds
INFO [2022-12-06 13:45:56,310] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:45:56,310] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:45:56,311] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 13:46:25,897] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:46:25,899] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:46:25,911] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:46:25,926] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0265 seconds
INFO [2022-12-06 13:46:30,216] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:46:30,217] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:46:30,226] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:46:30,246] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0277 seconds
WARNING [2022-12-06 13:46:46,140] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:46:46,144] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:47:21,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670327240.943313, 'message': 'Dec 6 13:47:19 hqnl0246134 sshd[218754]: Accepted password for supportwwwuser from 212.58.119.251 port 10699 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.1720 seconds
INFO [2022-12-06 13:47:22,007] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:47:22,008] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:47:22,018] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:47:22,034] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0253 seconds
INFO [2022-12-06 13:47:27,448] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:47:27,448] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:47:27,466] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:47:27,493] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0405 seconds
INFO [2022-12-06 13:47:34,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670327254.960004, 'message': 'Dec 6 13:47:34 hqnl0246134 sshd[218795]: Accepted password for supportwwwuser from 212.58.119.251 port 10714 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0370 seconds
WARNING [2022-12-06 13:47:46,147] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:47:46,148] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:47:54,575] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:47:54,641] defence360agent.internals.the_sink: SensorIncidentList(<1 item(s)>) processed in 0.0950 seconds
INFO [2022-12-06 13:48:22,389] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:48:22,390] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:48:22,401] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:48:22,414] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0226 seconds
INFO [2022-12-06 13:48:26,981] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:48:26,982] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:48:26,989] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:48:27,001] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 13:48:39,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327319.0405016, 'message': 'Dec 6 13:48:37 hqnl0246134 sshd[218875]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0754 seconds
INFO [2022-12-06 13:48:39,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327319.0420644, 'message': 'Dec 6 13:48:37 hqnl0246134 sshd[218875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0637 seconds
INFO [2022-12-06 13:48:39,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327319.047188, 'message': 'Dec 6 13:48:39 hqnl0246134 sshd[218875]: Failed password for root from 61.177.173.49 port 10801 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 13:48:43,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327323.0418563, 'message': 'Dec 6 13:48:41 hqnl0246134 sshd[218875]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1356 seconds
INFO [2022-12-06 13:48:45,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327325.040829, 'message': 'Dec 6 13:48:43 hqnl0246134 sshd[218875]: Failed password for root from 61.177.173.49 port 10801 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0387 seconds
INFO [2022-12-06 13:48:45,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327325.0412652, 'message': 'Dec 6 13:48:44 hqnl0246134 sshd[218875]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0345 seconds
WARNING [2022-12-06 13:48:46,152] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:48:46,153] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:48:47,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327327.0426664, 'message': 'Dec 6 13:48:46 hqnl0246134 sshd[218875]: Failed password for root from 61.177.173.49 port 10801 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0790 seconds
INFO [2022-12-06 13:48:51,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327331.0512092, 'message': 'Dec 6 13:48:50 hqnl0246134 sshd[218894]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 13:48:51,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327331.0516472, 'message': 'Dec 6 13:48:50 hqnl0246134 sshd[218894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 13:48:53,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327333.0539892, 'message': 'Dec 6 13:48:52 hqnl0246134 sshd[218894]: Failed password for root from 61.177.173.49 port 44136 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
WARNING [2022-12-06 13:48:54,569] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:48:54,615] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0629 seconds
INFO [2022-12-06 13:48:55,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327335.0555882, 'message': 'Dec 6 13:48:54 hqnl0246134 sshd[218894]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 13:48:57,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327337.061495, 'message': 'Dec 6 13:48:56 hqnl0246134 sshd[218894]: Failed password for root from 61.177.173.49 port 44136 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 13:48:59,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327339.064469, 'message': 'Dec 6 13:48:57 hqnl0246134 sshd[218894]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 13:48:59,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670327339.0656738, 'message': 'Dec 6 13:48:58 hqnl0246134 sshd[218894]: Failed password for root from 61.177.173.49 port 44136 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 13:49:20,974] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:49:20,975] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:49:21,000] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:49:21,019] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0296 seconds
INFO [2022-12-06 13:49:25,468] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:49:25,469] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:49:25,490] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:49:25,512] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0347 seconds
WARNING [2022-12-06 13:49:46,156] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:49:46,158] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 13:49:54,568] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:49:54,601] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0446 seconds
INFO [2022-12-06 13:49:55,591] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:49:55,681] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:49:55,682] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:49:55,682] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:49:55,682] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:49:55,683] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:49:55,702] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:49:55,730] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0465 seconds
WARNING [2022-12-06 13:49:55,736] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:49:55,739] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:49:55,770] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0477 seconds
INFO [2022-12-06 13:49:55,772] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0450 seconds
INFO [2022-12-06 13:50:19,181] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:50:19,183] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:50:19,226] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:50:19,258] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0689 seconds
INFO [2022-12-06 13:50:19,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327419.1912515, 'message': 'Dec 6 13:50:17 hqnl0246134 sshd[218988]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0671 seconds
INFO [2022-12-06 13:50:19,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327419.1915693, 'message': 'Dec 6 13:50:17 hqnl0246134 sshd[218988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 13:50:21,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327421.2822187, 'message': 'Dec 6 13:50:19 hqnl0246134 sshd[218988]: Failed password for root from 61.177.173.36 port 12997 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0505 seconds
INFO [2022-12-06 13:50:22,785] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:50:22,786] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:50:22,797] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:50:22,815] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0275 seconds
INFO [2022-12-06 13:50:23,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327423.196433, 'message': 'Dec 6 13:50:21 hqnl0246134 sshd[218988]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 13:50:25,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327425.199427, 'message': 'Dec 6 13:50:24 hqnl0246134 sshd[218988]: Failed password for root from 61.177.173.36 port 12997 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0500 seconds
INFO [2022-12-06 13:50:25,813] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:50:25,814] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:50:25,815] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 13:50:27,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327427.2024894, 'message': 'Dec 6 13:50:26 hqnl0246134 sshd[218988]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 13:50:29,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327429.20668, 'message': 'Dec 6 13:50:28 hqnl0246134 sshd[218988]: Failed password for root from 61.177.173.36 port 12997 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-06 13:50:31,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327431.2068272, 'message': 'Dec 6 13:50:30 hqnl0246134 sshd[219004]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 13:50:31,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327431.207105, 'message': 'Dec 6 13:50:30 hqnl0246134 sshd[219004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 13:50:33,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327433.2091827, 'message': 'Dec 6 13:50:32 hqnl0246134 sshd[219004]: Failed password for root from 61.177.173.36 port 52060 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 13:50:34,472] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:50:34,473] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:50:34,494] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:50:34,512] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0371 seconds
INFO [2022-12-06 13:50:35,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327435.2123673, 'message': 'Dec 6 13:50:34 hqnl0246134 sshd[219004]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-06 13:50:35,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670327435.2126174, 'message': 'Dec 6 13:50:34 hqnl0246134 sshd[219010]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-06 13:50:35,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670327435.212755, 'message': 'Dec 6 13:50:34 hqnl0246134 sshd[219010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 13:50:37,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327437.2165215, 'message': 'Dec 6 13:50:36 hqnl0246134 sshd[219004]: Failed password for root from 61.177.173.36 port 52060 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 13:50:37,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '152.89.196.220', 'timestamp': 1670327437.2172604, 'message': 'Dec 6 13:50:36 hqnl0246134 sshd[219010]: Failed password for root from 152.89.196.220 port 56850 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0475 seconds
INFO [2022-12-06 13:50:39,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327439.2180598, 'message': 'Dec 6 13:50:38 hqnl0246134 sshd[219004]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 13:50:41,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327441.2180235, 'message': 'Dec 6 13:50:41 hqnl0246134 sshd[219004]: Failed password for root from 61.177.173.36 port 52060 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 13:50:45,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327445.2259102, 'message': 'Dec 6 13:50:44 hqnl0246134 sshd[219013]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 13:50:45,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327445.2264655, 'message': 'Dec 6 13:50:44 hqnl0246134 sshd[219013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0217 seconds
WARNING [2022-12-06 13:50:46,160] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:50:46,161] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:50:47,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327447.2260368, 'message': 'Dec 6 13:50:46 hqnl0246134 sshd[219013]: Failed password for root from 61.177.173.36 port 47002 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 13:50:49,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327449.2289104, 'message': 'Dec 6 13:50:49 hqnl0246134 sshd[219013]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 13:50:51,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327451.2301402, 'message': 'Dec 6 13:50:51 hqnl0246134 sshd[219013]: Failed password for root from 61.177.173.36 port 47002 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 13:50:53,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327453.2336595, 'message': 'Dec 6 13:50:51 hqnl0246134 sshd[219013]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0360 seconds
WARNING [2022-12-06 13:50:54,575] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:50:54,625] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0645 seconds
INFO [2022-12-06 13:50:55,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670327455.2343423, 'message': 'Dec 6 13:50:53 hqnl0246134 sshd[219013]: Failed password for root from 61.177.173.36 port 47002 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 13:51:18,539] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:51:18,540] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:51:18,550] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:51:18,562] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 13:51:23,720] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:51:23,720] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:51:23,738] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:51:23,763] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0344 seconds
INFO [2022-12-06 13:51:40,069] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 13:51:40,072] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 13:51:41,084] im360.plugins.pam: PAM module has been enabled for dovecot-pam
WARNING [2022-12-06 13:51:46,165] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:51:46,166] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:51:49,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670327509.3110347, 'message': 'Dec 6 13:51:48 hqnl0246134 sshd[219107]: Accepted password for supportwwwuser from 212.58.119.251 port 10502 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0294 seconds
WARNING [2022-12-06 13:51:53,283] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 13:51:54,572] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:51:54,605] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0412 seconds
INFO [2022-12-06 13:52:18,644] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:52:18,646] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:52:18,657] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:52:18,674] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0267 seconds
INFO [2022-12-06 13:52:21,464] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:52:21,465] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:52:21,472] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:52:21,483] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
WARNING [2022-12-06 13:52:46,169] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:52:46,170] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:53:18,420] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:53:18,421] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:53:18,438] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:53:18,463] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0403 seconds
INFO [2022-12-06 13:53:22,162] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:53:22,163] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:53:22,171] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:53:22,184] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
WARNING [2022-12-06 13:53:46,172] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:53:46,174] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:54:17,832] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:54:17,833] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:54:17,848] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:54:17,868] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0343 seconds
INFO [2022-12-06 13:54:20,394] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:54:20,394] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:54:20,401] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:54:20,412] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
WARNING [2022-12-06 13:54:46,176] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:54:46,178] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:55:17,985] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:55:17,986] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:55:17,996] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:55:18,010] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 13:55:20,546] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:55:20,547] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:55:20,559] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:55:20,577] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0293 seconds
INFO [2022-12-06 13:55:44,072] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:55:44,171] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:55:44,171] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:55:44,171] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:55:44,172] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:55:44,172] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:55:44,185] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:55:44,202] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0297 seconds
WARNING [2022-12-06 13:55:44,209] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:55:44,212] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:55:44,229] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0330 seconds
INFO [2022-12-06 13:55:44,230] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0300 seconds
WARNING [2022-12-06 13:55:46,181] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:55:46,182] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:56:14,306] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:56:14,307] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:56:14,309] im360.plugins.client360: Waiting 2 minutes before retry...
INFO [2022-12-06 13:56:17,879] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:56:17,880] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:56:17,892] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:56:17,906] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0250 seconds
INFO [2022-12-06 13:56:20,450] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:56:20,451] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:56:20,459] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:56:20,471] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
WARNING [2022-12-06 13:56:46,185] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:56:46,187] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:57:17,851] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:57:17,852] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:57:17,862] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:57:17,876] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0230 seconds
INFO [2022-12-06 13:57:20,611] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:57:20,611] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:57:20,619] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:57:20,632] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
WARNING [2022-12-06 13:57:46,201] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:57:46,202] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:57:58,189] defence360agent.files: Updating all files
INFO [2022-12-06 13:57:58,557] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 13:57:58,557] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 13:57:58,954] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 13:57:58,955] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 13:57:59,224] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 13:57:59,224] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 13:57:59,542] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 13:57:59,543] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 13:57:59,543] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 13:57:59,806] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 11:57:59 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E325B5C5FA52C'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 13:57:59,808] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 13:57:59,808] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 13:58:00,351] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 13:58:00,352] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 13:58:00,612] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 13:58:00,612] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 13:58:00,930] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 13:58:00,931] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 13:58:01,322] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 13:58:01,323] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 13:58:01,896] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 13:58:01,898] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 13:58:18,004] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:58:18,005] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:58:18,014] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:58:18,027] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 13:58:20,594] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:58:20,594] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:58:20,603] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:58:20,615] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
WARNING [2022-12-06 13:58:46,205] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:58:46,206] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:59:05,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327945.9517808, 'message': 'Dec 6 13:59:05 hqnl0246134 sshd[219571]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 13:59:06,005] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327945.952815, 'message': 'Dec 6 13:59:05 hqnl0246134 sshd[219571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 13:59:09,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327949.9589405, 'message': 'Dec 6 13:59:08 hqnl0246134 sshd[219571]: Failed password for root from 61.177.173.51 port 32350 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 13:59:09,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327949.9591963, 'message': 'Dec 6 13:59:09 hqnl0246134 sshd[219571]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 13:59:13,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327953.9653895, 'message': 'Dec 6 13:59:12 hqnl0246134 sshd[219571]: Failed password for root from 61.177.173.51 port 32350 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 13:59:14,224] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 13:59:14,297] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 13:59:14,297] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 13:59:14,298] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 13:59:14,298] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 13:59:14,298] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 13:59:14,308] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 13:59:14,324] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0258 seconds
WARNING [2022-12-06 13:59:14,331] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 13:59:14,333] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:59:14,351] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0326 seconds
INFO [2022-12-06 13:59:14,352] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0301 seconds
INFO [2022-12-06 13:59:16,001] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327955.9685898, 'message': 'Dec 6 13:59:14 hqnl0246134 sshd[219571]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 13:59:18,005] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327957.971404, 'message': 'Dec 6 13:59:16 hqnl0246134 sshd[219571]: Failed password for root from 61.177.173.51 port 32350 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 13:59:18,282] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:59:18,282] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:59:18,289] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:59:18,302] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 13:59:19,550] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:59:19,550] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:59:19,567] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:59:19,605] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0447 seconds
INFO [2022-12-06 13:59:20,029] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327959.9737031, 'message': 'Dec 6 13:59:18 hqnl0246134 sshd[219586]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0552 seconds
INFO [2022-12-06 13:59:20,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327959.9739618, 'message': 'Dec 6 13:59:18 hqnl0246134 sshd[219586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 13:59:21,741] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 13:59:21,741] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 13:59:21,748] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:59:21,760] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 13:59:22,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327961.984181, 'message': 'Dec 6 13:59:20 hqnl0246134 sshd[219586]: Failed password for root from 61.177.173.51 port 23928 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 13:59:22,019] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327961.9844604, 'message': 'Dec 6 13:59:20 hqnl0246134 sshd[219586]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 13:59:24,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327963.9903083, 'message': 'Dec 6 13:59:22 hqnl0246134 sshd[219586]: Failed password for root from 61.177.173.51 port 23928 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 13:59:24,026] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327963.9906616, 'message': 'Dec 6 13:59:23 hqnl0246134 sshd[219586]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 13:59:26,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670327965.9925952, 'message': 'Dec 6 13:59:24 hqnl0246134 sshd[219586]: Failed password for root from 61.177.173.51 port 23928 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 13:59:46,210] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 13:59:46,211] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 13:59:51,514] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 13:59:51,514] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 13:59:51,515] im360.plugins.client360: Waiting 3 minutes before retry...
WARNING [2022-12-06 13:59:55,613] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 13:59:55,642] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 1.0530 seconds
INFO [2022-12-06 14:00:18,086] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:00:18,087] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:00:18,100] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:00:18,114] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0262 seconds
INFO [2022-12-06 14:00:20,097] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.61.75.88', 'timestamp': 1670328020.0778813, 'message': 'Dec 6 14:00:18 hqnl0246134 sshd[219619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.61.75.88 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 14:00:20,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.61.75.88', 'timestamp': 1670328020.0782025, 'message': 'Dec 6 14:00:18 hqnl0246134 sshd[219619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.61.75.88 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 14:00:20,821] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:00:20,822] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:00:20,836] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:00:20,848] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0255 seconds
INFO [2022-12-06 14:00:22,120] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670328022.0811343, 'message': 'Dec 6 14:00:20 hqnl0246134 sshd[219615]: Accepted password for supportwwwuser from 212.58.119.251 port 10730 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0387 seconds
INFO [2022-12-06 14:00:22,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.61.75.88', 'timestamp': 1670328022.081312, 'message': 'Dec 6 14:00:20 hqnl0246134 sshd[219619]: Failed password for root from 20.61.75.88 port 46654 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-06 14:00:28,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670328028.0899827, 'message': 'Dec 6 14:00:27 hqnl0246134 sshd[219725]: Accepted password for supportwwwuser from 212.58.119.251 port 10496 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 14:00:29,480] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:00:29,480] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:00:29,487] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:00:29,499] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 14:00:46,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670328046.109658, 'message': 'Dec 6 14:00:44 hqnl0246134 sshd[219787]: Accepted password for supportwwwuser from 212.58.119.251 port 10506 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0637 seconds
WARNING [2022-12-06 14:00:46,214] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:00:46,214] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:00:54,638] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:00:54,721] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.1204 seconds
INFO [2022-12-06 14:01:19,814] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:01:19,815] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:01:19,843] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:01:19,863] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0473 seconds
INFO [2022-12-06 14:01:22,956] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:01:22,957] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:01:22,964] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:01:22,985] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0273 seconds
WARNING [2022-12-06 14:01:46,218] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:01:46,222] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:01:53,286] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 14:02:18,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328138.2045262, 'message': 'Dec 6 14:02:17 hqnl0246134 sshd[219904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0494 seconds
INFO [2022-12-06 14:02:18,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328138.2053447, 'message': 'Dec 6 14:02:17 hqnl0246134 sshd[219904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 14:02:19,539] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:02:19,539] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:02:19,570] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:02:19,593] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0431 seconds
INFO [2022-12-06 14:02:20,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328140.2051964, 'message': 'Dec 6 14:02:18 hqnl0246134 sshd[219904]: Failed password for root from 61.177.173.35 port 60083 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1910 seconds
INFO [2022-12-06 14:02:20,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328140.2056315, 'message': 'Dec 6 14:02:19 hqnl0246134 sshd[219904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 14:02:22,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328142.2388213, 'message': 'Dec 6 14:02:21 hqnl0246134 sshd[219904]: Failed password for root from 61.177.173.35 port 60083 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0687 seconds
INFO [2022-12-06 14:02:22,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328142.2391994, 'message': 'Dec 6 14:02:21 hqnl0246134 sshd[219904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 14:02:22,906] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:02:22,906] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:02:22,922] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:02:22,935] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 14:02:24,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328144.2136822, 'message': 'Dec 6 14:02:23 hqnl0246134 sshd[219904]: Failed password for root from 61.177.173.35 port 60083 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0582 seconds
INFO [2022-12-06 14:02:28,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328148.2192848, 'message': 'Dec 6 14:02:27 hqnl0246134 sshd[219926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 14:02:28,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328148.2195215, 'message': 'Dec 6 14:02:27 hqnl0246134 sshd[219926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 14:02:32,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328152.2240372, 'message': 'Dec 6 14:02:30 hqnl0246134 sshd[219926]: Failed password for root from 61.177.173.35 port 50537 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 14:02:34,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328154.2255902, 'message': 'Dec 6 14:02:32 hqnl0246134 sshd[219926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 14:02:36,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328156.226123, 'message': 'Dec 6 14:02:34 hqnl0246134 sshd[219926]: Failed password for root from 61.177.173.35 port 50537 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 14:02:38,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328158.2321188, 'message': 'Dec 6 14:02:37 hqnl0246134 sshd[219926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 14:02:40,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328160.2337096, 'message': 'Dec 6 14:02:39 hqnl0246134 sshd[219926]: Failed password for root from 61.177.173.35 port 50537 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 14:02:44,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328164.2399511, 'message': 'Dec 6 14:02:43 hqnl0246134 sshd[219931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 14:02:44,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328164.2403345, 'message': 'Dec 6 14:02:43 hqnl0246134 sshd[219931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 14:02:46,225] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:02:46,227] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:02:46,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328166.2411008, 'message': 'Dec 6 14:02:45 hqnl0246134 sshd[219931]: Failed password for root from 61.177.173.35 port 51113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 14:02:46,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328166.2413461, 'message': 'Dec 6 14:02:45 hqnl0246134 sshd[219931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 14:02:48,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328168.242159, 'message': 'Dec 6 14:02:48 hqnl0246134 sshd[219931]: Failed password for root from 61.177.173.35 port 51113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 14:02:50,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328170.2459621, 'message': 'Dec 6 14:02:49 hqnl0246134 sshd[219931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 14:02:54,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328174.2516716, 'message': 'Dec 6 14:02:52 hqnl0246134 sshd[219931]: Failed password for root from 61.177.173.35 port 51113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0440 seconds
WARNING [2022-12-06 14:02:54,622] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:02:54,673] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0645 seconds
INFO [2022-12-06 14:03:20,919] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:03:20,921] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:03:20,932] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:03:20,947] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0252 seconds
INFO [2022-12-06 14:03:21,791] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 14:03:21,858] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 14:03:21,858] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 14:03:21,859] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 14:03:21,859] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 14:03:21,859] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 14:03:21,873] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 14:03:21,893] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0329 seconds
WARNING [2022-12-06 14:03:21,900] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 14:03:21,903] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:03:21,922] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0365 seconds
INFO [2022-12-06 14:03:21,924] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0333 seconds
INFO [2022-12-06 14:03:24,783] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:03:24,784] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:03:24,814] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:03:24,867] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0734 seconds
INFO [2022-12-06 14:03:28,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670328208.2936976, 'message': 'Dec 6 14:03:27 hqnl0246134 sshd[219975]: Accepted password for supportwwwuser from 212.58.119.251 port 10544 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 14:03:32,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670328212.3071434, 'message': 'Dec 6 14:03:30 hqnl0246134 sshd[220009]: Accepted password for supportwwwuser from 212.58.119.251 port 10555 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0223 seconds
WARNING [2022-12-06 14:03:46,237] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:03:46,245] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:03:51,988] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 14:03:51,991] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 14:03:52,000] im360.plugins.client360: Waiting 7 minutes before retry...
WARNING [2022-12-06 14:03:54,631] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:03:54,712] defence360agent.internals.the_sink: SensorIncidentList(<1 item(s)>) processed in 0.0989 seconds
INFO [2022-12-06 14:04:23,639] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:04:23,649] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:04:23,710] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:04:23,791] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1333 seconds
INFO [2022-12-06 14:04:30,848] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:04:30,849] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:04:30,862] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:04:30,880] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0299 seconds
WARNING [2022-12-06 14:04:46,252] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:04:46,267] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:05:18,897] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:05:18,899] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:05:18,909] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:05:18,925] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0250 seconds
INFO [2022-12-06 14:05:21,633] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:05:21,633] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:05:21,645] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:05:21,663] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0284 seconds
WARNING [2022-12-06 14:05:46,271] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:05:46,273] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:06:17,965] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:06:17,966] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:06:17,978] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:06:17,992] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0242 seconds
INFO [2022-12-06 14:06:20,712] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:06:20,712] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:06:20,723] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:06:20,737] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0237 seconds
INFO [2022-12-06 14:06:22,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328382.5406203, 'message': 'Dec 6 14:06:22 hqnl0246134 sshd[220224]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 14:06:22,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328382.5413735, 'message': 'Dec 6 14:06:22 hqnl0246134 sshd[220224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 14:06:24,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328384.5388691, 'message': 'Dec 6 14:06:23 hqnl0246134 sshd[220224]: Failed password for root from 61.177.172.19 port 44629 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 14:06:26,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328386.5409367, 'message': 'Dec 6 14:06:26 hqnl0246134 sshd[220224]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 14:06:28,617] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328388.5946007, 'message': 'Dec 6 14:06:27 hqnl0246134 sshd[220224]: Failed password for root from 61.177.172.19 port 44629 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 14:06:30,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328390.544651, 'message': 'Dec 6 14:06:28 hqnl0246134 sshd[220224]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 14:06:32,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328392.547591, 'message': 'Dec 6 14:06:30 hqnl0246134 sshd[220224]: Failed password for root from 61.177.172.19 port 44629 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 14:06:35,553] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:06:35,554] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:06:35,562] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:06:35,574] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 14:06:36,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328396.5523784, 'message': 'Dec 6 14:06:34 hqnl0246134 sshd[220235]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 14:06:36,587] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328396.552573, 'message': 'Dec 6 14:06:34 hqnl0246134 sshd[220235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 14:06:38,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328398.5540636, 'message': 'Dec 6 14:06:36 hqnl0246134 sshd[220235]: Failed password for root from 61.177.172.19 port 36709 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 14:06:38,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328398.5543582, 'message': 'Dec 6 14:06:37 hqnl0246134 sshd[220235]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 14:06:40,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328400.5584824, 'message': 'Dec 6 14:06:39 hqnl0246134 sshd[220235]: Failed password for root from 61.177.172.19 port 36709 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 14:06:40,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328400.5598366, 'message': 'Dec 6 14:06:39 hqnl0246134 sshd[220235]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 14:06:42,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328402.5579212, 'message': 'Dec 6 14:06:41 hqnl0246134 sshd[220235]: Failed password for root from 61.177.172.19 port 36709 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 14:06:44,592] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328404.5605996, 'message': 'Dec 6 14:06:44 hqnl0246134 sshd[220242]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 14:06:44,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328404.5609505, 'message': 'Dec 6 14:06:44 hqnl0246134 sshd[220242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-06 14:06:46,276] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:06:46,277] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:06:46,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328406.5618162, 'message': 'Dec 6 14:06:45 hqnl0246134 sshd[220242]: Failed password for root from 61.177.172.19 port 49022 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 14:06:46,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328406.5620732, 'message': 'Dec 6 14:06:46 hqnl0246134 sshd[220242]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 14:06:48,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328408.5643215, 'message': 'Dec 6 14:06:47 hqnl0246134 sshd[220242]: Failed password for root from 61.177.172.19 port 49022 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 14:06:50,588] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328410.5675826, 'message': 'Dec 6 14:06:49 hqnl0246134 sshd[220242]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 14:06:52,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328412.5695486, 'message': 'Dec 6 14:06:51 hqnl0246134 sshd[220242]: Failed password for root from 61.177.172.19 port 49022 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
WARNING [2022-12-06 14:06:54,630] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:06:54,683] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0600 seconds
INFO [2022-12-06 14:06:56,616] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.232.30.249', 'timestamp': 1670328416.5734665, 'message': 'Dec 6 14:06:54 hqnl0246134 sshd[220264]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.232.30.249 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0419 seconds
INFO [2022-12-06 14:06:56,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328416.5748405, 'message': 'Dec 6 14:06:55 hqnl0246134 sshd[220261]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-06 14:06:56,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.232.30.249', 'timestamp': 1670328416.5747263, 'message': 'Dec 6 14:06:54 hqnl0246134 sshd[220264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.232.30.249 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-06 14:06:56,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328416.575087, 'message': 'Dec 6 14:06:55 hqnl0246134 sshd[220261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0446 seconds
INFO [2022-12-06 14:06:58,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.232.30.249', 'timestamp': 1670328418.7242467, 'message': 'Dec 6 14:06:57 hqnl0246134 sshd[220264]: Failed password for root from 20.232.30.249 port 50136 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0456 seconds
INFO [2022-12-06 14:06:58,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328418.7245498, 'message': 'Dec 6 14:06:57 hqnl0246134 sshd[220261]: Failed password for root from 61.177.172.19 port 27396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0456 seconds
INFO [2022-12-06 14:07:00,595] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328420.5766983, 'message': 'Dec 6 14:06:59 hqnl0246134 sshd[220261]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 14:07:02,608] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328422.5783055, 'message': 'Dec 6 14:07:01 hqnl0246134 sshd[220261]: Failed password for root from 61.177.172.19 port 27396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 14:07:02,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328422.5785573, 'message': 'Dec 6 14:07:01 hqnl0246134 sshd[220261]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 14:07:04,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670328424.5794024, 'message': 'Dec 6 14:07:04 hqnl0246134 sshd[220261]: Failed password for root from 61.177.172.19 port 27396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 14:07:06,606] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.171.219', 'timestamp': 1670328426.585202, 'message': 'Dec 6 14:07:06 hqnl0246134 sshd[220276]: Invalid user guest from 87.98.171.219 port 58826', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 14:07:06,625] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '87.98.171.219', 'timestamp': 1670328426.5858293, 'message': 'Dec 6 14:07:06 hqnl0246134 sshd[220276]: pam_imunify(sshd:auth): [IM360_RBL] The IP 87.98.171.219 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 14:07:06,644] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '87.98.171.219', 'timestamp': 1670328426.5859463, 'message': 'Dec 6 14:07:06 hqnl0246134 sshd[220276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.171.219 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 14:07:10,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.171.219', 'timestamp': 1670328430.5930243, 'message': 'Dec 6 14:07:08 hqnl0246134 sshd[220276]: Failed password for invalid user guest from 87.98.171.219 port 58826 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 14:07:10,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.171.219', 'timestamp': 1670328430.5934541, 'message': 'Dec 6 14:07:08 hqnl0246134 sshd[220276]: Disconnected from invalid user guest 87.98.171.219 port 58826 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 14:07:17,894] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:07:17,894] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:07:17,901] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:07:17,913] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 14:07:20,573] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:07:20,574] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:07:20,583] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:07:20,595] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
WARNING [2022-12-06 14:07:46,281] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:07:46,284] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:07:54,649] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:07:54,686] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0547 seconds
INFO [2022-12-06 14:08:17,915] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:08:17,916] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:08:17,927] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:08:17,946] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0296 seconds
INFO [2022-12-06 14:08:20,696] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:08:20,697] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:08:20,710] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:08:20,732] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0346 seconds
INFO [2022-12-06 14:08:20,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.222.13.62', 'timestamp': 1670328500.7062695, 'message': 'Dec 6 14:08:20 hqnl0246134 sshd[220345]: Invalid user user4 from 51.222.13.62 port 50264', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 14:08:20,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.222.13.62', 'timestamp': 1670328500.7064707, 'message': 'Dec 6 14:08:20 hqnl0246134 sshd[220345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.222.13.62 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 14:08:20,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.222.13.62', 'timestamp': 1670328500.7066333, 'message': 'Dec 6 14:08:20 hqnl0246134 sshd[220345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.222.13.62 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 14:08:22,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.222.13.62', 'timestamp': 1670328502.7093463, 'message': 'Dec 6 14:08:22 hqnl0246134 sshd[220345]: Failed password for invalid user user4 from 51.222.13.62 port 50264 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 14:08:24,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.222.13.62', 'timestamp': 1670328504.7098505, 'message': 'Dec 6 14:08:23 hqnl0246134 sshd[220345]: Disconnected from invalid user user4 51.222.13.62 port 50264 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 14:08:25,841] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:08:25,841] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:08:25,848] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:08:25,859] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
WARNING [2022-12-06 14:08:46,287] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:08:46,289] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:08:54,650] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:08:54,676] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0401 seconds
INFO [2022-12-06 14:09:17,916] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:09:17,917] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:09:17,925] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:09:17,938] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 14:09:20,566] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:09:20,566] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:09:20,581] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:09:20,594] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0268 seconds
INFO [2022-12-06 14:09:42,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328582.8387783, 'message': 'Dec 6 14:09:41 hqnl0246134 sshd[220532]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 14:09:42,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328582.8408322, 'message': 'Dec 6 14:09:41 hqnl0246134 sshd[220532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 14:09:44,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328584.840007, 'message': 'Dec 6 14:09:43 hqnl0246134 sshd[220532]: Failed password for root from 61.177.173.50 port 29935 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0216 seconds
WARNING [2022-12-06 14:09:46,292] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:09:46,293] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:09:46,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328586.8430321, 'message': 'Dec 6 14:09:45 hqnl0246134 sshd[220532]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 14:09:48,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328588.8461394, 'message': 'Dec 6 14:09:47 hqnl0246134 sshd[220532]: Failed password for root from 61.177.173.50 port 29935 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 14:09:48,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670328588.84906, 'message': 'Dec 6 14:09:48 hqnl0246134 sshd[220534]: Invalid user temp from 34.148.81.208 port 51292', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 14:09:48,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328588.8489177, 'message': 'Dec 6 14:09:47 hqnl0246134 sshd[220532]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 14:09:48,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.148.81.208', 'timestamp': 1670328588.8492553, 'message': 'Dec 6 14:09:48 hqnl0246134 sshd[220534]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.148.81.208 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 14:09:48,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.148.81.208', 'timestamp': 1670328588.849435, 'message': 'Dec 6 14:09:48 hqnl0246134 sshd[220534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.148.81.208 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 14:09:50,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328590.8487113, 'message': 'Dec 6 14:09:49 hqnl0246134 sshd[220532]: Failed password for root from 61.177.173.50 port 29935 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 14:09:52,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670328592.8502135, 'message': 'Dec 6 14:09:51 hqnl0246134 sshd[220534]: Failed password for invalid user temp from 34.148.81.208 port 51292 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 14:09:52,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670328592.8504272, 'message': 'Dec 6 14:09:51 hqnl0246134 sshd[220534]: Disconnected from invalid user temp 34.148.81.208 port 51292 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 14:09:54,647] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:09:54,670] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0301 seconds
INFO [2022-12-06 14:09:54,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328594.852527, 'message': 'Dec 6 14:09:53 hqnl0246134 sshd[220547]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 14:09:54,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328594.8527107, 'message': 'Dec 6 14:09:53 hqnl0246134 sshd[220547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:09:56,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328596.8538647, 'message': 'Dec 6 14:09:55 hqnl0246134 sshd[220547]: Failed password for root from 61.177.173.50 port 20887 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 14:09:58,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328598.8569915, 'message': 'Dec 6 14:09:57 hqnl0246134 sshd[220547]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-06 14:10:00,924] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328600.8574367, 'message': 'Dec 6 14:09:59 hqnl0246134 sshd[220547]: Failed password for root from 61.177.173.50 port 20887 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0669 seconds
INFO [2022-12-06 14:10:00,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328600.8576412, 'message': 'Dec 6 14:10:00 hqnl0246134 sshd[220547]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 14:10:03,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670328602.8702724, 'message': 'Dec 6 14:10:02 hqnl0246134 sshd[220547]: Failed password for root from 61.177.173.50 port 20887 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1856 seconds
INFO [2022-12-06 14:10:17,873] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:10:17,873] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:10:17,881] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:10:17,892] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 14:10:20,610] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:10:20,611] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:10:20,619] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:10:20,633] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
WARNING [2022-12-06 14:10:46,297] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:10:46,298] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:10:54,655] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:10:54,676] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0302 seconds
INFO [2022-12-06 14:10:54,773] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 14:10:54,840] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 14:10:54,841] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 14:10:54,841] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 14:10:54,841] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 14:10:54,842] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 14:10:54,853] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 14:10:54,875] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0329 seconds
WARNING [2022-12-06 14:10:54,890] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 14:10:54,894] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:10:54,923] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0569 seconds
INFO [2022-12-06 14:10:54,924] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0531 seconds
INFO [2022-12-06 14:11:17,976] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:11:17,977] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:11:17,988] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:11:18,004] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0257 seconds
INFO [2022-12-06 14:11:21,970] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:11:21,971] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:11:21,982] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:11:21,996] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0237 seconds
INFO [2022-12-06 14:11:24,970] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 14:11:24,971] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 14:11:24,971] im360.plugins.client360: Waiting 3 minutes before retry...
WARNING [2022-12-06 14:11:46,305] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:11:46,306] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:11:53,293] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 14:12:17,818] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:12:17,819] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:12:17,832] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:12:17,846] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0252 seconds
INFO [2022-12-06 14:12:20,570] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:12:20,570] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:12:20,581] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:12:20,594] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
WARNING [2022-12-06 14:12:46,308] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:12:46,311] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:13:02,753] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 14:13:02,764] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:13:02,781] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0244 seconds
INFO [2022-12-06 14:13:18,312] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:13:18,313] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:13:18,326] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:13:18,342] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0282 seconds
INFO [2022-12-06 14:13:21,168] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:13:21,169] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:13:21,184] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:13:21,202] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0323 seconds
INFO [2022-12-06 14:13:21,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '209.73.215.135', 'timestamp': 1670328801.17171, 'message': 'Dec 6 14:13:20 hqnl0246134 sshd[220770]: Invalid user mine from 209.73.215.135 port 38996', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 14:13:21,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '209.73.215.135', 'timestamp': 1670328801.1719494, 'message': 'Dec 6 14:13:20 hqnl0246134 sshd[220770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 209.73.215.135 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 14:13:21,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '209.73.215.135', 'timestamp': 1670328801.1720924, 'message': 'Dec 6 14:13:20 hqnl0246134 sshd[220770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.73.215.135 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 14:13:23,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '209.73.215.135', 'timestamp': 1670328803.1100807, 'message': 'Dec 6 14:13:22 hqnl0246134 sshd[220770]: Failed password for invalid user mine from 209.73.215.135 port 38996 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 14:13:23,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '209.73.215.135', 'timestamp': 1670328803.1103687, 'message': 'Dec 6 14:13:22 hqnl0246134 sshd[220770]: Disconnected from invalid user mine 209.73.215.135 port 38996 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 14:13:25,448] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:13:25,448] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:13:25,455] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:13:25,468] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
WARNING [2022-12-06 14:13:46,316] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:13:46,318] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:13:54,661] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:13:54,688] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0369 seconds
INFO [2022-12-06 14:13:55,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.61.75.88', 'timestamp': 1670328835.159915, 'message': 'Dec 6 14:13:54 hqnl0246134 sshd[220788]: Invalid user hbase from 20.61.75.88 port 33330', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 14:13:55,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.61.75.88', 'timestamp': 1670328835.1601684, 'message': 'Dec 6 14:13:54 hqnl0246134 sshd[220788]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.61.75.88 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 14:13:55,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.61.75.88', 'timestamp': 1670328835.1603796, 'message': 'Dec 6 14:13:54 hqnl0246134 sshd[220788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.61.75.88 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0162 seconds
INFO [2022-12-06 14:13:57,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.61.75.88', 'timestamp': 1670328837.163278, 'message': 'Dec 6 14:13:56 hqnl0246134 sshd[220788]: Failed password for invalid user hbase from 20.61.75.88 port 33330 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 14:13:59,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.61.75.88', 'timestamp': 1670328839.1675105, 'message': 'Dec 6 14:13:58 hqnl0246134 sshd[220788]: Disconnected from invalid user hbase 20.61.75.88 port 33330 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 14:14:18,131] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:14:18,132] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:14:18,145] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:14:18,169] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0361 seconds
INFO [2022-12-06 14:14:19,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328859.1946018, 'message': 'Dec 6 14:14:18 hqnl0246134 sshd[220813]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 14:14:19,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328859.1948383, 'message': 'Dec 6 14:14:18 hqnl0246134 sshd[220813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 14:14:20,921] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:14:20,922] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:14:20,934] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:14:20,952] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0291 seconds
INFO [2022-12-06 14:14:21,216] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328861.1951683, 'message': 'Dec 6 14:14:20 hqnl0246134 sshd[220813]: Failed password for root from 61.177.173.35 port 36069 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 14:14:23,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328863.1967063, 'message': 'Dec 6 14:14:22 hqnl0246134 sshd[220813]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 14:14:25,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328865.1992044, 'message': 'Dec 6 14:14:24 hqnl0246134 sshd[220813]: Failed password for root from 61.177.173.35 port 36069 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 14:14:25,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328865.1995203, 'message': 'Dec 6 14:14:24 hqnl0246134 sshd[220813]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 14:14:27,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328867.2008944, 'message': 'Dec 6 14:14:27 hqnl0246134 sshd[220813]: Failed password for root from 61.177.173.35 port 36069 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 14:14:33,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328873.2105954, 'message': 'Dec 6 14:14:31 hqnl0246134 sshd[220836]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 14:14:33,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328873.2110128, 'message': 'Dec 6 14:14:31 hqnl0246134 sshd[220836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 14:14:35,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328875.2118492, 'message': 'Dec 6 14:14:34 hqnl0246134 sshd[220836]: Failed password for root from 61.177.173.35 port 26753 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 14:14:37,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328877.2144341, 'message': 'Dec 6 14:14:36 hqnl0246134 sshd[220836]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 14:14:39,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328879.2180727, 'message': 'Dec 6 14:14:38 hqnl0246134 sshd[220836]: Failed password for root from 61.177.173.35 port 26753 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 14:14:41,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328881.2202508, 'message': 'Dec 6 14:14:40 hqnl0246134 sshd[220836]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 14:14:43,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328883.222019, 'message': 'Dec 6 14:14:42 hqnl0246134 sshd[220836]: Failed password for root from 61.177.173.35 port 26753 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 14:14:45,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328885.2246504, 'message': 'Dec 6 14:14:44 hqnl0246134 sshd[220840]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:14:45,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328885.2248597, 'message': 'Dec 6 14:14:44 hqnl0246134 sshd[220840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 14:14:46,322] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:14:46,323] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:14:47,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328887.2260199, 'message': 'Dec 6 14:14:46 hqnl0246134 sshd[220840]: Failed password for root from 61.177.173.35 port 24195 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 14:14:47,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328887.2262418, 'message': 'Dec 6 14:14:47 hqnl0246134 sshd[220840]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 14:14:51,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328891.2372866, 'message': 'Dec 6 14:14:49 hqnl0246134 sshd[220840]: Failed password for root from 61.177.173.35 port 24195 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 14:14:53,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328893.2336051, 'message': 'Dec 6 14:14:51 hqnl0246134 sshd[220840]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0331 seconds
WARNING [2022-12-06 14:14:54,665] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:14:54,690] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0342 seconds
INFO [2022-12-06 14:14:55,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670328895.2338524, 'message': 'Dec 6 14:14:53 hqnl0246134 sshd[220840]: Failed password for root from 61.177.173.35 port 24195 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 14:15:17,014] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 14:15:17,078] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 14:15:17,079] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 14:15:17,079] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 14:15:17,079] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 14:15:17,080] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 14:15:17,090] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 14:15:17,109] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0292 seconds
WARNING [2022-12-06 14:15:17,116] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 14:15:17,119] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:15:17,135] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0317 seconds
INFO [2022-12-06 14:15:17,137] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0296 seconds
INFO [2022-12-06 14:15:17,904] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:15:17,905] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:15:17,913] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:15:17,925] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 14:15:20,734] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:15:20,735] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:15:20,743] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:15:20,755] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 14:15:35,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.232.30.249', 'timestamp': 1670328935.2820358, 'message': 'Dec 6 14:15:33 hqnl0246134 sshd[220910]: Invalid user customer1 from 20.232.30.249 port 50582', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-06 14:15:35,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.232.30.249', 'timestamp': 1670328935.2830024, 'message': 'Dec 6 14:15:33 hqnl0246134 sshd[220910]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.232.30.249 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 14:15:35,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.232.30.249', 'timestamp': 1670328935.283389, 'message': 'Dec 6 14:15:33 hqnl0246134 sshd[220910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.232.30.249 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 14:15:35,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.232.30.249', 'timestamp': 1670328935.2836738, 'message': 'Dec 6 14:15:34 hqnl0246134 sshd[220910]: Failed password for invalid user customer1 from 20.232.30.249 port 50582 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 14:15:37,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.232.30.249', 'timestamp': 1670328937.2845304, 'message': 'Dec 6 14:15:36 hqnl0246134 sshd[220910]: Disconnected from invalid user customer1 20.232.30.249 port 50582 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 14:15:38,533] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:15:38,533] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:15:38,542] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:15:38,555] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-06 14:15:45,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.171.219', 'timestamp': 1670328945.2994905, 'message': 'Dec 6 14:15:44 hqnl0246134 sshd[220919]: Invalid user ops from 87.98.171.219 port 56572', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 14:15:45,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '87.98.171.219', 'timestamp': 1670328945.2998564, 'message': 'Dec 6 14:15:44 hqnl0246134 sshd[220919]: pam_imunify(sshd:auth): [IM360_RBL] The IP 87.98.171.219 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 14:15:45,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '87.98.171.219', 'timestamp': 1670328945.3060818, 'message': 'Dec 6 14:15:44 hqnl0246134 sshd[220919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.171.219 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 14:15:46,325] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:15:46,326] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:15:47,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.171.219', 'timestamp': 1670328947.3008544, 'message': 'Dec 6 14:15:46 hqnl0246134 sshd[220919]: Failed password for invalid user ops from 87.98.171.219 port 56572 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 14:15:47,974] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 14:15:47,975] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 14:15:47,977] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 14:15:49,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.171.219', 'timestamp': 1670328949.301732, 'message': 'Dec 6 14:15:47 hqnl0246134 sshd[220919]: Disconnected from invalid user ops 87.98.171.219 port 56572 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
WARNING [2022-12-06 14:15:54,671] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:15:54,710] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0520 seconds
INFO [2022-12-06 14:16:17,730] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:16:17,731] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:16:17,741] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:16:17,756] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0239 seconds
INFO [2022-12-06 14:16:20,352] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:16:20,352] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:16:20,363] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:16:20,380] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0259 seconds
INFO [2022-12-06 14:16:39,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.222.13.62', 'timestamp': 1670328999.3777971, 'message': 'Dec 6 14:16:37 hqnl0246134 sshd[220962]: Invalid user ts3 from 51.222.13.62 port 58588', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 14:16:39,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.222.13.62', 'timestamp': 1670328999.3785133, 'message': 'Dec 6 14:16:37 hqnl0246134 sshd[220962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.222.13.62 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 14:16:39,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.222.13.62', 'timestamp': 1670328999.378695, 'message': 'Dec 6 14:16:37 hqnl0246134 sshd[220962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.222.13.62 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 14:16:41,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.222.13.62', 'timestamp': 1670329001.380299, 'message': 'Dec 6 14:16:39 hqnl0246134 sshd[220962]: Failed password for invalid user ts3 from 51.222.13.62 port 58588 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 14:16:43,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.222.13.62', 'timestamp': 1670329003.382595, 'message': 'Dec 6 14:16:41 hqnl0246134 sshd[220962]: Disconnected from invalid user ts3 51.222.13.62 port 58588 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 14:16:46,328] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:16:46,329] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:16:49,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329009.388478, 'message': 'Dec 6 14:16:47 hqnl0246134 sshd[220967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 209.73.215.135 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 14:16:49,426] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329009.388745, 'message': 'Dec 6 14:16:47 hqnl0246134 sshd[220967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.73.215.135 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:16:51,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329011.3902788, 'message': 'Dec 6 14:16:49 hqnl0246134 sshd[220967]: Failed password for root from 209.73.215.135 port 35530 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 14:16:52,713] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:16:52,714] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:16:52,721] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:16:52,733] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
WARNING [2022-12-06 14:16:54,669] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:16:54,690] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0284 seconds
INFO [2022-12-06 14:17:18,040] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:17:18,041] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:17:18,052] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:17:18,070] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0279 seconds
INFO [2022-12-06 14:17:20,891] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:17:20,891] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:17:20,925] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:17:20,951] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0568 seconds
INFO [2022-12-06 14:17:29,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329049.4400368, 'message': 'Dec 6 14:17:27 hqnl0246134 sshd[221026]: Invalid user server from 34.148.81.208 port 53838', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 14:17:29,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329049.4406836, 'message': 'Dec 6 14:17:27 hqnl0246134 sshd[221026]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.148.81.208 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:17:29,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329049.4408755, 'message': 'Dec 6 14:17:27 hqnl0246134 sshd[221026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.148.81.208 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 14:17:31,513] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329051.4930584, 'message': 'Dec 6 14:17:29 hqnl0246134 sshd[221026]: Failed password for invalid user server from 34.148.81.208 port 53838 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 14:17:33,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329053.44197, 'message': 'Dec 6 14:17:31 hqnl0246134 sshd[221026]: Disconnected from invalid user server 34.148.81.208 port 53838 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 14:17:45,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329065.4575787, 'message': 'Dec 6 14:17:44 hqnl0246134 sshd[221034]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.73.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 14:17:45,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329065.4578793, 'message': 'Dec 6 14:17:44 hqnl0246134 sshd[221034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.73.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 14:17:46,340] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:17:46,341] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:17:47,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329067.457879, 'message': 'Dec 6 14:17:45 hqnl0246134 sshd[221034]: Failed password for root from 178.128.73.254 port 40228 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-06 14:17:54,674] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:17:54,698] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0318 seconds
INFO [2022-12-06 14:18:18,111] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:18:18,112] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:18:18,121] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:18:18,133] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 14:18:20,824] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:18:20,825] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:18:20,832] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:18:20,843] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
WARNING [2022-12-06 14:18:46,343] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:18:46,345] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:19:15,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.232.30.249', 'timestamp': 1670329155.5658195, 'message': 'Dec 6 14:19:14 hqnl0246134 sshd[221099]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.232.30.249 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 14:19:15,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.232.30.249', 'timestamp': 1670329155.5663717, 'message': 'Dec 6 14:19:14 hqnl0246134 sshd[221099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.232.30.249 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 14:19:17,587] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.232.30.249', 'timestamp': 1670329157.566103, 'message': 'Dec 6 14:19:16 hqnl0246134 sshd[221099]: Failed password for root from 20.232.30.249 port 50754 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 14:19:18,016] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:19:18,017] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:19:18,025] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:19:18,037] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 14:19:20,686] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:19:20,687] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 14:19:20,753] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:19:20,753] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:19:20,765] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 14:19:20,766] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:19:20,785] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0972 seconds
INFO [2022-12-06 14:19:20,786] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0315 seconds
INFO [2022-12-06 14:19:33,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329173.5969563, 'message': 'Dec 6 14:19:31 hqnl0246134 sshd[221131]: Invalid user eirik from 209.73.215.135 port 53890', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-06 14:19:33,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329173.601853, 'message': 'Dec 6 14:19:31 hqnl0246134 sshd[221131]: pam_imunify(sshd:auth): [IM360_RBL] The IP 209.73.215.135 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 14:19:33,708] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329173.6021163, 'message': 'Dec 6 14:19:31 hqnl0246134 sshd[221131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.73.215.135 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-06 14:19:35,617] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329175.5982935, 'message': 'Dec 6 14:19:33 hqnl0246134 sshd[221131]: Failed password for invalid user eirik from 209.73.215.135 port 53890 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 14:19:35,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329175.5986278, 'message': 'Dec 6 14:19:33 hqnl0246134 sshd[221131]: Disconnected from invalid user eirik 209.73.215.135 port 53890 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 14:19:40,357] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 14:19:40,425] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 14:19:40,426] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 14:19:40,426] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 14:19:40,427] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 14:19:40,427] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 14:19:40,445] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 14:19:40,474] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0452 seconds
WARNING [2022-12-06 14:19:40,486] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 14:19:40,491] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:19:40,512] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0487 seconds
INFO [2022-12-06 14:19:40,514] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0433 seconds
INFO [2022-12-06 14:19:41,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329181.6063302, 'message': 'Dec 6 14:19:40 hqnl0246134 sshd[221134]: Invalid user admin from 164.90.231.253 port 48980', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 14:19:41,651] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329181.6066065, 'message': 'Dec 6 14:19:40 hqnl0246134 sshd[221134]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.90.231.253 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 14:19:41,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329181.606854, 'message': 'Dec 6 14:19:40 hqnl0246134 sshd[221134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.231.253 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 14:19:43,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.222.13.62', 'timestamp': 1670329183.608831, 'message': 'Dec 6 14:19:41 hqnl0246134 sshd[221136]: Invalid user test from 51.222.13.62 port 40820', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0607 seconds
INFO [2022-12-06 14:19:43,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329183.6095843, 'message': 'Dec 6 14:19:42 hqnl0246134 sshd[221134]: Failed password for invalid user admin from 164.90.231.253 port 48980 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0611 seconds
INFO [2022-12-06 14:19:43,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.222.13.62', 'timestamp': 1670329183.6092055, 'message': 'Dec 6 14:19:42 hqnl0246134 sshd[221136]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.222.13.62 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 14:19:43,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.222.13.62', 'timestamp': 1670329183.6093998, 'message': 'Dec 6 14:19:42 hqnl0246134 sshd[221136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.222.13.62 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 14:19:45,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.222.13.62', 'timestamp': 1670329185.61093, 'message': 'Dec 6 14:19:44 hqnl0246134 sshd[221136]: Failed password for invalid user test from 51.222.13.62 port 40820 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 14:19:45,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329185.6111243, 'message': 'Dec 6 14:19:44 hqnl0246134 sshd[221134]: Disconnected from invalid user admin 164.90.231.253 port 48980 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 14:19:45,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.222.13.62', 'timestamp': 1670329185.6112313, 'message': 'Dec 6 14:19:44 hqnl0246134 sshd[221136]: Disconnected from invalid user test 51.222.13.62 port 40820 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-06 14:19:46,348] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:19:46,349] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:19:54,678] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:19:54,709] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0389 seconds
INFO [2022-12-06 14:20:01,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.142.20', 'timestamp': 1670329201.6433134, 'message': 'Dec 6 14:19:59 hqnl0246134 sshd[221152]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.142.20 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 14:20:01,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '87.98.171.219', 'timestamp': 1670329201.643731, 'message': 'Dec 6 14:20:01 hqnl0246134 sshd[221150]: pam_imunify(sshd:auth): [IM360_RBL] The IP 87.98.171.219 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0389 seconds
INFO [2022-12-06 14:20:01,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.142.20', 'timestamp': 1670329201.6435845, 'message': 'Dec 6 14:19:59 hqnl0246134 sshd[221152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.142.20 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0552 seconds
INFO [2022-12-06 14:20:01,740] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '87.98.171.219', 'timestamp': 1670329201.6439028, 'message': 'Dec 6 14:20:01 hqnl0246134 sshd[221150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.171.219 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0547 seconds
INFO [2022-12-06 14:20:03,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '167.172.142.20', 'timestamp': 1670329203.6464562, 'message': 'Dec 6 14:20:01 hqnl0246134 sshd[221152]: Failed password for root from 167.172.142.20 port 41320 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0683 seconds
INFO [2022-12-06 14:20:03,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.73.252.229', 'timestamp': 1670329203.6466632, 'message': 'Dec 6 14:20:03 hqnl0246134 sshd[221168]: Invalid user cpd from 41.73.252.229 port 56356', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0687 seconds
INFO [2022-12-06 14:20:03,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '87.98.171.219', 'timestamp': 1670329203.6469767, 'message': 'Dec 6 14:20:03 hqnl0246134 sshd[221150]: Failed password for root from 87.98.171.219 port 48694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0690 seconds
INFO [2022-12-06 14:20:03,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.73.252.229', 'timestamp': 1670329203.6470988, 'message': 'Dec 6 14:20:03 hqnl0246134 sshd[221168]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.73.252.229 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 14:20:03,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.73.252.229', 'timestamp': 1670329203.6472926, 'message': 'Dec 6 14:20:03 hqnl0246134 sshd[221168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.73.252.229 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 14:20:05,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.73.252.229', 'timestamp': 1670329205.6485357, 'message': 'Dec 6 14:20:05 hqnl0246134 sshd[221168]: Failed password for invalid user cpd from 41.73.252.229 port 56356 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 14:20:07,675] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.73.252.229', 'timestamp': 1670329207.6508567, 'message': 'Dec 6 14:20:07 hqnl0246134 sshd[221168]: Disconnected from invalid user cpd 41.73.252.229 port 56356 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 14:20:10,574] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 14:20:10,574] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 14:20:10,576] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 14:20:17,973] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:20:17,973] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:20:17,984] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:20:17,996] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0224 seconds
INFO [2022-12-06 14:20:20,649] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:20:20,650] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:20:20,657] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:20:20,669] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 14:20:21,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329221.6689663, 'message': 'Dec 6 14:20:20 hqnl0246134 sshd[221192]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 14:20:21,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329221.669292, 'message': 'Dec 6 14:20:21 hqnl0246134 sshd[221196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 14:20:21,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329221.6691582, 'message': 'Dec 6 14:20:20 hqnl0246134 sshd[221192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 14:20:21,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329221.6700716, 'message': 'Dec 6 14:20:21 hqnl0246134 sshd[221196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 14:20:23,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '71.238.230.5', 'timestamp': 1670329223.671997, 'message': 'Dec 6 14:20:21 hqnl0246134 sshd[221209]: Invalid user huawei from 71.238.230.5 port 57182', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0438 seconds
INFO [2022-12-06 14:20:23,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329223.6726432, 'message': 'Dec 6 14:20:22 hqnl0246134 sshd[221192]: Failed password for root from 61.177.173.49 port 35163 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 14:20:23,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329223.6727626, 'message': 'Dec 6 14:20:23 hqnl0246134 sshd[221196]: Failed password for root from 61.177.172.98 port 41538 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0442 seconds
INFO [2022-12-06 14:20:23,735] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '71.238.230.5', 'timestamp': 1670329223.6723752, 'message': 'Dec 6 14:20:22 hqnl0246134 sshd[221209]: pam_imunify(sshd:auth): [IM360_RBL] The IP 71.238.230.5 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 14:20:23,752] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '71.238.230.5', 'timestamp': 1670329223.6725254, 'message': 'Dec 6 14:20:22 hqnl0246134 sshd[221209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.238.230.5 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 14:20:23,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '71.238.230.5', 'timestamp': 1670329223.6728837, 'message': 'Dec 6 14:20:23 hqnl0246134 sshd[221209]: Failed password for invalid user huawei from 71.238.230.5 port 57182 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0161 seconds
INFO [2022-12-06 14:20:25,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '71.238.230.5', 'timestamp': 1670329225.6743515, 'message': 'Dec 6 14:20:24 hqnl0246134 sshd[221209]: Disconnected from invalid user huawei 71.238.230.5 port 57182 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 14:20:25,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329225.6746118, 'message': 'Dec 6 14:20:24 hqnl0246134 sshd[221192]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-06 14:20:25,721] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329225.6815825, 'message': 'Dec 6 14:20:25 hqnl0246134 sshd[221196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0389 seconds
INFO [2022-12-06 14:20:27,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329227.6774282, 'message': 'Dec 6 14:20:26 hqnl0246134 sshd[221192]: Failed password for root from 61.177.173.49 port 35163 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 14:20:27,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329227.6778736, 'message': 'Dec 6 14:20:27 hqnl0246134 sshd[221196]: Failed password for root from 61.177.172.98 port 41538 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 14:20:27,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329227.6780024, 'message': 'Dec 6 14:20:27 hqnl0246134 sshd[221196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 14:20:29,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329229.6792507, 'message': 'Dec 6 14:20:29 hqnl0246134 sshd[221192]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 14:20:29,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329229.6796956, 'message': 'Dec 6 14:20:29 hqnl0246134 sshd[221196]: Failed password for root from 61.177.172.98 port 41538 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 14:20:31,702] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329231.681732, 'message': 'Dec 6 14:20:31 hqnl0246134 sshd[221192]: Failed password for root from 61.177.173.49 port 35163 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 14:20:33,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329233.6829946, 'message': 'Dec 6 14:20:33 hqnl0246134 sshd[221222]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 14:20:33,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329233.6890316, 'message': 'Dec 6 14:20:33 hqnl0246134 sshd[221222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 14:20:35,708] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329235.6852922, 'message': 'Dec 6 14:20:35 hqnl0246134 sshd[221222]: Failed password for root from 61.177.172.98 port 54337 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 14:20:37,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329237.6859088, 'message': 'Dec 6 14:20:37 hqnl0246134 sshd[221222]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 14:20:38,248] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:20:38,249] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:20:38,261] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:20:38,279] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0286 seconds
INFO [2022-12-06 14:20:39,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329239.688225, 'message': 'Dec 6 14:20:37 hqnl0246134 sshd[221229]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0441 seconds
INFO [2022-12-06 14:20:39,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329239.6885095, 'message': 'Dec 6 14:20:39 hqnl0246134 sshd[221222]: Failed password for root from 61.177.172.98 port 54337 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0448 seconds
INFO [2022-12-06 14:20:39,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329239.688399, 'message': 'Dec 6 14:20:37 hqnl0246134 sshd[221229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 14:20:39,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329239.688611, 'message': 'Dec 6 14:20:39 hqnl0246134 sshd[221222]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 14:20:41,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329241.6920865, 'message': 'Dec 6 14:20:39 hqnl0246134 sshd[221229]: Failed password for root from 61.177.173.49 port 41043 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 14:20:41,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329241.6925106, 'message': 'Dec 6 14:20:41 hqnl0246134 sshd[221222]: Failed password for root from 61.177.172.98 port 54337 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 14:20:41,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329241.6923518, 'message': 'Dec 6 14:20:40 hqnl0246134 sshd[221229]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 14:20:43,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329243.6942651, 'message': 'Dec 6 14:20:42 hqnl0246134 sshd[221229]: Failed password for root from 61.177.173.49 port 41043 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 14:20:43,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329243.694593, 'message': 'Dec 6 14:20:43 hqnl0246134 sshd[221235]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 14:20:43,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329243.69448, 'message': 'Dec 6 14:20:43 hqnl0246134 sshd[221229]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 14:20:43,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329243.6947606, 'message': 'Dec 6 14:20:43 hqnl0246134 sshd[221235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 14:20:45,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670329245.696016, 'message': 'Dec 6 14:20:44 hqnl0246134 sshd[221229]: Failed password for root from 61.177.173.49 port 41043 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 14:20:45,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329245.6962109, 'message': 'Dec 6 14:20:45 hqnl0246134 sshd[221235]: Failed password for root from 61.177.172.98 port 61156 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
WARNING [2022-12-06 14:20:46,352] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:20:46,353] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:20:47,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329247.699334, 'message': 'Dec 6 14:20:45 hqnl0246134 sshd[221235]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 14:20:49,722] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329249.702038, 'message': 'Dec 6 14:20:47 hqnl0246134 sshd[221235]: Failed password for root from 61.177.172.98 port 61156 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 14:20:49,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329249.7022395, 'message': 'Dec 6 14:20:48 hqnl0246134 sshd[221235]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 14:20:51,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329251.7044034, 'message': 'Dec 6 14:20:50 hqnl0246134 sshd[221235]: Failed password for root from 61.177.172.98 port 61156 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
WARNING [2022-12-06 14:20:54,695] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:20:54,749] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0732 seconds
INFO [2022-12-06 14:20:55,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329255.7089155, 'message': 'Dec 6 14:20:54 hqnl0246134 sshd[221246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 14:20:55,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329255.7092319, 'message': 'Dec 6 14:20:54 hqnl0246134 sshd[221246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 14:20:57,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329257.710244, 'message': 'Dec 6 14:20:56 hqnl0246134 sshd[221246]: Failed password for root from 61.177.172.98 port 18968 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 14:20:57,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329257.7104416, 'message': 'Dec 6 14:20:56 hqnl0246134 sshd[221246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 14:20:59,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329259.7117915, 'message': 'Dec 6 14:20:58 hqnl0246134 sshd[221246]: Failed password for root from 61.177.172.98 port 18968 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 14:20:59,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329259.7120035, 'message': 'Dec 6 14:20:59 hqnl0246134 sshd[221246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 14:21:01,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670329261.7140656, 'message': 'Dec 6 14:21:01 hqnl0246134 sshd[221246]: Failed password for root from 61.177.172.98 port 18968 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 14:21:17,842] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:21:17,843] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:21:17,853] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:21:17,865] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 14:21:20,461] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:21:20,462] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:21:20,469] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:21:20,480] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 14:21:21,764] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.154.248.181', 'timestamp': 1670329281.7278512, 'message': 'Dec 6 14:21:20 hqnl0246134 sshd[221268]: Invalid user admin from 36.154.248.181 port 54758', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 14:21:21,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.154.248.181', 'timestamp': 1670329281.7283614, 'message': 'Dec 6 14:21:20 hqnl0246134 sshd[221268]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.154.248.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 14:21:21,819] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.154.248.181', 'timestamp': 1670329281.7285812, 'message': 'Dec 6 14:21:20 hqnl0246134 sshd[221268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.154.248.181 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 14:21:23,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.154.248.181', 'timestamp': 1670329283.7300098, 'message': 'Dec 6 14:21:23 hqnl0246134 sshd[221268]: Failed password for invalid user admin from 36.154.248.181 port 54758 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 14:21:25,752] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.154.248.181', 'timestamp': 1670329285.7325008, 'message': 'Dec 6 14:21:24 hqnl0246134 sshd[221268]: Disconnected from invalid user admin 36.154.248.181 port 54758 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 14:21:46,356] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:21:46,357] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:21:53,295] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 14:21:53,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329313.7673354, 'message': 'Dec 6 14:21:53 hqnl0246134 sshd[221297]: Invalid user user from 34.148.81.208 port 44456', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 14:21:53,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329313.7676938, 'message': 'Dec 6 14:21:53 hqnl0246134 sshd[221297]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.148.81.208 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 14:21:53,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329313.767923, 'message': 'Dec 6 14:21:53 hqnl0246134 sshd[221297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.148.81.208 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
WARNING [2022-12-06 14:21:54,686] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:21:54,711] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0321 seconds
INFO [2022-12-06 14:21:55,806] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '179.61.251.73', 'timestamp': 1670329315.769317, 'message': 'Dec 6 14:21:54 hqnl0246134 sshd[221316]: Invalid user auxiliar from 179.61.251.73 port 56820', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 14:21:55,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329315.769851, 'message': 'Dec 6 14:21:55 hqnl0246134 sshd[221297]: Failed password for invalid user user from 34.148.81.208 port 44456 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 14:21:55,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '179.61.251.73', 'timestamp': 1670329315.769541, 'message': 'Dec 6 14:21:55 hqnl0246134 sshd[221316]: pam_imunify(sshd:auth): [IM360_RBL] The IP 179.61.251.73 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 14:21:55,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '179.61.251.73', 'timestamp': 1670329315.7696755, 'message': 'Dec 6 14:21:55 hqnl0246134 sshd[221316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.61.251.73 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 14:21:57,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329317.7700505, 'message': 'Dec 6 14:21:57 hqnl0246134 sshd[221297]: Disconnected from invalid user user 34.148.81.208 port 44456 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 14:21:57,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '179.61.251.73', 'timestamp': 1670329317.770398, 'message': 'Dec 6 14:21:57 hqnl0246134 sshd[221316]: Failed password for invalid user auxiliar from 179.61.251.73 port 56820 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 14:21:59,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '179.61.251.73', 'timestamp': 1670329319.7701483, 'message': 'Dec 6 14:21:59 hqnl0246134 sshd[221316]: Disconnected from invalid user auxiliar 179.61.251.73 port 56820 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 14:22:00,075] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:22:00,075] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:22:00,083] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:22:00,094] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 14:22:17,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329337.7933936, 'message': 'Dec 6 14:22:17 hqnl0246134 sshd[221339]: Invalid user chen from 209.73.215.135 port 44020', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0563 seconds
INFO [2022-12-06 14:22:17,918] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329337.7939186, 'message': 'Dec 6 14:22:17 hqnl0246134 sshd[221339]: pam_imunify(sshd:auth): [IM360_RBL] The IP 209.73.215.135 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0662 seconds
INFO [2022-12-06 14:22:17,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329337.7940676, 'message': 'Dec 6 14:22:17 hqnl0246134 sshd[221339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.73.215.135 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0506 seconds
INFO [2022-12-06 14:22:19,655] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:22:19,655] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:22:19,662] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:22:19,674] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 14:22:21,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329341.797696, 'message': 'Dec 6 14:22:20 hqnl0246134 sshd[221339]: Failed password for invalid user chen from 209.73.215.135 port 44020 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 14:22:21,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '209.73.215.135', 'timestamp': 1670329341.8010368, 'message': 'Dec 6 14:22:21 hqnl0246134 sshd[221339]: Disconnected from invalid user chen 209.73.215.135 port 44020 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 14:22:22,701] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:22:22,702] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:22:22,714] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:22:22,726] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
INFO [2022-12-06 14:22:39,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.222.13.62', 'timestamp': 1670329359.8288002, 'message': 'Dec 6 14:22:38 hqnl0246134 sshd[221361]: Invalid user angel from 51.222.13.62 port 45456', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 14:22:39,893] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.222.13.62', 'timestamp': 1670329359.8291507, 'message': 'Dec 6 14:22:38 hqnl0246134 sshd[221361]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.222.13.62 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 14:22:39,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.222.13.62', 'timestamp': 1670329359.8294423, 'message': 'Dec 6 14:22:38 hqnl0246134 sshd[221361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.222.13.62 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 14:22:41,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.222.13.62', 'timestamp': 1670329361.8305204, 'message': 'Dec 6 14:22:40 hqnl0246134 sshd[221361]: Failed password for invalid user angel from 51.222.13.62 port 45456 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 14:22:41,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.222.13.62', 'timestamp': 1670329361.8307538, 'message': 'Dec 6 14:22:40 hqnl0246134 sshd[221361]: Disconnected from invalid user angel 51.222.13.62 port 45456 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 14:22:46,361] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:22:46,362] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:22:54,694] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:22:54,719] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0347 seconds
INFO [2022-12-06 14:22:59,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.232.30.249', 'timestamp': 1670329379.8500156, 'message': 'Dec 6 14:22:58 hqnl0246134 sshd[221375]: Invalid user guest from 20.232.30.249 port 50930', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 14:22:59,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.232.30.249', 'timestamp': 1670329379.8505094, 'message': 'Dec 6 14:22:58 hqnl0246134 sshd[221375]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.232.30.249 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 14:22:59,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.232.30.249', 'timestamp': 1670329379.850787, 'message': 'Dec 6 14:22:58 hqnl0246134 sshd[221375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.232.30.249 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 14:22:59,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.232.30.249', 'timestamp': 1670329379.8592293, 'message': 'Dec 6 14:22:59 hqnl0246134 sshd[221375]: Failed password for invalid user guest from 20.232.30.249 port 50930 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 14:23:01,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.232.30.249', 'timestamp': 1670329381.8501072, 'message': 'Dec 6 14:23:00 hqnl0246134 sshd[221375]: Disconnected from invalid user guest 20.232.30.249 port 50930 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 14:23:03,699] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:23:03,699] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:23:03,709] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:23:03,721] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 14:23:15,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670329395.867702, 'message': 'Dec 6 14:23:14 hqnl0246134 sshd[221391]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 14:23:15,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670329395.8681126, 'message': 'Dec 6 14:23:14 hqnl0246134 sshd[221391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 14:23:17,932] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:23:17,932] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:23:17,945] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:23:17,966] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0326 seconds
INFO [2022-12-06 14:23:17,967] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670329397.9348035, 'message': 'Dec 6 14:23:17 hqnl0246134 sshd[221391]: Failed password for root from 61.177.173.52 port 61546 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 14:23:19,897] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670329399.8699002, 'message': 'Dec 6 14:23:18 hqnl0246134 sshd[221391]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 14:23:20,785] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:23:20,785] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:23:20,799] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:23:20,813] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 14:23:21,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670329401.8742507, 'message': 'Dec 6 14:23:20 hqnl0246134 sshd[221391]: Failed password for root from 61.177.173.52 port 61546 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 14:23:23,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670329403.873908, 'message': 'Dec 6 14:23:22 hqnl0246134 sshd[221391]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 14:23:25,894] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670329405.8761618, 'message': 'Dec 6 14:23:24 hqnl0246134 sshd[221391]: Failed password for root from 61.177.173.52 port 61546 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 14:23:27,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670329407.8775237, 'message': 'Dec 6 14:23:26 hqnl0246134 sshd[221417]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 14:23:27,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670329407.8777301, 'message': 'Dec 6 14:23:27 hqnl0246134 sshd[221417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 14:23:29,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670329409.8806453, 'message': 'Dec 6 14:23:29 hqnl0246134 sshd[221417]: Failed password for root from 61.177.173.52 port 63776 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 14:23:31,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670329411.8833144, 'message': 'Dec 6 14:23:31 hqnl0246134 sshd[221417]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 14:23:33,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670329413.8865044, 'message': 'Dec 6 14:23:33 hqnl0246134 sshd[221417]: Failed password for root from 61.177.173.52 port 63776 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
WARNING [2022-12-06 14:23:46,366] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:23:46,368] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:23:53,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.171.219', 'timestamp': 1670329433.9259822, 'message': 'Dec 6 14:23:53 hqnl0246134 sshd[221431]: Invalid user user from 87.98.171.219 port 48060', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 14:23:53,971] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '87.98.171.219', 'timestamp': 1670329433.926461, 'message': 'Dec 6 14:23:53 hqnl0246134 sshd[221431]: pam_imunify(sshd:auth): [IM360_RBL] The IP 87.98.171.219 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 14:23:53,990] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '87.98.171.219', 'timestamp': 1670329433.926641, 'message': 'Dec 6 14:23:53 hqnl0246134 sshd[221431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.171.219 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-06 14:23:54,708] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:23:54,745] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0496 seconds
INFO [2022-12-06 14:23:55,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.171.219', 'timestamp': 1670329435.9276452, 'message': 'Dec 6 14:23:55 hqnl0246134 sshd[221431]: Failed password for invalid user user from 87.98.171.219 port 48060 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 14:23:57,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.98.171.219', 'timestamp': 1670329437.929426, 'message': 'Dec 6 14:23:56 hqnl0246134 sshd[221431]: Disconnected from invalid user user 87.98.171.219 port 48060 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0387 seconds
INFO [2022-12-06 14:24:05,862] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 14:24:05,932] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 14:24:05,933] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 14:24:05,933] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 14:24:05,933] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 14:24:05,933] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 14:24:05,948] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 14:24:05,972] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0377 seconds
WARNING [2022-12-06 14:24:05,983] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 14:24:05,986] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:24:06,007] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0431 seconds
INFO [2022-12-06 14:24:06,009] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0402 seconds
INFO [2022-12-06 14:24:17,973] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:24:17,973] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:24:17,980] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:24:17,992] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 14:24:20,640] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:24:20,640] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:24:20,652] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:24:20,663] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 14:24:36,073] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 14:24:36,074] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 14:24:36,075] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 14:24:40,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.154.75.210', 'timestamp': 1670329480.0179024, 'message': 'Dec 6 14:24:39 hqnl0246134 sshd[221466]: Invalid user rp from 43.154.75.210 port 30262', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 14:24:40,058] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.154.75.210', 'timestamp': 1670329480.0182781, 'message': 'Dec 6 14:24:39 hqnl0246134 sshd[221466]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.154.75.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 14:24:40,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.154.75.210', 'timestamp': 1670329480.0184464, 'message': 'Dec 6 14:24:39 hqnl0246134 sshd[221466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.75.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 14:24:42,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.154.75.210', 'timestamp': 1670329482.018041, 'message': 'Dec 6 14:24:41 hqnl0246134 sshd[221466]: Failed password for invalid user rp from 43.154.75.210 port 30262 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 14:24:44,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.154.75.210', 'timestamp': 1670329484.021606, 'message': 'Dec 6 14:24:42 hqnl0246134 sshd[221466]: Disconnected from invalid user rp 43.154.75.210 port 30262 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 14:24:45,417] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:24:45,417] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:24:45,430] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:24:45,451] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0325 seconds
INFO [2022-12-06 14:24:46,058] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.92.117.121', 'timestamp': 1670329486.0246563, 'message': 'Dec 6 14:24:44 hqnl0246134 sshd[221468]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.92.117.121 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 14:24:46,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '87.219.167.66', 'timestamp': 1670329486.0250468, 'message': 'Dec 6 14:24:45 hqnl0246134 sshd[221475]: pam_imunify(sshd:auth): [IM360_RBL] The IP 87.219.167.66 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 14:24:46,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.92.117.121', 'timestamp': 1670329486.0248544, 'message': 'Dec 6 14:24:44 hqnl0246134 sshd[221468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.117.121 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 14:24:46,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '87.219.167.66', 'timestamp': 1670329486.0251894, 'message': 'Dec 6 14:24:45 hqnl0246134 sshd[221475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.219.167.66 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0337 seconds
WARNING [2022-12-06 14:24:46,374] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:24:46,375] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:24:48,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '164.92.117.121', 'timestamp': 1670329488.0360513, 'message': 'Dec 6 14:24:46 hqnl0246134 sshd[221468]: Failed password for root from 164.92.117.121 port 55388 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 14:24:48,068] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '87.219.167.66', 'timestamp': 1670329488.036526, 'message': 'Dec 6 14:24:47 hqnl0246134 sshd[221475]: Failed password for root from 87.219.167.66 port 56530 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
WARNING [2022-12-06 14:24:54,713] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:24:54,790] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0911 seconds
INFO [2022-12-06 14:25:17,746] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:25:17,747] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:25:17,759] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:25:17,773] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0250 seconds
INFO [2022-12-06 14:25:20,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.246.239.141', 'timestamp': 1670329520.0922744, 'message': 'Dec 6 14:25:18 hqnl0246134 sshd[221528]: Invalid user admin from 115.246.239.141 port 48994', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 14:25:20,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.203.149.110', 'timestamp': 1670329520.0928886, 'message': 'Dec 6 14:25:19 hqnl0246134 sshd[221523]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.203.149.110 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0426 seconds
INFO [2022-12-06 14:25:20,169] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.246.239.141', 'timestamp': 1670329520.0925422, 'message': 'Dec 6 14:25:18 hqnl0246134 sshd[221528]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.246.239.141 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 14:25:20,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.203.149.110', 'timestamp': 1670329520.0930305, 'message': 'Dec 6 14:25:19 hqnl0246134 sshd[221523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.203.149.110 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 14:25:20,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.246.239.141', 'timestamp': 1670329520.0926805, 'message': 'Dec 6 14:25:18 hqnl0246134 sshd[221528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.246.239.141 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 14:25:20,568] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:25:20,569] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:25:20,576] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:25:20,587] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 14:25:22,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.246.239.141', 'timestamp': 1670329522.1010115, 'message': 'Dec 6 14:25:20 hqnl0246134 sshd[221528]: Failed password for invalid user admin from 115.246.239.141 port 48994 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 14:25:22,133] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.203.149.110', 'timestamp': 1670329522.101241, 'message': 'Dec 6 14:25:21 hqnl0246134 sshd[221523]: Failed password for root from 20.203.149.110 port 38138 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 14:25:24,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.246.239.141', 'timestamp': 1670329524.1055913, 'message': 'Dec 6 14:25:22 hqnl0246134 sshd[221528]: Disconnected from invalid user admin 115.246.239.141 port 48994 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
WARNING [2022-12-06 14:25:46,377] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:25:46,379] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:25:54,714] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:25:54,743] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0409 seconds
INFO [2022-12-06 14:25:58,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329558.1533923, 'message': 'Dec 6 14:25:56 hqnl0246134 sshd[221567]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.148.81.208 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0572 seconds
INFO [2022-12-06 14:25:58,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329558.1546488, 'message': 'Dec 6 14:25:56 hqnl0246134 sshd[221567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.148.81.208 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 14:26:00,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.15.64', 'timestamp': 1670329560.1546886, 'message': 'Dec 6 14:25:58 hqnl0246134 sshd[221570]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.15.64 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0543 seconds
INFO [2022-12-06 14:26:00,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '34.148.81.208', 'timestamp': 1670329560.1553397, 'message': 'Dec 6 14:25:59 hqnl0246134 sshd[221567]: Failed password for root from 34.148.81.208 port 35096 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0546 seconds
INFO [2022-12-06 14:26:00,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.15.64', 'timestamp': 1670329560.1550562, 'message': 'Dec 6 14:25:58 hqnl0246134 sshd[221570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.15.64 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 14:26:02,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.15.64', 'timestamp': 1670329562.1582367, 'message': 'Dec 6 14:26:00 hqnl0246134 sshd[221570]: Failed password for root from 43.153.15.64 port 43644 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 14:26:03,537] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:26:03,537] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:26:03,545] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:26:03,558] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 14:26:06,360] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:26:06,360] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:26:06,369] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:26:06,381] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 14:26:17,692] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:26:17,693] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:26:17,706] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:26:17,729] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0347 seconds
INFO [2022-12-06 14:26:20,288] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:26:20,288] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:26:20,296] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:26:20,307] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 14:26:22,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329582.2036479, 'message': 'Dec 6 14:26:22 hqnl0246134 sshd[221609]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 14:26:22,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329582.2038882, 'message': 'Dec 6 14:26:22 hqnl0246134 sshd[221609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 14:26:24,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329584.2055929, 'message': 'Dec 6 14:26:23 hqnl0246134 sshd[221609]: Failed password for root from 61.177.173.35 port 61454 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 14:26:24,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329584.2060335, 'message': 'Dec 6 14:26:24 hqnl0246134 sshd[221609]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 14:26:26,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329586.208778, 'message': 'Dec 6 14:26:26 hqnl0246134 sshd[221609]: Failed password for root from 61.177.173.35 port 61454 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 14:26:28,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329588.211325, 'message': 'Dec 6 14:26:26 hqnl0246134 sshd[221609]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 14:26:30,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329590.213693, 'message': 'Dec 6 14:26:28 hqnl0246134 sshd[221609]: Failed password for root from 61.177.173.35 port 61454 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 14:26:32,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329592.2169974, 'message': 'Dec 6 14:26:30 hqnl0246134 sshd[221620]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 14:26:32,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329592.2172048, 'message': 'Dec 6 14:26:30 hqnl0246134 sshd[221620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 14:26:32,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329592.217904, 'message': 'Dec 6 14:26:32 hqnl0246134 sshd[221620]: Failed password for root from 61.177.173.35 port 16776 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 14:26:34,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329594.285342, 'message': 'Dec 6 14:26:32 hqnl0246134 sshd[221620]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 14:26:36,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329596.222513, 'message': 'Dec 6 14:26:35 hqnl0246134 sshd[221620]: Failed password for root from 61.177.173.35 port 16776 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 14:26:38,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329598.2255762, 'message': 'Dec 6 14:26:37 hqnl0246134 sshd[221620]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 14:26:40,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329600.2260096, 'message': 'Dec 6 14:26:38 hqnl0246134 sshd[221620]: Failed password for root from 61.177.173.35 port 16776 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 14:26:42,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329602.228721, 'message': 'Dec 6 14:26:40 hqnl0246134 sshd[221624]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 14:26:42,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329602.228985, 'message': 'Dec 6 14:26:40 hqnl0246134 sshd[221624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 14:26:44,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329604.229846, 'message': 'Dec 6 14:26:42 hqnl0246134 sshd[221624]: Failed password for root from 61.177.173.35 port 49253 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 14:26:44,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329604.2300189, 'message': 'Dec 6 14:26:43 hqnl0246134 sshd[221624]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 14:26:46,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329606.2305439, 'message': 'Dec 6 14:26:45 hqnl0246134 sshd[221624]: Failed password for root from 61.177.173.35 port 49253 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
WARNING [2022-12-06 14:26:46,381] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:26:46,382] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:26:48,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329608.2334442, 'message': 'Dec 6 14:26:47 hqnl0246134 sshd[221624]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 14:26:50,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670329610.2336137, 'message': 'Dec 6 14:26:49 hqnl0246134 sshd[221624]: Failed password for root from 61.177.173.35 port 49253 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0391 seconds
WARNING [2022-12-06 14:26:54,715] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:26:54,738] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0320 seconds
INFO [2022-12-06 14:26:56,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329616.2442193, 'message': 'Dec 6 14:26:54 hqnl0246134 sshd[221661]: Invalid user roman from 178.128.73.254 port 53206', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 14:26:56,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329616.244506, 'message': 'Dec 6 14:26:54 hqnl0246134 sshd[221661]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.73.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:26:56,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329616.2446454, 'message': 'Dec 6 14:26:54 hqnl0246134 sshd[221661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.73.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 14:26:58,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329618.2473083, 'message': 'Dec 6 14:26:56 hqnl0246134 sshd[221661]: Failed password for invalid user roman from 178.128.73.254 port 53206 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 14:26:58,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329618.247637, 'message': 'Dec 6 14:26:57 hqnl0246134 sshd[221661]: Disconnected from invalid user roman 178.128.73.254 port 53206 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 14:27:17,872] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:27:17,873] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:27:17,882] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:27:17,894] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 14:27:20,626] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:27:20,626] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:27:20,634] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:27:20,645] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
WARNING [2022-12-06 14:27:46,386] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:27:46,389] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:27:54,727] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:27:54,751] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0350 seconds
INFO [2022-12-06 14:27:58,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329678.3437827, 'message': 'Dec 6 14:27:58 hqnl0246134 sshd[221719]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.90.231.253 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 14:27:58,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329678.3441324, 'message': 'Dec 6 14:27:58 hqnl0246134 sshd[221719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.231.253 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 14:28:00,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.123', 'timestamp': 1670329680.3419504, 'message': 'Dec 6 14:27:59 hqnl0246134 sshd[221722]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.123 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0574 seconds
INFO [2022-12-06 14:28:00,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329680.3422894, 'message': 'Dec 6 14:28:00 hqnl0246134 sshd[221719]: Failed password for root from 164.90.231.253 port 44874 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0578 seconds
INFO [2022-12-06 14:28:00,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.123', 'timestamp': 1670329680.3421617, 'message': 'Dec 6 14:27:59 hqnl0246134 sshd[221722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.123 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 14:28:01,901] defence360agent.files: Updating all files
INFO [2022-12-06 14:28:02,283] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 14:28:02,283] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 14:28:02,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '152.89.196.123', 'timestamp': 1670329682.363095, 'message': 'Dec 6 14:28:01 hqnl0246134 sshd[221722]: Failed password for root from 152.89.196.123 port 38014 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 14:28:02,682] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 14:28:02,682] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 14:28:02,955] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 14:28:02,955] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 14:28:03,307] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 14:28:03,308] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 14:28:03,308] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 14:28:03,671] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 12:28:03 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E33FF59949DCC'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 14:28:03,725] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:28:03,726] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 14:28:03,736] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 14:28:03,737] defence360agent.files: php-immunity files update finished (not updated)
WARNING [2022-12-06 14:28:04,481] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:28:04,777] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 14:28:04,777] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 14:28:04,859] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 1.1232 seconds
INFO [2022-12-06 14:28:05,096] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 14:28:05,097] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 14:28:05,362] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 14:28:05,362] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 14:28:05,791] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 14:28:05,792] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 14:28:06,363] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 14:28:06,365] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 14:28:18,836] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:28:18,837] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:28:18,849] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:28:18,869] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0313 seconds
INFO [2022-12-06 14:28:21,596] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:28:21,597] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:28:21,605] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:28:21,616] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
WARNING [2022-12-06 14:28:46,392] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:28:46,393] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:28:54,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.154.75.210', 'timestamp': 1670329734.4239185, 'message': 'Dec 6 14:28:53 hqnl0246134 sshd[221770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.154.75.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 14:28:54,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.154.75.210', 'timestamp': 1670329734.4245842, 'message': 'Dec 6 14:28:53 hqnl0246134 sshd[221770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.75.210 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 14:28:54,726] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:28:54,749] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0304 seconds
INFO [2022-12-06 14:28:56,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.154.75.210', 'timestamp': 1670329736.4283853, 'message': 'Dec 6 14:28:56 hqnl0246134 sshd[221770]: Failed password for root from 43.154.75.210 port 30586 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 14:29:04,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '209.141.46.19', 'timestamp': 1670329744.446434, 'message': 'Dec 6 14:29:02 hqnl0246134 sshd[221788]: pam_imunify(sshd:auth): [IM360_RBL] The IP 209.141.46.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-06 14:29:04,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329744.446782, 'message': 'Dec 6 14:29:03 hqnl0246134 sshd[221790]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.73.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 14:29:04,521] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '209.141.46.19', 'timestamp': 1670329744.446621, 'message': 'Dec 6 14:29:02 hqnl0246134 sshd[221788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.46.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 14:29:04,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329744.4468987, 'message': 'Dec 6 14:29:03 hqnl0246134 sshd[221790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.73.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 14:29:06,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '209.141.46.19', 'timestamp': 1670329746.4482696, 'message': 'Dec 6 14:29:04 hqnl0246134 sshd[221788]: Failed password for root from 209.141.46.19 port 49182 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 14:29:06,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329746.4484804, 'message': 'Dec 6 14:29:05 hqnl0246134 sshd[221790]: Failed password for root from 178.128.73.254 port 58622 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 14:29:06,507] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 14:29:06,571] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 14:29:06,572] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 14:29:06,572] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 14:29:06,572] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 14:29:06,573] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 14:29:06,586] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 14:29:06,602] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0285 seconds
WARNING [2022-12-06 14:29:06,608] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 14:29:06,611] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:29:06,639] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0422 seconds
INFO [2022-12-06 14:29:06,640] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0408 seconds
INFO [2022-12-06 14:29:07,878] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:29:07,879] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:29:07,886] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:29:07,902] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
INFO [2022-12-06 14:29:10,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '135.148.157.18', 'timestamp': 1670329750.455043, 'message': 'Dec 6 14:29:10 hqnl0246134 sshd[221798]: Invalid user user from 135.148.157.18 port 37632', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 14:29:12,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '135.148.157.18', 'timestamp': 1670329752.456832, 'message': 'Dec 6 14:29:10 hqnl0246134 sshd[221798]: pam_imunify(sshd:auth): [IM360_RBL] The IP 135.148.157.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 14:29:12,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '135.148.157.18', 'timestamp': 1670329752.4571016, 'message': 'Dec 6 14:29:10 hqnl0246134 sshd[221798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.148.157.18 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 14:29:12,512] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '135.148.157.18', 'timestamp': 1670329752.4580038, 'message': 'Dec 6 14:29:12 hqnl0246134 sshd[221798]: Failed password for invalid user user from 135.148.157.18 port 37632 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 14:29:14,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '135.148.157.18', 'timestamp': 1670329754.4577305, 'message': 'Dec 6 14:29:14 hqnl0246134 sshd[221798]: Disconnected from invalid user user 135.148.157.18 port 37632 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 14:29:17,795] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:29:17,796] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:29:17,803] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:29:17,819] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0223 seconds
INFO [2022-12-06 14:29:20,405] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:29:20,406] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:29:20,413] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:29:20,425] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 14:29:36,702] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 14:29:36,703] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 14:29:36,704] im360.plugins.client360: Waiting 7 minutes before retry...
WARNING [2022-12-06 14:29:46,401] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:29:46,403] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:29:54,732] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:29:54,757] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0343 seconds
INFO [2022-12-06 14:30:17,748] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:30:17,749] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:30:17,759] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:30:17,772] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 14:30:20,445] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:30:20,446] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:30:20,453] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:30:20,465] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 14:30:26,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '179.61.251.73', 'timestamp': 1670329826.557735, 'message': 'Dec 6 14:30:24 hqnl0246134 sshd[221894]: Invalid user oracle from 179.61.251.73 port 44822', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0532 seconds
INFO [2022-12-06 14:30:26,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '179.61.251.73', 'timestamp': 1670329826.5581508, 'message': 'Dec 6 14:30:24 hqnl0246134 sshd[221894]: pam_imunify(sshd:auth): [IM360_RBL] The IP 179.61.251.73 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 14:30:26,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '179.61.251.73', 'timestamp': 1670329826.5583673, 'message': 'Dec 6 14:30:24 hqnl0246134 sshd[221894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.61.251.73 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 14:30:26,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '179.61.251.73', 'timestamp': 1670329826.5584738, 'message': 'Dec 6 14:30:26 hqnl0246134 sshd[221894]: Failed password for invalid user oracle from 179.61.251.73 port 44822 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 14:30:26,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '179.61.251.73', 'timestamp': 1670329826.5585885, 'message': 'Dec 6 14:30:26 hqnl0246134 sshd[221894]: Disconnected from invalid user oracle 179.61.251.73 port 44822 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 14:30:29,752] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:30:29,752] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:30:29,760] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:30:29,777] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0242 seconds
INFO [2022-12-06 14:30:44,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329844.5735095, 'message': 'Dec 6 14:30:42 hqnl0246134 sshd[221920]: Invalid user tool from 164.90.231.253 port 34234', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 14:30:44,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329844.575238, 'message': 'Dec 6 14:30:42 hqnl0246134 sshd[221920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.90.231.253 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 14:30:44,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329844.5754464, 'message': 'Dec 6 14:30:42 hqnl0246134 sshd[221920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.231.253 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 14:30:44,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329844.575633, 'message': 'Dec 6 14:30:44 hqnl0246134 sshd[221920]: Failed password for invalid user tool from 164.90.231.253 port 34234 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 14:30:46,408] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:30:46,409] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:30:46,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.90.231.253', 'timestamp': 1670329846.5739179, 'message': 'Dec 6 14:30:45 hqnl0246134 sshd[221920]: Disconnected from invalid user tool 164.90.231.253 port 34234 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0283 seconds
WARNING [2022-12-06 14:30:54,743] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:30:54,781] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0532 seconds
INFO [2022-12-06 14:31:08,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329868.609271, 'message': 'Dec 6 14:31:08 hqnl0246134 sshd[221942]: Invalid user ftpuser from 178.128.73.254 port 35796', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 14:31:08,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329868.6097817, 'message': 'Dec 6 14:31:08 hqnl0246134 sshd[221942]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.73.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 14:31:08,676] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329868.6099644, 'message': 'Dec 6 14:31:08 hqnl0246134 sshd[221942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.73.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 14:31:12,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329872.61276, 'message': 'Dec 6 14:31:10 hqnl0246134 sshd[221942]: Failed password for invalid user ftpuser from 178.128.73.254 port 35796 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 14:31:12,651] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.73.254', 'timestamp': 1670329872.61309, 'message': 'Dec 6 14:31:11 hqnl0246134 sshd[221942]: Disconnected from invalid user ftpuser 178.128.73.254 port 35796 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 14:31:16,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '71.238.230.5', 'timestamp': 1670329876.6164093, 'message': 'Dec 6 14:31:15 hqnl0246134 sshd[221948]: Invalid user share from 71.238.230.5 port 57700', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 14:31:16,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '71.238.230.5', 'timestamp': 1670329876.6166987, 'message': 'Dec 6 14:31:15 hqnl0246134 sshd[221948]: pam_imunify(sshd:auth): [IM360_RBL] The IP 71.238.230.5 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 14:31:16,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '71.238.230.5', 'timestamp': 1670329876.6168485, 'message': 'Dec 6 14:31:15 hqnl0246134 sshd[221948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.238.230.5 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 14:31:17,998] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:31:17,999] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:31:18,006] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:31:18,019] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 14:31:18,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '71.238.230.5', 'timestamp': 1670329878.6175401, 'message': 'Dec 6 14:31:18 hqnl0246134 sshd[221948]: Failed password for invalid user share from 71.238.230.5 port 57700 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 14:31:20,634] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:31:20,634] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:31:20,645] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:31:20,666] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0315 seconds
INFO [2022-12-06 14:31:20,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '71.238.230.5', 'timestamp': 1670329880.6357405, 'message': 'Dec 6 14:31:19 hqnl0246134 sshd[221948]: Disconnected from invalid user share 71.238.230.5 port 57700 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0312 seconds
WARNING [2022-12-06 14:31:46,414] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:31:46,415] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:31:53,299] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 14:31:54,739] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:31:54,761] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0304 seconds
INFO [2022-12-06 14:32:02,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.154.75.210', 'timestamp': 1670329922.6878028, 'message': 'Dec 6 14:32:02 hqnl0246134 sshd[221993]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.154.75.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 14:32:02,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.154.75.210', 'timestamp': 1670329922.6882706, 'message': 'Dec 6 14:32:02 hqnl0246134 sshd[221993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.75.210 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 14:32:04,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.142.20', 'timestamp': 1670329924.6896365, 'message': 'Dec 6 14:32:04 hqnl0246134 sshd[222003]: Invalid user test from 167.172.142.20 port 33936', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 14:32:04,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.142.20', 'timestamp': 1670329924.6899931, 'message': 'Dec 6 14:32:04 hqnl0246134 sshd[222003]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.142.20 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:32:04,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.142.20', 'timestamp': 1670329924.6901867, 'message': 'Dec 6 14:32:04 hqnl0246134 sshd[222003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.142.20 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 14:32:06,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.154.75.210', 'timestamp': 1670329926.6900926, 'message': 'Dec 6 14:32:05 hqnl0246134 sshd[221993]: Failed password for root from 43.154.75.210 port 30796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0383 seconds
INFO [2022-12-06 14:32:06,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.142.20', 'timestamp': 1670329926.6926303, 'message': 'Dec 6 14:32:05 hqnl0246134 sshd[222003]: Failed password for invalid user test from 167.172.142.20 port 33936 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 14:32:06,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.142.20', 'timestamp': 1670329926.6927695, 'message': 'Dec 6 14:32:06 hqnl0246134 sshd[222003]: Disconnected from invalid user test 167.172.142.20 port 33936 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 14:32:09,175] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:32:09,176] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:32:09,183] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:32:09,195] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 14:32:17,739] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:32:17,739] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:32:17,749] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:32:17,763] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0229 seconds
INFO [2022-12-06 14:32:20,513] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:32:20,514] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:32:20,522] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:32:20,534] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 14:32:24,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.246.239.141', 'timestamp': 1670329944.712886, 'message': 'Dec 6 14:32:22 hqnl0246134 sshd[222021]: Invalid user iptv from 115.246.239.141 port 45674', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 14:32:24,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.246.239.141', 'timestamp': 1670329944.7132704, 'message': 'Dec 6 14:32:22 hqnl0246134 sshd[222021]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.246.239.141 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 14:32:24,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.246.239.141', 'timestamp': 1670329944.7134712, 'message': 'Dec 6 14:32:22 hqnl0246134 sshd[222021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.246.239.141 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 14:32:24,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.246.239.141', 'timestamp': 1670329944.7136347, 'message': 'Dec 6 14:32:24 hqnl0246134 sshd[222021]: Failed password for invalid user iptv from 115.246.239.141 port 45674 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 14:32:26,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.246.239.141', 'timestamp': 1670329946.71169, 'message': 'Dec 6 14:32:25 hqnl0246134 sshd[222021]: Disconnected from invalid user iptv 115.246.239.141 port 45674 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
WARNING [2022-12-06 14:32:46,421] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:32:46,421] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:32:54,843] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:32:54,883] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.1397 seconds
INFO [2022-12-06 14:33:14,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.158.153.66', 'timestamp': 1670329994.7701318, 'message': 'Dec 6 14:33:13 hqnl0246134 sshd[222057]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.158.153.66 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 14:33:14,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.158.153.66', 'timestamp': 1670329994.770886, 'message': 'Dec 6 14:33:13 hqnl0246134 sshd[222057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.153.66 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 14:33:16,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.158.153.66', 'timestamp': 1670329996.770017, 'message': 'Dec 6 14:33:15 hqnl0246134 sshd[222057]: Failed password for root from 51.158.153.66 port 37218 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 14:33:17,850] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:33:17,851] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:33:17,861] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:33:17,873] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 14:33:18,261] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:33:18,262] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:33:18,270] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:33:18,282] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 14:33:20,457] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:33:20,458] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:33:20,465] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:33:20,476] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 14:33:20,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.90.231.253', 'timestamp': 1670330000.774015, 'message': 'Dec 6 14:33:19 hqnl0246134 sshd[222071]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.90.231.253 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 14:33:20,827] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.90.231.253', 'timestamp': 1670330000.7741985, 'message': 'Dec 6 14:33:19 hqnl0246134 sshd[222071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.231.253 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 14:33:22,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '164.90.231.253', 'timestamp': 1670330002.7781763, 'message': 'Dec 6 14:33:21 hqnl0246134 sshd[222071]: Failed password for root from 164.90.231.253 port 51816 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 14:33:26,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '179.61.251.73', 'timestamp': 1670330006.782324, 'message': 'Dec 6 14:33:24 hqnl0246134 sshd[222078]: pam_imunify(sshd:auth): [IM360_RBL] The IP 179.61.251.73 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 14:33:26,825] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '179.61.251.73', 'timestamp': 1670330006.7826343, 'message': 'Dec 6 14:33:24 hqnl0246134 sshd[222078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.61.251.73 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 14:33:26,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '179.61.251.73', 'timestamp': 1670330006.7828143, 'message': 'Dec 6 14:33:26 hqnl0246134 sshd[222078]: Failed password for root from 179.61.251.73 port 36018 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 14:33:46,425] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:33:46,426] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:33:46,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330026.8062866, 'message': 'Dec 6 14:33:46 hqnl0246134 sshd[222093]: Invalid user julius from 41.73.252.229 port 51544', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 14:33:46,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330026.8065042, 'message': 'Dec 6 14:33:46 hqnl0246134 sshd[222093]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.73.252.229 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:33:46,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330026.806657, 'message': 'Dec 6 14:33:46 hqnl0246134 sshd[222093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.73.252.229 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 14:33:48,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330028.8096402, 'message': 'Dec 6 14:33:48 hqnl0246134 sshd[222093]: Failed password for invalid user julius from 41.73.252.229 port 51544 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 14:33:48,849] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330028.8098333, 'message': 'Dec 6 14:33:48 hqnl0246134 sshd[222093]: Disconnected from invalid user julius 41.73.252.229 port 51544 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
WARNING [2022-12-06 14:33:54,753] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:33:54,775] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0294 seconds
INFO [2022-12-06 14:33:54,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330034.8194845, 'message': 'Dec 6 14:33:53 hqnl0246134 sshd[222097]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.10.125.209 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0463 seconds
INFO [2022-12-06 14:33:54,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '209.141.46.19', 'timestamp': 1670330034.8198566, 'message': 'Dec 6 14:33:53 hqnl0246134 sshd[222101]: pam_imunify(sshd:auth): [IM360_RBL] The IP 209.141.46.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0471 seconds
INFO [2022-12-06 14:33:54,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '161.82.233.183', 'timestamp': 1670330034.8201463, 'message': 'Dec 6 14:33:54 hqnl0246134 sshd[222100]: pam_imunify(sshd:auth): [IM360_RBL] The IP 161.82.233.183 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0471 seconds
INFO [2022-12-06 14:33:54,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330034.819678, 'message': 'Dec 6 14:33:53 hqnl0246134 sshd[222097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0473 seconds
INFO [2022-12-06 14:33:54,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '209.141.46.19', 'timestamp': 1670330034.820009, 'message': 'Dec 6 14:33:53 hqnl0246134 sshd[222101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.46.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 14:33:54,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '161.82.233.183', 'timestamp': 1670330034.8202684, 'message': 'Dec 6 14:33:54 hqnl0246134 sshd[222100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.82.233.183 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0473 seconds
INFO [2022-12-06 14:33:56,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330036.821511, 'message': 'Dec 6 14:33:55 hqnl0246134 sshd[222097]: Failed password for root from 186.10.125.209 port 27105 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0658 seconds
INFO [2022-12-06 14:33:56,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '209.141.46.19', 'timestamp': 1670330036.822075, 'message': 'Dec 6 14:33:56 hqnl0246134 sshd[222101]: Failed password for root from 209.141.46.19 port 49708 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0660 seconds
INFO [2022-12-06 14:33:56,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '161.82.233.183', 'timestamp': 1670330036.8223042, 'message': 'Dec 6 14:33:56 hqnl0246134 sshd[222100]: Failed password for root from 161.82.233.183 port 45226 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0654 seconds
INFO [2022-12-06 14:34:08,855] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '71.238.230.5', 'timestamp': 1670330048.8340418, 'message': 'Dec 6 14:34:07 hqnl0246134 sshd[222124]: pam_imunify(sshd:auth): [IM360_RBL] The IP 71.238.230.5 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 14:34:08,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '71.238.230.5', 'timestamp': 1670330048.8343635, 'message': 'Dec 6 14:34:07 hqnl0246134 sshd[222124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.238.230.5 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 14:34:10,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '71.238.230.5', 'timestamp': 1670330050.8377213, 'message': 'Dec 6 14:34:09 hqnl0246134 sshd[222124]: Failed password for root from 71.238.230.5 port 57924 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 14:34:18,137] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:34:18,138] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:34:18,151] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:34:18,169] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0294 seconds
INFO [2022-12-06 14:34:21,042] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:34:21,042] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:34:21,050] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:34:21,065] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 14:34:38,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330078.8777947, 'message': 'Dec 6 14:34:38 hqnl0246134 sshd[222151]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 14:34:38,922] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330078.8782177, 'message': 'Dec 6 14:34:38 hqnl0246134 sshd[222151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 14:34:42,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330082.877765, 'message': 'Dec 6 14:34:40 hqnl0246134 sshd[222151]: Failed password for root from 61.177.172.19 port 28305 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 14:34:44,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330084.8816314, 'message': 'Dec 6 14:34:42 hqnl0246134 sshd[222151]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
WARNING [2022-12-06 14:34:46,428] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:34:46,429] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:34:46,901] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330086.884464, 'message': 'Dec 6 14:34:45 hqnl0246134 sshd[222151]: Failed password for root from 61.177.172.19 port 28305 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 14:34:48,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330088.887326, 'message': 'Dec 6 14:34:47 hqnl0246134 sshd[222151]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 14:34:50,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330090.890405, 'message': 'Dec 6 14:34:49 hqnl0246134 sshd[222151]: Failed password for root from 61.177.172.19 port 28305 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 14:34:54,177] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:34:54,178] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:34:54,185] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:34:54,197] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
WARNING [2022-12-06 14:34:54,757] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:34:54,787] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0377 seconds
INFO [2022-12-06 14:34:54,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330094.895369, 'message': 'Dec 6 14:34:53 hqnl0246134 sshd[222156]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 14:34:54,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330094.8955574, 'message': 'Dec 6 14:34:53 hqnl0246134 sshd[222156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 14:34:56,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330096.8969772, 'message': 'Dec 6 14:34:55 hqnl0246134 sshd[222156]: Failed password for root from 61.177.172.19 port 35545 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-06 14:34:58,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.142.20', 'timestamp': 1670330098.8981907, 'message': 'Dec 6 14:34:57 hqnl0246134 sshd[222169]: Invalid user dummy from 167.172.142.20 port 52236', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0360 seconds
INFO [2022-12-06 14:34:58,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330098.8987615, 'message': 'Dec 6 14:34:57 hqnl0246134 sshd[222156]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 14:34:58,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.142.20', 'timestamp': 1670330098.8984032, 'message': 'Dec 6 14:34:57 hqnl0246134 sshd[222169]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.142.20 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 14:34:58,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.142.20', 'timestamp': 1670330098.8985882, 'message': 'Dec 6 14:34:57 hqnl0246134 sshd[222169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.142.20 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 14:35:00,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.142.20', 'timestamp': 1670330100.900376, 'message': 'Dec 6 14:34:59 hqnl0246134 sshd[222169]: Failed password for invalid user dummy from 167.172.142.20 port 52236 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 14:35:00,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330100.9005532, 'message': 'Dec 6 14:35:00 hqnl0246134 sshd[222156]: Failed password for root from 61.177.172.19 port 35545 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 14:35:00,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.142.20', 'timestamp': 1670330100.9006958, 'message': 'Dec 6 14:35:00 hqnl0246134 sshd[222169]: Disconnected from invalid user dummy 167.172.142.20 port 52236 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 14:35:02,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330102.9024773, 'message': 'Dec 6 14:35:02 hqnl0246134 sshd[222156]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 14:35:04,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330104.9050002, 'message': 'Dec 6 14:35:04 hqnl0246134 sshd[222156]: Failed password for root from 61.177.172.19 port 35545 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 14:35:06,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.154.75.210', 'timestamp': 1670330106.9081933, 'message': 'Dec 6 14:35:05 hqnl0246134 sshd[222190]: Invalid user ubuntu from 43.154.75.210 port 31002', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 14:35:06,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.154.75.210', 'timestamp': 1670330106.9085035, 'message': 'Dec 6 14:35:05 hqnl0246134 sshd[222190]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.154.75.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 14:35:06,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.154.75.210', 'timestamp': 1670330106.9087074, 'message': 'Dec 6 14:35:05 hqnl0246134 sshd[222190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.75.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 14:35:08,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.154.75.210', 'timestamp': 1670330108.9116297, 'message': 'Dec 6 14:35:07 hqnl0246134 sshd[222190]: Failed password for invalid user ubuntu from 43.154.75.210 port 31002 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 14:35:08,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.165.247.254', 'timestamp': 1670330108.9119542, 'message': 'Dec 6 14:35:08 hqnl0246134 sshd[222198]: Invalid user testftp from 122.165.247.254 port 50989', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 14:35:08,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.165.247.254', 'timestamp': 1670330108.9121897, 'message': 'Dec 6 14:35:08 hqnl0246134 sshd[222198]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.165.247.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 14:35:08,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.165.247.254', 'timestamp': 1670330108.9125483, 'message': 'Dec 6 14:35:08 hqnl0246134 sshd[222198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.247.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 14:35:10,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330110.9136188, 'message': 'Dec 6 14:35:09 hqnl0246134 sshd[222192]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0662 seconds
INFO [2022-12-06 14:35:10,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.154.75.210', 'timestamp': 1670330110.9141674, 'message': 'Dec 6 14:35:10 hqnl0246134 sshd[222190]: Disconnected from invalid user ubuntu 43.154.75.210 port 31002 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0661 seconds
INFO [2022-12-06 14:35:10,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.165.247.254', 'timestamp': 1670330110.914354, 'message': 'Dec 6 14:35:10 hqnl0246134 sshd[222198]: Failed password for invalid user testftp from 122.165.247.254 port 50989 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0653 seconds
INFO [2022-12-06 14:35:11,000] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330110.9139154, 'message': 'Dec 6 14:35:09 hqnl0246134 sshd[222192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 14:35:12,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.165.247.254', 'timestamp': 1670330112.9154255, 'message': 'Dec 6 14:35:11 hqnl0246134 sshd[222198]: Disconnected from invalid user testftp 122.165.247.254 port 50989 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 14:35:12,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330112.9156034, 'message': 'Dec 6 14:35:11 hqnl0246134 sshd[222192]: Failed password for root from 61.177.172.19 port 35691 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 14:35:14,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330114.9179792, 'message': 'Dec 6 14:35:13 hqnl0246134 sshd[222192]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 14:35:16,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330116.9215345, 'message': 'Dec 6 14:35:15 hqnl0246134 sshd[222192]: Failed password for root from 61.177.172.19 port 35691 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 14:35:16,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330116.9219344, 'message': 'Dec 6 14:35:16 hqnl0246134 sshd[222192]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 14:35:17,975] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:35:17,976] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:35:17,984] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:35:17,998] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 14:35:18,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330118.92405, 'message': 'Dec 6 14:35:18 hqnl0246134 sshd[222192]: Failed password for root from 61.177.172.19 port 35691 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 14:35:20,805] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:35:20,806] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:35:20,814] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:35:20,825] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 14:35:22,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330122.928065, 'message': 'Dec 6 14:35:22 hqnl0246134 sshd[222219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 14:35:22,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330122.9284256, 'message': 'Dec 6 14:35:22 hqnl0246134 sshd[222219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 14:35:26,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330126.9325333, 'message': 'Dec 6 14:35:25 hqnl0246134 sshd[222219]: Failed password for root from 61.177.172.19 port 35581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 14:35:28,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330128.933613, 'message': 'Dec 6 14:35:27 hqnl0246134 sshd[222219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 14:35:30,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330130.9389286, 'message': 'Dec 6 14:35:29 hqnl0246134 sshd[222219]: Failed password for root from 61.177.172.19 port 35581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 14:35:32,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330132.9438531, 'message': 'Dec 6 14:35:31 hqnl0246134 sshd[222219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 14:35:34,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330134.945563, 'message': 'Dec 6 14:35:33 hqnl0246134 sshd[222219]: Failed password for root from 61.177.172.19 port 35581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 14:35:46,433] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:35:46,434] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:35:46,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.246.239.141', 'timestamp': 1670330146.9578433, 'message': 'Dec 6 14:35:45 hqnl0246134 sshd[222235]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.246.239.141 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 14:35:47,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.246.239.141', 'timestamp': 1670330146.9580638, 'message': 'Dec 6 14:35:45 hqnl0246134 sshd[222235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.246.239.141 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 14:35:48,995] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '115.246.239.141', 'timestamp': 1670330148.9630692, 'message': 'Dec 6 14:35:47 hqnl0246134 sshd[222235]: Failed password for root from 115.246.239.141 port 35188 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
WARNING [2022-12-06 14:35:54,762] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:35:54,790] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0370 seconds
INFO [2022-12-06 14:36:05,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330164.9827304, 'message': 'Dec 6 14:36:03 hqnl0246134 sshd[222257]: Invalid user guest from 43.153.15.64 port 45648', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 14:36:05,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330164.9831965, 'message': 'Dec 6 14:36:03 hqnl0246134 sshd[222257]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.15.64 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 14:36:05,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330164.98335, 'message': 'Dec 6 14:36:03 hqnl0246134 sshd[222257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.15.64 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 14:36:07,156] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330167.1373215, 'message': 'Dec 6 14:36:05 hqnl0246134 sshd[222257]: Failed password for invalid user guest from 43.153.15.64 port 45648 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 14:36:07,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330167.1375637, 'message': 'Dec 6 14:36:06 hqnl0246134 sshd[222257]: Disconnected from invalid user guest 43.153.15.64 port 45648 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 14:36:09,295] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:36:09,296] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:36:09,303] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:36:09,314] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 14:36:17,844] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:36:17,844] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:36:17,851] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:36:17,863] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 14:36:20,647] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:36:20,648] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:36:20,655] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:36:20,667] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 14:36:29,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '179.61.251.73', 'timestamp': 1670330189.0143924, 'message': 'Dec 6 14:36:28 hqnl0246134 sshd[222297]: Invalid user webmaster from 179.61.251.73 port 55442', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 14:36:29,058] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '179.61.251.73', 'timestamp': 1670330189.014954, 'message': 'Dec 6 14:36:28 hqnl0246134 sshd[222297]: pam_imunify(sshd:auth): [IM360_RBL] The IP 179.61.251.73 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 14:36:29,076] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '179.61.251.73', 'timestamp': 1670330189.015122, 'message': 'Dec 6 14:36:28 hqnl0246134 sshd[222297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.61.251.73 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 14:36:31,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '179.61.251.73', 'timestamp': 1670330191.0154443, 'message': 'Dec 6 14:36:29 hqnl0246134 sshd[222297]: Failed password for invalid user webmaster from 179.61.251.73 port 55442 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 14:36:31,051] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '179.61.251.73', 'timestamp': 1670330191.0156946, 'message': 'Dec 6 14:36:29 hqnl0246134 sshd[222297]: Disconnected from invalid user webmaster 179.61.251.73 port 55442 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 14:36:41,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670330201.0289364, 'message': 'Dec 6 14:36:40 hqnl0246134 sshd[222302]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0512 seconds
INFO [2022-12-06 14:36:41,083] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '209.141.46.19', 'timestamp': 1670330201.0295, 'message': 'Dec 6 14:36:40 hqnl0246134 sshd[222304]: Invalid user oracle from 209.141.46.19 port 56010', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-06 14:36:41,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670330201.029348, 'message': 'Dec 6 14:36:40 hqnl0246134 sshd[222302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 14:36:41,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '209.141.46.19', 'timestamp': 1670330201.029757, 'message': 'Dec 6 14:36:41 hqnl0246134 sshd[222304]: pam_imunify(sshd:auth): [IM360_RBL] The IP 209.141.46.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 14:36:41,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '209.141.46.19', 'timestamp': 1670330201.0299222, 'message': 'Dec 6 14:36:41 hqnl0246134 sshd[222304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.46.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 14:36:43,079] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670330203.0302658, 'message': 'Dec 6 14:36:42 hqnl0246134 sshd[222302]: Failed password for root from 61.177.173.52 port 39043 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0488 seconds
INFO [2022-12-06 14:36:43,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '209.141.46.19', 'timestamp': 1670330203.0304992, 'message': 'Dec 6 14:36:42 hqnl0246134 sshd[222304]: Failed password for invalid user oracle from 209.141.46.19 port 56010 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0499 seconds
INFO [2022-12-06 14:36:43,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670330203.030803, 'message': 'Dec 6 14:36:42 hqnl0246134 sshd[222302]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0408 seconds
INFO [2022-12-06 14:36:43,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '209.141.46.19', 'timestamp': 1670330203.030654, 'message': 'Dec 6 14:36:42 hqnl0246134 sshd[222304]: Disconnected from invalid user oracle 209.141.46.19 port 56010 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0403 seconds
WARNING [2022-12-06 14:36:46,437] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:36:46,438] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:36:47,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670330207.035358, 'message': 'Dec 6 14:36:45 hqnl0246134 sshd[222302]: Failed password for root from 61.177.173.52 port 39043 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 14:36:50,503] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 14:36:50,571] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 14:36:50,572] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 14:36:50,572] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 14:36:50,572] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 14:36:50,572] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 14:36:50,582] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 14:36:50,600] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0276 seconds
WARNING [2022-12-06 14:36:50,607] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 14:36:50,609] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:36:50,634] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0384 seconds
INFO [2022-12-06 14:36:50,635] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0369 seconds
INFO [2022-12-06 14:36:53,068] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330213.0445685, 'message': 'Dec 6 14:36:52 hqnl0246134 sshd[222307]: Invalid user jiayu from 164.92.117.121 port 56006', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 14:36:53,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330213.0449796, 'message': 'Dec 6 14:36:52 hqnl0246134 sshd[222307]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.92.117.121 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 14:36:53,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330213.045122, 'message': 'Dec 6 14:36:52 hqnl0246134 sshd[222307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.117.121 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 14:36:54,764] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:36:54,789] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0320 seconds
INFO [2022-12-06 14:36:55,079] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330215.0485303, 'message': 'Dec 6 14:36:53 hqnl0246134 sshd[222307]: Failed password for invalid user jiayu from 164.92.117.121 port 56006 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 14:36:55,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '71.238.230.5', 'timestamp': 1670330215.0489962, 'message': 'Dec 6 14:36:54 hqnl0246134 sshd[222317]: Invalid user testuser1 from 71.238.230.5 port 58148', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 14:36:55,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330215.0487351, 'message': 'Dec 6 14:36:54 hqnl0246134 sshd[222307]: Disconnected from invalid user jiayu 164.92.117.121 port 56006 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 14:36:55,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '71.238.230.5', 'timestamp': 1670330215.0494137, 'message': 'Dec 6 14:36:54 hqnl0246134 sshd[222317]: pam_imunify(sshd:auth): [IM360_RBL] The IP 71.238.230.5 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 14:36:55,129] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '71.238.230.5', 'timestamp': 1670330215.0499249, 'message': 'Dec 6 14:36:54 hqnl0246134 sshd[222317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.238.230.5 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 14:36:57,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '71.238.230.5', 'timestamp': 1670330217.0516486, 'message': 'Dec 6 14:36:56 hqnl0246134 sshd[222317]: Failed password for invalid user testuser1 from 71.238.230.5 port 58148 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 14:36:59,082] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '71.238.230.5', 'timestamp': 1670330219.05368, 'message': 'Dec 6 14:36:58 hqnl0246134 sshd[222317]: Disconnected from invalid user testuser1 71.238.230.5 port 58148 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 14:37:17,749] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:37:17,749] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:37:17,757] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:37:17,768] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 14:37:20,561] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:37:20,562] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:37:20,569] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:37:20,581] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 14:37:21,984] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 14:37:21,984] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 14:37:21,985] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 14:37:25,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330245.0862794, 'message': 'Dec 6 14:37:24 hqnl0246134 sshd[222353]: Invalid user aaa from 186.10.125.209 port 25939', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 14:37:25,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330245.0865383, 'message': 'Dec 6 14:37:24 hqnl0246134 sshd[222353]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.10.125.209 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 14:37:25,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330245.086819, 'message': 'Dec 6 14:37:24 hqnl0246134 sshd[222353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 14:37:27,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330247.0869672, 'message': 'Dec 6 14:37:26 hqnl0246134 sshd[222353]: Failed password for invalid user aaa from 186.10.125.209 port 25939 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 14:37:29,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330249.0901859, 'message': 'Dec 6 14:37:28 hqnl0246134 sshd[222353]: Disconnected from invalid user aaa 186.10.125.209 port 25939 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 14:37:29,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330249.0904098, 'message': 'Dec 6 14:37:28 hqnl0246134 sshd[222363]: Invalid user leonardo from 41.73.252.229 port 40716', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 14:37:29,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330249.090602, 'message': 'Dec 6 14:37:28 hqnl0246134 sshd[222363]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.73.252.229 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 14:37:29,157] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330249.0907605, 'message': 'Dec 6 14:37:28 hqnl0246134 sshd[222363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.73.252.229 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 14:37:31,129] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330251.0975997, 'message': 'Dec 6 14:37:30 hqnl0246134 sshd[222363]: Failed password for invalid user leonardo from 41.73.252.229 port 40716 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 14:37:33,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330253.09776, 'message': 'Dec 6 14:37:32 hqnl0246134 sshd[222363]: Disconnected from invalid user leonardo 41.73.252.229 port 40716 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 14:37:34,671] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:37:34,671] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:37:34,679] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:37:34,692] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 14:37:45,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.36.14.101', 'timestamp': 1670330265.1248007, 'message': 'Dec 6 14:37:43 hqnl0246134 sshd[222374]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.36.14.101 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 14:37:45,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.36.14.101', 'timestamp': 1670330265.1256015, 'message': 'Dec 6 14:37:43 hqnl0246134 sshd[222374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.36.14.101 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0256 seconds
WARNING [2022-12-06 14:37:46,443] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:37:46,444] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:37:47,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '177.36.14.101', 'timestamp': 1670330267.1227937, 'message': 'Dec 6 14:37:45 hqnl0246134 sshd[222374]: Failed password for root from 177.36.14.101 port 56269 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0416 seconds
INFO [2022-12-06 14:37:47,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.142.20', 'timestamp': 1670330267.1230543, 'message': 'Dec 6 14:37:47 hqnl0246134 sshd[222379]: Invalid user solr from 167.172.142.20 port 42286', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-06 14:37:47,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.142.20', 'timestamp': 1670330267.123195, 'message': 'Dec 6 14:37:47 hqnl0246134 sshd[222379]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.142.20 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 14:37:47,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.142.20', 'timestamp': 1670330267.123434, 'message': 'Dec 6 14:37:47 hqnl0246134 sshd[222379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.142.20 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 14:37:49,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.142.20', 'timestamp': 1670330269.1246629, 'message': 'Dec 6 14:37:48 hqnl0246134 sshd[222379]: Failed password for invalid user solr from 167.172.142.20 port 42286 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 14:37:51,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.142.20', 'timestamp': 1670330271.1260045, 'message': 'Dec 6 14:37:49 hqnl0246134 sshd[222379]: Disconnected from invalid user solr 167.172.142.20 port 42286 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
WARNING [2022-12-06 14:37:54,767] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:37:54,798] defence360agent.internals.the_sink: SensorIncidentList(<16 item(s)>) processed in 0.0392 seconds
INFO [2022-12-06 14:38:11,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330291.1638436, 'message': 'Dec 6 14:38:09 hqnl0246134 sshd[222406]: Invalid user pc from 87.219.167.66 port 42154', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 14:38:11,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330291.1642275, 'message': 'Dec 6 14:38:10 hqnl0246134 sshd[222406]: pam_imunify(sshd:auth): [IM360_RBL] The IP 87.219.167.66 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 14:38:11,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330291.1644266, 'message': 'Dec 6 14:38:10 hqnl0246134 sshd[222406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.219.167.66 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 14:38:13,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330293.1682692, 'message': 'Dec 6 14:38:11 hqnl0246134 sshd[222406]: Failed password for invalid user pc from 87.219.167.66 port 42154 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 14:38:15,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330295.1729128, 'message': 'Dec 6 14:38:13 hqnl0246134 sshd[222406]: Disconnected from invalid user pc 87.219.167.66 port 42154 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 14:38:17,951] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:38:17,952] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:38:17,963] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:38:17,982] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0294 seconds
INFO [2022-12-06 14:38:20,931] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:38:20,931] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:38:20,938] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:38:20,949] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-06 14:38:29,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330309.1977258, 'message': 'Dec 6 14:38:28 hqnl0246134 sshd[222431]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0394 seconds
INFO [2022-12-06 14:38:29,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330309.198687, 'message': 'Dec 6 14:38:28 hqnl0246134 sshd[222431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 14:38:31,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330311.1987512, 'message': 'Dec 6 14:38:30 hqnl0246134 sshd[222431]: Failed password for root from 61.177.173.35 port 10122 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 14:38:33,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330313.205696, 'message': 'Dec 6 14:38:32 hqnl0246134 sshd[222431]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 14:38:35,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330315.2106366, 'message': 'Dec 6 14:38:34 hqnl0246134 sshd[222431]: Failed password for root from 61.177.173.35 port 10122 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 14:38:35,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330315.2109108, 'message': 'Dec 6 14:38:34 hqnl0246134 sshd[222431]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 14:38:37,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.154.248.181', 'timestamp': 1670330317.214608, 'message': 'Dec 6 14:38:35 hqnl0246134 sshd[222433]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.154.248.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 14:38:37,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330317.2150943, 'message': 'Dec 6 14:38:36 hqnl0246134 sshd[222431]: Failed password for root from 61.177.173.35 port 10122 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0441 seconds
INFO [2022-12-06 14:38:37,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.154.248.181', 'timestamp': 1670330317.214945, 'message': 'Dec 6 14:38:35 hqnl0246134 sshd[222433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.154.248.181 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 14:38:37,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.154.248.181', 'timestamp': 1670330317.2152448, 'message': 'Dec 6 14:38:36 hqnl0246134 sshd[222433]: Failed password for root from 36.154.248.181 port 48242 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 14:38:41,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330321.2196813, 'message': 'Dec 6 14:38:40 hqnl0246134 sshd[222436]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 14:38:41,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330321.220095, 'message': 'Dec 6 14:38:40 hqnl0246134 sshd[222436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 14:38:43,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330323.2216067, 'message': 'Dec 6 14:38:41 hqnl0246134 sshd[222436]: Failed password for root from 61.177.173.35 port 32721 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 14:38:43,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330323.221935, 'message': 'Dec 6 14:38:42 hqnl0246134 sshd[222436]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 14:38:45,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330325.224141, 'message': 'Dec 6 14:38:44 hqnl0246134 sshd[222436]: Failed password for root from 61.177.173.35 port 32721 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 14:38:45,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330325.2244453, 'message': 'Dec 6 14:38:44 hqnl0246134 sshd[222436]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-06 14:38:46,447] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:38:46,449] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:38:47,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330327.2257185, 'message': 'Dec 6 14:38:47 hqnl0246134 sshd[222436]: Failed password for root from 61.177.173.35 port 32721 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 14:38:51,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330331.2307227, 'message': 'Dec 6 14:38:50 hqnl0246134 sshd[222444]: Invalid user VM from 43.153.15.64 port 53072', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-06 14:38:51,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330331.231173, 'message': 'Dec 6 14:38:50 hqnl0246134 sshd[222442]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0413 seconds
INFO [2022-12-06 14:38:51,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330331.230909, 'message': 'Dec 6 14:38:50 hqnl0246134 sshd[222444]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.15.64 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0582 seconds
INFO [2022-12-06 14:38:51,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330331.2312906, 'message': 'Dec 6 14:38:50 hqnl0246134 sshd[222442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0566 seconds
INFO [2022-12-06 14:38:51,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330331.2310212, 'message': 'Dec 6 14:38:50 hqnl0246134 sshd[222444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.15.64 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 14:38:51,936] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:38:51,936] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:38:51,944] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:38:51,956] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 14:38:53,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330333.2316887, 'message': 'Dec 6 14:38:52 hqnl0246134 sshd[222444]: Failed password for invalid user VM from 43.153.15.64 port 53072 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 14:38:53,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330333.231936, 'message': 'Dec 6 14:38:52 hqnl0246134 sshd[222442]: Failed password for root from 61.177.173.35 port 14133 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 14:38:53,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330333.2320495, 'message': 'Dec 6 14:38:53 hqnl0246134 sshd[222442]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 14:38:54,771] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:38:54,802] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0388 seconds
INFO [2022-12-06 14:38:55,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330335.2368128, 'message': 'Dec 6 14:38:54 hqnl0246134 sshd[222444]: Disconnected from invalid user VM 43.153.15.64 port 53072 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 14:38:55,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.246.239.141', 'timestamp': 1670330335.2370012, 'message': 'Dec 6 14:38:54 hqnl0246134 sshd[222449]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.246.239.141 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 14:38:55,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330335.2372217, 'message': 'Dec 6 14:38:54 hqnl0246134 sshd[222442]: Failed password for root from 61.177.173.35 port 14133 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0442 seconds
INFO [2022-12-06 14:38:55,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.246.239.141', 'timestamp': 1670330335.2371168, 'message': 'Dec 6 14:38:54 hqnl0246134 sshd[222449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.246.239.141 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 14:38:57,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330337.2413135, 'message': 'Dec 6 14:38:55 hqnl0246134 sshd[222442]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 14:38:57,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '115.246.239.141', 'timestamp': 1670330337.2417746, 'message': 'Dec 6 14:38:56 hqnl0246134 sshd[222449]: Failed password for root from 115.246.239.141 port 52940 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 14:38:57,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670330337.2419674, 'message': 'Dec 6 14:38:57 hqnl0246134 sshd[222442]: Failed password for root from 61.177.173.35 port 14133 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 14:39:18,082] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:39:18,082] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:39:18,089] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:39:18,101] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 14:39:20,812] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:39:20,812] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:39:20,821] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:39:20,834] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-06 14:39:21,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '209.141.46.19', 'timestamp': 1670330361.2691023, 'message': 'Dec 6 14:39:21 hqnl0246134 sshd[222604]: pam_imunify(sshd:auth): [IM360_RBL] The IP 209.141.46.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 14:39:21,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '209.141.46.19', 'timestamp': 1670330361.269505, 'message': 'Dec 6 14:39:21 hqnl0246134 sshd[222604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.46.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 14:39:23,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '209.141.46.19', 'timestamp': 1670330363.2699678, 'message': 'Dec 6 14:39:23 hqnl0246134 sshd[222604]: Failed password for root from 209.141.46.19 port 34076 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 14:39:41,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330381.290973, 'message': 'Dec 6 14:39:41 hqnl0246134 sshd[222617]: Invalid user scan from 164.92.117.121 port 56212', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 14:39:41,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330381.291521, 'message': 'Dec 6 14:39:41 hqnl0246134 sshd[222617]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.92.117.121 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 14:39:41,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330381.2916603, 'message': 'Dec 6 14:39:41 hqnl0246134 sshd[222617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.117.121 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 14:39:43,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330383.2927866, 'message': 'Dec 6 14:39:42 hqnl0246134 sshd[222617]: Failed password for invalid user scan from 164.92.117.121 port 56212 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 14:39:43,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330383.2930686, 'message': 'Dec 6 14:39:42 hqnl0246134 sshd[222617]: Disconnected from invalid user scan 164.92.117.121 port 56212 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 14:39:46,452] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:39:46,453] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:39:54,777] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:39:54,806] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0376 seconds
INFO [2022-12-06 14:40:13,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330413.333171, 'message': 'Dec 6 14:40:12 hqnl0246134 sshd[222662]: pam_imunify(sshd:auth): [IM360_RBL] The IP 87.219.167.66 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 14:40:13,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330413.3335404, 'message': 'Dec 6 14:40:12 hqnl0246134 sshd[222662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.219.167.66 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 14:40:15,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330415.3351736, 'message': 'Dec 6 14:40:13 hqnl0246134 sshd[222662]: Failed password for root from 87.219.167.66 port 35680 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 14:40:16,905] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:40:16,906] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:40:16,916] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:40:16,931] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0239 seconds
INFO [2022-12-06 14:40:17,883] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:40:17,884] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:40:17,895] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:40:17,911] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0262 seconds
INFO [2022-12-06 14:40:20,601] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:40:20,601] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:40:20,608] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:40:20,619] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 14:40:41,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330441.373669, 'message': 'Dec 6 14:40:40 hqnl0246134 sshd[222697]: Invalid user nexus from 186.10.125.209 port 5054', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 14:40:41,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330441.3742495, 'message': 'Dec 6 14:40:40 hqnl0246134 sshd[222697]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.10.125.209 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 14:40:41,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330441.3744016, 'message': 'Dec 6 14:40:40 hqnl0246134 sshd[222697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 14:40:43,392] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330443.3753915, 'message': 'Dec 6 14:40:42 hqnl0246134 sshd[222697]: Failed password for invalid user nexus from 186.10.125.209 port 5054 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 14:40:45,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330445.3793483, 'message': 'Dec 6 14:40:44 hqnl0246134 sshd[222697]: Disconnected from invalid user nexus 186.10.125.209 port 5054 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0239 seconds
WARNING [2022-12-06 14:40:46,458] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:40:46,459] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:40:54,789] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:40:54,817] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0383 seconds
INFO [2022-12-06 14:41:13,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330473.4061465, 'message': 'Dec 6 14:41:12 hqnl0246134 sshd[222721]: Invalid user albert123 from 41.73.252.229 port 58116', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 14:41:13,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330473.40647, 'message': 'Dec 6 14:41:12 hqnl0246134 sshd[222721]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.73.252.229 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 14:41:13,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330473.4066193, 'message': 'Dec 6 14:41:12 hqnl0246134 sshd[222721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.73.252.229 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 14:41:15,425] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330475.4058838, 'message': 'Dec 6 14:41:14 hqnl0246134 sshd[222721]: Failed password for invalid user albert123 from 41.73.252.229 port 58116 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 14:41:17,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.73.252.229', 'timestamp': 1670330477.4091675, 'message': 'Dec 6 14:41:16 hqnl0246134 sshd[222721]: Disconnected from invalid user albert123 41.73.252.229 port 58116 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:41:18,033] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:41:18,034] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:41:18,041] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:41:18,052] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 14:41:20,428] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 14:41:20,493] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 14:41:20,494] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 14:41:20,494] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 14:41:20,495] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 14:41:20,495] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 14:41:20,505] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 14:41:20,521] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0259 seconds
WARNING [2022-12-06 14:41:20,528] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 14:41:20,531] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:41:20,562] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0468 seconds
INFO [2022-12-06 14:41:20,564] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0456 seconds
INFO [2022-12-06 14:41:20,742] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:41:20,743] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:41:20,754] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:41:20,766] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-06 14:41:21,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330481.4149892, 'message': 'Dec 6 14:41:20 hqnl0246134 sshd[222731]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 14:41:21,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330481.4152598, 'message': 'Dec 6 14:41:20 hqnl0246134 sshd[222731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 14:41:23,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330483.418355, 'message': 'Dec 6 14:41:22 hqnl0246134 sshd[222731]: Failed password for root from 61.177.173.46 port 12903 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 14:41:25,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330485.4224482, 'message': 'Dec 6 14:41:24 hqnl0246134 sshd[222731]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 14:41:27,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330487.4242752, 'message': 'Dec 6 14:41:27 hqnl0246134 sshd[222731]: Failed password for root from 61.177.173.46 port 12903 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 14:41:29,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330489.4259598, 'message': 'Dec 6 14:41:29 hqnl0246134 sshd[222731]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 14:41:33,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330493.430981, 'message': 'Dec 6 14:41:31 hqnl0246134 sshd[222731]: Failed password for root from 61.177.173.46 port 12903 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 14:41:41,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330501.4446692, 'message': 'Dec 6 14:41:39 hqnl0246134 sshd[222748]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 14:41:41,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330501.4458058, 'message': 'Dec 6 14:41:39 hqnl0246134 sshd[222750]: Invalid user git from 43.153.15.64 port 56298', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 14:41:41,513] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330501.4456103, 'message': 'Dec 6 14:41:39 hqnl0246134 sshd[222748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 14:41:41,514] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330501.4459455, 'message': 'Dec 6 14:41:39 hqnl0246134 sshd[222750]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.15.64 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 14:41:41,531] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330501.4460733, 'message': 'Dec 6 14:41:39 hqnl0246134 sshd[222750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.15.64 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 14:41:43,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330503.4466722, 'message': 'Dec 6 14:41:41 hqnl0246134 sshd[222748]: Failed password for root from 61.177.173.46 port 17255 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 14:41:43,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330503.446898, 'message': 'Dec 6 14:41:41 hqnl0246134 sshd[222750]: Failed password for invalid user git from 43.153.15.64 port 56298 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 14:41:45,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.15.64', 'timestamp': 1670330505.4497519, 'message': 'Dec 6 14:41:43 hqnl0246134 sshd[222750]: Disconnected from invalid user git 43.153.15.64 port 56298 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 14:41:45,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330505.4501135, 'message': 'Dec 6 14:41:44 hqnl0246134 sshd[222748]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
WARNING [2022-12-06 14:41:46,464] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:41:46,465] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:41:47,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330507.4510565, 'message': 'Dec 6 14:41:46 hqnl0246134 sshd[222748]: Failed password for root from 61.177.173.46 port 17255 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 14:41:47,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330507.4515047, 'message': 'Dec 6 14:41:46 hqnl0246134 sshd[222748]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 14:41:49,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670330509.4526255, 'message': 'Dec 6 14:41:49 hqnl0246134 sshd[222748]: Failed password for root from 61.177.173.46 port 17255 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 14:41:50,628] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 14:41:50,629] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 14:41:50,630] im360.plugins.client360: Waiting 2 minutes before retry...
WARNING [2022-12-06 14:41:53,301] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 14:41:54,496] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:41:54,496] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:41:54,506] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:41:54,519] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
WARNING [2022-12-06 14:41:54,791] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:41:54,815] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0313 seconds
INFO [2022-12-06 14:42:09,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330529.4749587, 'message': 'Dec 6 14:42:09 hqnl0246134 sshd[222788]: Invalid user ftptest from 87.219.167.66 port 51318', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 14:42:09,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330529.4753273, 'message': 'Dec 6 14:42:09 hqnl0246134 sshd[222788]: pam_imunify(sshd:auth): [IM360_RBL] The IP 87.219.167.66 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 14:42:09,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330529.4760118, 'message': 'Dec 6 14:42:09 hqnl0246134 sshd[222788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.219.167.66 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 14:42:13,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330533.4779112, 'message': 'Dec 6 14:42:11 hqnl0246134 sshd[222788]: Failed password for invalid user ftptest from 87.219.167.66 port 51318 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 14:42:13,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '87.219.167.66', 'timestamp': 1670330533.4781363, 'message': 'Dec 6 14:42:12 hqnl0246134 sshd[222788]: Disconnected from invalid user ftptest 87.219.167.66 port 51318 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 14:42:20,811] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:42:20,812] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:42:20,835] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:42:20,873] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0604 seconds
INFO [2022-12-06 14:42:23,878] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:42:23,879] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:42:23,885] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:42:23,897] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 14:42:33,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330553.5075624, 'message': 'Dec 6 14:42:31 hqnl0246134 sshd[222821]: Invalid user angie from 164.92.117.121 port 56424', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 14:42:33,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330553.5084398, 'message': 'Dec 6 14:42:31 hqnl0246134 sshd[222821]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.92.117.121 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 14:42:33,616] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330553.50872, 'message': 'Dec 6 14:42:31 hqnl0246134 sshd[222821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.117.121 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 14:42:33,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330553.5089867, 'message': 'Dec 6 14:42:33 hqnl0246134 sshd[222821]: Failed password for invalid user angie from 164.92.117.121 port 56424 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 14:42:35,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.117.121', 'timestamp': 1670330555.5067866, 'message': 'Dec 6 14:42:33 hqnl0246134 sshd[222821]: Disconnected from invalid user angie 164.92.117.121 port 56424 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0336 seconds
WARNING [2022-12-06 14:42:46,470] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:42:46,471] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:42:54,797] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:42:54,820] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0322 seconds
INFO [2022-12-06 14:43:17,939] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:43:17,940] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:43:17,948] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:43:17,960] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 14:43:20,534] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:43:20,535] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:43:20,547] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:43:20,569] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0325 seconds
WARNING [2022-12-06 14:43:46,477] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:43:46,479] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:43:59,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330639.5978355, 'message': 'Dec 6 14:43:58 hqnl0246134 sshd[222883]: Invalid user admin from 186.10.125.209 port 23282', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0625 seconds
INFO [2022-12-06 14:43:59,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330639.5985925, 'message': 'Dec 6 14:43:58 hqnl0246134 sshd[222883]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.10.125.209 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-06 14:43:59,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330639.598797, 'message': 'Dec 6 14:43:58 hqnl0246134 sshd[222883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 14:44:01,628] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330641.6004083, 'message': 'Dec 6 14:44:00 hqnl0246134 sshd[222883]: Failed password for invalid user admin from 186.10.125.209 port 23282 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 14:44:03,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670330643.6018205, 'message': 'Dec 6 14:44:02 hqnl0246134 sshd[222883]: Disconnected from invalid user admin 186.10.125.209 port 23282 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 14:44:05,377] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:44:05,377] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:44:05,387] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:44:05,400] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 14:44:17,818] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:44:17,819] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:44:17,828] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:44:17,839] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 14:44:20,581] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:44:20,582] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:44:20,591] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:44:20,604] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0211 seconds
INFO [2022-12-06 14:44:23,957] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 14:44:24,027] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 14:44:24,027] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 14:44:24,028] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 14:44:24,028] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 14:44:24,029] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 14:44:24,043] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 14:44:24,059] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0301 seconds
WARNING [2022-12-06 14:44:24,066] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 14:44:24,068] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:44:24,086] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0323 seconds
INFO [2022-12-06 14:44:24,088] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0303 seconds
WARNING [2022-12-06 14:44:46,482] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:44:46,483] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:44:54,154] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 14:44:54,155] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 14:44:54,156] im360.plugins.client360: Waiting 4 minutes before retry...
WARNING [2022-12-06 14:44:54,809] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:44:54,855] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0591 seconds
INFO [2022-12-06 14:45:17,732] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:45:17,733] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:45:17,740] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:45:17,754] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 14:45:20,819] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:45:20,820] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:45:20,827] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:45:20,839] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 14:45:43,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.36.14.101', 'timestamp': 1670330743.7199018, 'message': 'Dec 6 14:45:43 hqnl0246134 sshd[223009]: Invalid user mythtv from 177.36.14.101 port 58299', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0413 seconds
INFO [2022-12-06 14:45:43,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.36.14.101', 'timestamp': 1670330743.7207992, 'message': 'Dec 6 14:45:43 hqnl0246134 sshd[223009]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.36.14.101 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 14:45:43,806] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.36.14.101', 'timestamp': 1670330743.7210522, 'message': 'Dec 6 14:45:43 hqnl0246134 sshd[223009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.36.14.101 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 14:45:45,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.36.14.101', 'timestamp': 1670330745.7211983, 'message': 'Dec 6 14:45:45 hqnl0246134 sshd[223009]: Failed password for invalid user mythtv from 177.36.14.101 port 58299 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
WARNING [2022-12-06 14:45:46,488] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:45:46,489] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:45:47,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.36.14.101', 'timestamp': 1670330747.7245314, 'message': 'Dec 6 14:45:47 hqnl0246134 sshd[223009]: Disconnected from invalid user mythtv 177.36.14.101 port 58299 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
WARNING [2022-12-06 14:45:54,811] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:45:54,831] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0290 seconds
INFO [2022-12-06 14:46:17,923] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:46:17,924] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:46:17,937] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:46:17,956] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0311 seconds
INFO [2022-12-06 14:46:20,776] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:46:20,776] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:46:20,785] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:46:20,797] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 14:46:37,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.203.182.218', 'timestamp': 1670330797.7749705, 'message': 'Dec 6 14:46:36 hqnl0246134 sshd[223061]: Invalid user tester from 159.203.182.218 port 59838', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 14:46:37,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.203.182.218', 'timestamp': 1670330797.7756152, 'message': 'Dec 6 14:46:36 hqnl0246134 sshd[223061]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.203.182.218 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 14:46:37,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.203.182.218', 'timestamp': 1670330797.7758813, 'message': 'Dec 6 14:46:36 hqnl0246134 sshd[223061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.182.218 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 14:46:40,011] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.203.182.218', 'timestamp': 1670330799.7762637, 'message': 'Dec 6 14:46:38 hqnl0246134 sshd[223061]: Failed password for invalid user tester from 159.203.182.218 port 59838 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.2345 seconds
INFO [2022-12-06 14:46:40,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.203.182.218', 'timestamp': 1670330799.7766364, 'message': 'Dec 6 14:46:39 hqnl0246134 sshd[223061]: Disconnected from invalid user tester 159.203.182.218 port 59838 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 14:46:46,493] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:46:46,494] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:46:54,816] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:46:54,839] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0325 seconds
INFO [2022-12-06 14:47:13,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.81.96', 'timestamp': 1670330833.818592, 'message': 'Dec 6 14:47:13 hqnl0246134 sshd[223091]: Invalid user st from 43.153.81.96 port 48612', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 14:47:13,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.81.96', 'timestamp': 1670330833.818962, 'message': 'Dec 6 14:47:13 hqnl0246134 sshd[223091]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.81.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:47:13,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.81.96', 'timestamp': 1670330833.8191018, 'message': 'Dec 6 14:47:13 hqnl0246134 sshd[223091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.81.96 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 14:47:17,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.81.96', 'timestamp': 1670330837.8201623, 'message': 'Dec 6 14:47:16 hqnl0246134 sshd[223091]: Failed password for invalid user st from 43.153.81.96 port 48612 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 14:47:17,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.81.96', 'timestamp': 1670330837.8204944, 'message': 'Dec 6 14:47:16 hqnl0246134 sshd[223091]: Disconnected from invalid user st 43.153.81.96 port 48612 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 14:47:18,436] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:47:18,436] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:47:18,444] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:47:18,456] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 14:47:19,982] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:47:19,983] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:47:19,990] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:47:20,002] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 14:47:21,452] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:47:21,452] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:47:21,465] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:47:21,487] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0341 seconds
WARNING [2022-12-06 14:47:46,499] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:47:46,500] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:47:54,824] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:47:54,852] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0419 seconds
INFO [2022-12-06 14:48:18,310] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:48:18,311] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:48:18,320] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:48:18,332] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 14:48:21,063] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:48:21,063] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:48:21,071] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:48:21,082] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 14:48:46,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.203.149.110', 'timestamp': 1670330925.9844348, 'message': 'Dec 6 14:48:44 hqnl0246134 sshd[223170]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.203.149.110 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 14:48:46,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.203.149.110', 'timestamp': 1670330925.9847107, 'message': 'Dec 6 14:48:44 hqnl0246134 sshd[223170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.203.149.110 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
WARNING [2022-12-06 14:48:46,504] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:48:46,505] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:48:48,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.203.149.110', 'timestamp': 1670330927.9865954, 'message': 'Dec 6 14:48:46 hqnl0246134 sshd[223170]: Failed password for root from 20.203.149.110 port 34082 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 14:48:54,823] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:48:54,842] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0254 seconds
INFO [2022-12-06 14:49:00,027] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330940.0010552, 'message': 'Dec 6 14:48:58 hqnl0246134 sshd[223179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 14:49:00,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330940.0015726, 'message': 'Dec 6 14:48:58 hqnl0246134 sshd[223179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 14:49:02,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330942.0042217, 'message': 'Dec 6 14:49:01 hqnl0246134 sshd[223179]: Failed password for root from 61.177.172.19 port 22636 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 14:49:04,060] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330944.0071986, 'message': 'Dec 6 14:49:03 hqnl0246134 sshd[223179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0525 seconds
INFO [2022-12-06 14:49:04,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.128.169.130', 'timestamp': 1670330944.0075605, 'message': 'Dec 6 14:49:03 hqnl0246134 sshd[223197]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.128.169.130 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0525 seconds
INFO [2022-12-06 14:49:04,079] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.128.169.130', 'timestamp': 1670330944.0078397, 'message': 'Dec 6 14:49:03 hqnl0246134 sshd[223197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.169.130 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 14:49:06,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330946.0085928, 'message': 'Dec 6 14:49:05 hqnl0246134 sshd[223179]: Failed password for root from 61.177.172.19 port 22636 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0520 seconds
INFO [2022-12-06 14:49:06,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '190.128.169.130', 'timestamp': 1670330946.008997, 'message': 'Dec 6 14:49:05 hqnl0246134 sshd[223197]: Failed password for root from 190.128.169.130 port 40628 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0523 seconds
INFO [2022-12-06 14:49:08,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330948.0099146, 'message': 'Dec 6 14:49:07 hqnl0246134 sshd[223179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 14:49:10,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330950.0126815, 'message': 'Dec 6 14:49:09 hqnl0246134 sshd[223179]: Failed password for root from 61.177.172.19 port 22636 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 14:49:12,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330952.0163934, 'message': 'Dec 6 14:49:11 hqnl0246134 sshd[223201]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 14:49:12,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330952.0166545, 'message': 'Dec 6 14:49:11 hqnl0246134 sshd[223201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 14:49:16,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330956.0177228, 'message': 'Dec 6 14:49:14 hqnl0246134 sshd[223201]: Failed password for root from 61.177.172.19 port 56469 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 14:49:18,051] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:49:18,052] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:49:18,065] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:49:18,085] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0320 seconds
INFO [2022-12-06 14:49:18,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330958.0537455, 'message': 'Dec 6 14:49:16 hqnl0246134 sshd[223201]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 14:49:20,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330960.0270925, 'message': 'Dec 6 14:49:18 hqnl0246134 sshd[223201]: Failed password for root from 61.177.172.19 port 56469 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 14:49:20,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330960.0272896, 'message': 'Dec 6 14:49:18 hqnl0246134 sshd[223201]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 14:49:20,940] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:49:20,941] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:49:20,947] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:49:20,959] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 14:49:22,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330962.0427577, 'message': 'Dec 6 14:49:20 hqnl0246134 sshd[223201]: Failed password for root from 61.177.172.19 port 56469 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 14:49:24,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330964.0453165, 'message': 'Dec 6 14:49:23 hqnl0246134 sshd[223214]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 14:49:24,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330964.0454905, 'message': 'Dec 6 14:49:23 hqnl0246134 sshd[223214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 14:49:26,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330966.0513873, 'message': 'Dec 6 14:49:25 hqnl0246134 sshd[223214]: Failed password for root from 61.177.172.19 port 18033 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 14:49:28,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330968.0539887, 'message': 'Dec 6 14:49:27 hqnl0246134 sshd[223214]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 14:49:28,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.6.106.29', 'timestamp': 1670330968.0542076, 'message': 'Dec 6 14:49:27 hqnl0246134 sshd[223217]: Invalid user st from 20.6.106.29 port 57790', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 14:49:28,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.6.106.29', 'timestamp': 1670330968.054347, 'message': 'Dec 6 14:49:27 hqnl0246134 sshd[223217]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.6.106.29 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 14:49:28,134] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.6.106.29', 'timestamp': 1670330968.054479, 'message': 'Dec 6 14:49:27 hqnl0246134 sshd[223217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.6.106.29 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 14:49:30,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330970.0578976, 'message': 'Dec 6 14:49:29 hqnl0246134 sshd[223214]: Failed password for root from 61.177.172.19 port 18033 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 14:49:30,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.6.106.29', 'timestamp': 1670330970.058407, 'message': 'Dec 6 14:49:29 hqnl0246134 sshd[223217]: Failed password for invalid user st from 20.6.106.29 port 57790 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 14:49:32,097] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330972.0618792, 'message': 'Dec 6 14:49:30 hqnl0246134 sshd[223214]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 14:49:32,098] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.6.106.29', 'timestamp': 1670330972.0620832, 'message': 'Dec 6 14:49:31 hqnl0246134 sshd[223217]: Disconnected from invalid user st 20.6.106.29 port 57790 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 14:49:34,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330974.0652926, 'message': 'Dec 6 14:49:32 hqnl0246134 sshd[223214]: Failed password for root from 61.177.172.19 port 18033 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 14:49:38,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330978.0680382, 'message': 'Dec 6 14:49:36 hqnl0246134 sshd[223233]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 14:49:38,125] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330978.0682852, 'message': 'Dec 6 14:49:36 hqnl0246134 sshd[223233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 14:49:40,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330980.0726633, 'message': 'Dec 6 14:49:38 hqnl0246134 sshd[223233]: Failed password for root from 61.177.172.19 port 62300 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 14:49:40,992] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 14:49:41,058] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 14:49:41,059] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 14:49:41,059] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 14:49:41,059] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 14:49:41,060] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 14:49:41,071] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 14:49:41,088] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0280 seconds
WARNING [2022-12-06 14:49:41,095] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 14:49:41,098] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:49:41,115] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0321 seconds
INFO [2022-12-06 14:49:41,116] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0306 seconds
INFO [2022-12-06 14:49:42,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330982.0768473, 'message': 'Dec 6 14:49:40 hqnl0246134 sshd[223233]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 14:49:42,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330982.077148, 'message': 'Dec 6 14:49:42 hqnl0246134 sshd[223233]: Failed password for root from 61.177.172.19 port 62300 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 14:49:44,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330984.087531, 'message': 'Dec 6 14:49:42 hqnl0246134 sshd[223233]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 14:49:46,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670330986.090753, 'message': 'Dec 6 14:49:44 hqnl0246134 sshd[223233]: Failed password for root from 61.177.172.19 port 62300 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-06 14:49:46,513] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:49:46,514] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:49:49,536] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:49:49,537] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:49:49,545] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:49:49,556] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
WARNING [2022-12-06 14:49:54,835] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:49:54,857] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0298 seconds
INFO [2022-12-06 14:50:11,226] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 14:50:11,228] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 14:50:11,229] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 14:50:18,101] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:50:18,102] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:50:18,122] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:50:18,143] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0395 seconds
INFO [2022-12-06 14:50:20,834] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:50:20,834] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:50:20,842] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:50:20,854] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 14:50:24,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331024.1585135, 'message': 'Dec 6 14:50:23 hqnl0246134 sshd[223296]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 14:50:24,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331024.1587994, 'message': 'Dec 6 14:50:23 hqnl0246134 sshd[223296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 14:50:26,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331026.1599252, 'message': 'Dec 6 14:50:25 hqnl0246134 sshd[223296]: Failed password for root from 61.177.173.48 port 40762 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 14:50:28,189] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331028.1650672, 'message': 'Dec 6 14:50:27 hqnl0246134 sshd[223296]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 14:50:30,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331030.1694696, 'message': 'Dec 6 14:50:29 hqnl0246134 sshd[223296]: Failed password for root from 61.177.173.48 port 40762 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 14:50:30,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331030.1698358, 'message': 'Dec 6 14:50:29 hqnl0246134 sshd[223296]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 14:50:32,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331032.173249, 'message': 'Dec 6 14:50:31 hqnl0246134 sshd[223296]: Failed password for root from 61.177.173.48 port 40762 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 14:50:34,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331034.1741211, 'message': 'Dec 6 14:50:33 hqnl0246134 sshd[223312]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0789 seconds
INFO [2022-12-06 14:50:34,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331034.1744366, 'message': 'Dec 6 14:50:33 hqnl0246134 sshd[223312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0867 seconds
INFO [2022-12-06 14:50:36,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331036.1784463, 'message': 'Dec 6 14:50:35 hqnl0246134 sshd[223312]: Failed password for root from 61.177.173.48 port 16384 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 14:50:36,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331036.1786215, 'message': 'Dec 6 14:50:35 hqnl0246134 sshd[223312]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 14:50:38,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331038.1831565, 'message': 'Dec 6 14:50:38 hqnl0246134 sshd[223312]: Failed password for root from 61.177.173.48 port 16384 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 14:50:42,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331042.1928341, 'message': 'Dec 6 14:50:40 hqnl0246134 sshd[223312]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 14:50:42,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331042.1933765, 'message': 'Dec 6 14:50:42 hqnl0246134 sshd[223312]: Failed password for root from 61.177.173.48 port 16384 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 14:50:46,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331046.2070248, 'message': 'Dec 6 14:50:44 hqnl0246134 sshd[223317]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 14:50:46,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331046.207374, 'message': 'Dec 6 14:50:44 hqnl0246134 sshd[223317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
WARNING [2022-12-06 14:50:46,520] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:50:46,520] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:50:48,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331048.2094047, 'message': 'Dec 6 14:50:46 hqnl0246134 sshd[223317]: Failed password for root from 61.177.173.48 port 42563 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:50:48,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331048.2096283, 'message': 'Dec 6 14:50:46 hqnl0246134 sshd[223317]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 14:50:50,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331050.2105265, 'message': 'Dec 6 14:50:48 hqnl0246134 sshd[223317]: Failed password for root from 61.177.173.48 port 42563 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 14:50:50,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331050.210781, 'message': 'Dec 6 14:50:49 hqnl0246134 sshd[223317]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:50:52,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670331052.2125056, 'message': 'Dec 6 14:50:51 hqnl0246134 sshd[223317]: Failed password for root from 61.177.173.48 port 42563 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
WARNING [2022-12-06 14:50:54,843] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:50:54,872] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0417 seconds
INFO [2022-12-06 14:50:56,129] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:50:56,130] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:50:56,141] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:50:56,161] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0295 seconds
INFO [2022-12-06 14:51:18,113] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:51:18,114] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:51:18,128] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:51:18,150] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0342 seconds
INFO [2022-12-06 14:51:21,418] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:51:21,419] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:51:21,431] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:51:21,451] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0297 seconds
INFO [2022-12-06 14:51:24,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '144.22.160.91', 'timestamp': 1670331084.2665, 'message': 'Dec 6 14:51:24 hqnl0246134 sshd[223370]: pam_imunify(sshd:auth): [IM360_RBL] The IP 144.22.160.91 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 14:51:24,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '144.22.160.91', 'timestamp': 1670331084.2667813, 'message': 'Dec 6 14:51:24 hqnl0246134 sshd[223370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.160.91 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 14:51:26,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '144.22.160.91', 'timestamp': 1670331086.2689018, 'message': 'Dec 6 14:51:26 hqnl0246134 sshd[223370]: Failed password for root from 144.22.160.91 port 42298 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 14:51:40,075] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 14:51:40,077] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 14:51:40,979] im360.plugins.pam: PAM module has been enabled for dovecot-pam
WARNING [2022-12-06 14:51:46,525] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:51:46,527] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:51:48,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.36.14.101', 'timestamp': 1670331108.3012874, 'message': 'Dec 6 14:51:47 hqnl0246134 sshd[223400]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.36.14.101 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 14:51:48,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.36.14.101', 'timestamp': 1670331108.3020043, 'message': 'Dec 6 14:51:47 hqnl0246134 sshd[223400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.36.14.101 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 14:51:50,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '177.36.14.101', 'timestamp': 1670331110.3026645, 'message': 'Dec 6 14:51:49 hqnl0246134 sshd[223400]: Failed password for root from 177.36.14.101 port 54093 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 14:51:50,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331110.3029056, 'message': 'Dec 6 14:51:49 hqnl0246134 sshd[223403]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 14:51:50,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331110.3030279, 'message': 'Dec 6 14:51:49 hqnl0246134 sshd[223403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 14:51:52,328] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331112.306152, 'message': 'Dec 6 14:51:51 hqnl0246134 sshd[223403]: Failed password for root from 61.177.173.46 port 34256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
WARNING [2022-12-06 14:51:53,304] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 14:51:54,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331114.3066707, 'message': 'Dec 6 14:51:53 hqnl0246134 sshd[223403]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 14:51:54,842] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:51:54,866] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0319 seconds
INFO [2022-12-06 14:51:56,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331116.3080523, 'message': 'Dec 6 14:51:55 hqnl0246134 sshd[223403]: Failed password for root from 61.177.173.46 port 34256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 14:51:58,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331118.3100045, 'message': 'Dec 6 14:51:58 hqnl0246134 sshd[223403]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 14:52:00,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331120.3129492, 'message': 'Dec 6 14:51:59 hqnl0246134 sshd[223403]: Failed password for root from 61.177.173.46 port 34256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 14:52:02,962] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:52:02,963] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:52:02,975] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:52:02,992] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0285 seconds
INFO [2022-12-06 14:52:04,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331124.3154137, 'message': 'Dec 6 14:52:04 hqnl0246134 sshd[223433]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 14:52:04,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331124.3156154, 'message': 'Dec 6 14:52:04 hqnl0246134 sshd[223433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 14:52:06,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331126.3163824, 'message': 'Dec 6 14:52:05 hqnl0246134 sshd[223433]: Failed password for root from 61.177.173.46 port 63821 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 14:52:08,337] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331128.3190515, 'message': 'Dec 6 14:52:06 hqnl0246134 sshd[223433]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 14:52:10,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331130.320305, 'message': 'Dec 6 14:52:08 hqnl0246134 sshd[223433]: Failed password for root from 61.177.173.46 port 63821 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 14:52:10,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331130.3205607, 'message': 'Dec 6 14:52:09 hqnl0246134 sshd[223433]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 14:52:12,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670331132.3212454, 'message': 'Dec 6 14:52:10 hqnl0246134 sshd[223433]: Failed password for root from 61.177.173.46 port 63821 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:52:17,878] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:52:17,879] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:52:17,885] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:52:17,897] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 14:52:20,545] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:52:20,545] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:52:20,552] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:52:20,563] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 14:52:22,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.203.149.110', 'timestamp': 1670331142.3284733, 'message': 'Dec 6 14:52:21 hqnl0246134 sshd[223448]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.203.149.110 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 14:52:22,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.203.149.110', 'timestamp': 1670331142.3287058, 'message': 'Dec 6 14:52:21 hqnl0246134 sshd[223448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.203.149.110 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 14:52:24,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.203.149.110', 'timestamp': 1670331144.3315723, 'message': 'Dec 6 14:52:22 hqnl0246134 sshd[223448]: Failed password for root from 20.203.149.110 port 52850 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-06 14:52:46,530] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:52:46,532] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:52:54,854] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:52:54,882] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0376 seconds
INFO [2022-12-06 14:53:18,144] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:53:18,145] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:53:18,155] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:53:18,168] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 14:53:22,870] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:53:22,870] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:53:22,879] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:53:22,893] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-06 14:53:46,455] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.68.50.30', 'timestamp': 1670331226.4290812, 'message': 'Dec 6 14:53:46 hqnl0246134 sshd[223519]: Invalid user teamspeak from 138.68.50.30 port 40820', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0258 seconds
WARNING [2022-12-06 14:53:46,535] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:53:46,536] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:53:48,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.68.50.30', 'timestamp': 1670331228.4313571, 'message': 'Dec 6 14:53:46 hqnl0246134 sshd[223519]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.68.50.30 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 14:53:48,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.68.50.30', 'timestamp': 1670331228.431572, 'message': 'Dec 6 14:53:46 hqnl0246134 sshd[223519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.50.30 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 14:53:50,462] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.68.50.30', 'timestamp': 1670331230.4336383, 'message': 'Dec 6 14:53:48 hqnl0246134 sshd[223519]: Failed password for invalid user teamspeak from 138.68.50.30 port 40820 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 14:53:50,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.68.50.30', 'timestamp': 1670331230.4338832, 'message': 'Dec 6 14:53:49 hqnl0246134 sshd[223519]: Disconnected from invalid user teamspeak 138.68.50.30 port 40820 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 14:53:51,727] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:53:51,727] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:53:51,735] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:53:51,746] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
WARNING [2022-12-06 14:53:54,860] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:53:54,881] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0333 seconds
INFO [2022-12-06 14:53:58,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331238.442968, 'message': 'Dec 6 14:53:57 hqnl0246134 sshd[223528]: Invalid user ju from 190.128.169.130 port 36950', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 14:53:58,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331238.4433715, 'message': 'Dec 6 14:53:57 hqnl0246134 sshd[223528]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.128.169.130 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 14:53:58,504] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331238.44351, 'message': 'Dec 6 14:53:57 hqnl0246134 sshd[223528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.169.130 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 14:54:00,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331240.444161, 'message': 'Dec 6 14:53:59 hqnl0246134 sshd[223528]: Failed password for invalid user ju from 190.128.169.130 port 36950 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 14:54:00,490] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331240.4445662, 'message': 'Dec 6 14:53:59 hqnl0246134 sshd[223528]: Disconnected from invalid user ju 190.128.169.130 port 36950 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 14:54:17,849] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:54:17,850] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:54:17,858] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:54:17,869] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 14:54:20,451] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:54:20,452] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:54:20,459] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:54:20,470] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
WARNING [2022-12-06 14:54:46,539] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:54:46,540] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 14:54:54,862] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:54:54,884] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0333 seconds
INFO [2022-12-06 14:55:18,464] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:55:18,466] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:55:18,478] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:55:18,494] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0267 seconds
INFO [2022-12-06 14:55:21,332] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:55:21,333] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:55:21,340] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:55:21,352] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
WARNING [2022-12-06 14:55:46,545] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:55:46,546] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:55:50,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '188.32.176.34', 'timestamp': 1670331350.5785778, 'message': 'Dec 6 14:55:49 hqnl0246134 sshd[223650]: Accepted publickey for root from 188.32.176.34 port 45146 ssh2: RSA SHA256:M5XvbkooZmQvvjfo3fKHU5lbqUaXL4LET3qhCF0FT28', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0218 seconds
WARNING [2022-12-06 14:55:54,862] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:55:54,883] defence360agent.internals.the_sink: SensorIncidentList(<1 item(s)>) processed in 0.0294 seconds
INFO [2022-12-06 14:56:00,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.203.149.110', 'timestamp': 1670331360.5929592, 'message': 'Dec 6 14:55:59 hqnl0246134 sshd[223703]: Invalid user sftp from 20.203.149.110 port 46694', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0393 seconds
INFO [2022-12-06 14:56:00,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.203.149.110', 'timestamp': 1670331360.5933719, 'message': 'Dec 6 14:55:59 hqnl0246134 sshd[223703]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.203.149.110 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0482 seconds
INFO [2022-12-06 14:56:00,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.203.149.110', 'timestamp': 1670331360.5935996, 'message': 'Dec 6 14:55:59 hqnl0246134 sshd[223703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.203.149.110 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 14:56:02,783] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.203.149.110', 'timestamp': 1670331362.597882, 'message': 'Dec 6 14:56:01 hqnl0246134 sshd[223703]: Failed password for invalid user sftp from 20.203.149.110 port 46694 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1829 seconds
INFO [2022-12-06 14:56:02,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331362.5989647, 'message': 'Dec 6 14:56:01 hqnl0246134 sshd[223728]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.128.169.130 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1868 seconds
INFO [2022-12-06 14:56:02,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.203.149.110', 'timestamp': 1670331362.5986476, 'message': 'Dec 6 14:56:01 hqnl0246134 sshd[223703]: Disconnected from invalid user sftp 20.203.149.110 port 46694 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1249 seconds
INFO [2022-12-06 14:56:02,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331362.5993733, 'message': 'Dec 6 14:56:01 hqnl0246134 sshd[223728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.169.130 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1202 seconds
INFO [2022-12-06 14:56:04,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331364.597337, 'message': 'Dec 6 14:56:04 hqnl0246134 sshd[223728]: Failed password for root from 190.128.169.130 port 60676 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 14:56:04,746] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 14:56:04,815] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 14:56:04,815] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 14:56:04,816] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 14:56:04,816] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 14:56:04,817] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 14:56:04,835] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 14:56:04,867] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0493 seconds
WARNING [2022-12-06 14:56:04,884] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 14:56:04,889] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:56:04,924] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0683 seconds
INFO [2022-12-06 14:56:04,927] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0653 seconds
INFO [2022-12-06 14:56:05,686] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:56:05,686] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:56:05,697] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:56:05,715] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0277 seconds
INFO [2022-12-06 14:56:18,437] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:56:18,438] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:56:18,450] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:56:18,476] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0354 seconds
INFO [2022-12-06 14:56:21,286] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:56:21,287] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:56:21,296] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:56:21,308] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 14:56:34,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670331394.6391191, 'message': 'Dec 6 14:56:34 hqnl0246134 sshd[223759]: Accepted password for supportwwwuser from 212.58.119.251 port 10644 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0541 seconds
INFO [2022-12-06 14:56:35,025] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 14:56:35,025] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 14:56:35,027] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 14:56:36,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '188.32.176.34', 'timestamp': 1670331396.6412914, 'message': 'Dec 6 14:56:36 hqnl0246134 sshd[223808]: Accepted publickey for root from 188.32.176.34 port 57284 ssh2: RSA SHA256:M5XvbkooZmQvvjfo3fKHU5lbqUaXL4LET3qhCF0FT28', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 14:56:44,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '212.58.119.251', 'timestamp': 1670331404.6519413, 'message': 'Dec 6 14:56:43 hqnl0246134 sshd[223865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.58.119.251 user=supportwwwuser', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0795 seconds
WARNING [2022-12-06 14:56:46,549] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:56:46,551] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:56:46,698] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '212.58.119.251', 'timestamp': 1670331406.665886, 'message': 'Dec 6 14:56:45 hqnl0246134 sshd[223865]: Failed password for supportwwwuser from 212.58.119.251 port 10668 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 14:56:48,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670331408.654843, 'message': 'Dec 6 14:56:47 hqnl0246134 sshd[223865]: Accepted password for supportwwwuser from 212.58.119.251 port 10668 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0343 seconds
WARNING [2022-12-06 14:56:54,888] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:56:54,981] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.1214 seconds
INFO [2022-12-06 14:56:58,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670331418.6672032, 'message': 'Dec 6 14:56:58 hqnl0246134 sshd[223935]: Accepted password for supportwwwuser from 212.58.119.251 port 10677 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.1842 seconds
INFO [2022-12-06 14:57:00,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.189.66.204', 'timestamp': 1670331420.6720374, 'message': 'Dec 6 14:56:59 hqnl0246134 sshd[223939]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.189.66.204 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 14:57:00,724] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.189.66.204', 'timestamp': 1670331420.6725676, 'message': 'Dec 6 14:56:59 hqnl0246134 sshd[223939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.66.204 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 14:57:02,833] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '206.189.66.204', 'timestamp': 1670331422.6848154, 'message': 'Dec 6 14:57:01 hqnl0246134 sshd[223939]: Failed password for root from 206.189.66.204 port 57430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1473 seconds
INFO [2022-12-06 14:57:20,857] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:57:20,858] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:57:20,897] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:57:20,962] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0926 seconds
INFO [2022-12-06 14:57:22,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.203.182.218', 'timestamp': 1670331442.707134, 'message': 'Dec 6 14:57:21 hqnl0246134 sshd[224044]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.203.182.218 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1023 seconds
INFO [2022-12-06 14:57:22,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.203.182.218', 'timestamp': 1670331442.7074983, 'message': 'Dec 6 14:57:21 hqnl0246134 sshd[224044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.182.218 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 14:57:24,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '159.203.182.218', 'timestamp': 1670331444.7060342, 'message': 'Dec 6 14:57:23 hqnl0246134 sshd[224044]: Failed password for root from 159.203.182.218 port 46600 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1504 seconds
INFO [2022-12-06 14:57:26,862] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:57:26,863] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:57:26,943] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:57:27,091] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.2156 seconds
INFO [2022-12-06 14:57:27,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331446.877023, 'message': 'Dec 6 14:57:24 hqnl0246134 sshd[224054]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.2271 seconds
INFO [2022-12-06 14:57:27,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331446.8772237, 'message': 'Dec 6 14:57:24 hqnl0246134 sshd[224054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1222 seconds
INFO [2022-12-06 14:57:28,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331448.719536, 'message': 'Dec 6 14:57:26 hqnl0246134 sshd[224054]: Failed password for root from 61.177.172.104 port 51858 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0976 seconds
INFO [2022-12-06 14:57:31,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331450.8431828, 'message': 'Dec 6 14:57:29 hqnl0246134 sshd[224054]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.2990 seconds
INFO [2022-12-06 14:57:32,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331452.715077, 'message': 'Dec 6 14:57:30 hqnl0246134 sshd[224054]: Failed password for root from 61.177.172.104 port 51858 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 14:57:32,764] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331452.7155752, 'message': 'Dec 6 14:57:31 hqnl0246134 sshd[224054]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 14:57:33,661] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:57:33,663] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:57:33,710] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:57:33,804] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1307 seconds
INFO [2022-12-06 14:57:34,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331454.7162461, 'message': 'Dec 6 14:57:33 hqnl0246134 sshd[224054]: Failed password for root from 61.177.172.104 port 51858 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-06 14:57:38,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.103.39', 'timestamp': 1670331458.7213187, 'message': 'Dec 6 14:57:38 hqnl0246134 sshd[224086]: Invalid user ts3server from 43.153.103.39 port 60028', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1096 seconds
INFO [2022-12-06 14:57:38,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.103.39', 'timestamp': 1670331458.7216535, 'message': 'Dec 6 14:57:38 hqnl0246134 sshd[224086]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.103.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0864 seconds
INFO [2022-12-06 14:57:39,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.103.39', 'timestamp': 1670331458.7218578, 'message': 'Dec 6 14:57:38 hqnl0246134 sshd[224086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.103.39 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1233 seconds
INFO [2022-12-06 14:57:40,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.103.39', 'timestamp': 1670331460.73807, 'message': 'Dec 6 14:57:40 hqnl0246134 sshd[224086]: Failed password for invalid user ts3server from 43.153.103.39 port 60028 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1092 seconds
INFO [2022-12-06 14:57:42,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.103.39', 'timestamp': 1670331462.7305133, 'message': 'Dec 6 14:57:41 hqnl0246134 sshd[224086]: Disconnected from invalid user ts3server 43.153.103.39 port 60028 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0918 seconds
INFO [2022-12-06 14:57:42,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.36.14.101', 'timestamp': 1670331462.7307928, 'message': 'Dec 6 14:57:42 hqnl0246134 sshd[224091]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.36.14.101 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0920 seconds
INFO [2022-12-06 14:57:42,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.36.14.101', 'timestamp': 1670331462.7309883, 'message': 'Dec 6 14:57:42 hqnl0246134 sshd[224091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.36.14.101 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0489 seconds
INFO [2022-12-06 14:57:44,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '177.36.14.101', 'timestamp': 1670331464.7346745, 'message': 'Dec 6 14:57:44 hqnl0246134 sshd[224091]: Failed password for root from 177.36.14.101 port 49886 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0355 seconds
WARNING [2022-12-06 14:57:46,554] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:57:46,556] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:57:52,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331472.7414873, 'message': 'Dec 6 14:57:51 hqnl0246134 sshd[224104]: Invalid user sysadmin from 190.128.169.130 port 56174', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 14:57:52,825] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331472.7424817, 'message': 'Dec 6 14:57:51 hqnl0246134 sshd[224104]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.128.169.130 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 14:57:52,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331472.7427113, 'message': 'Dec 6 14:57:51 hqnl0246134 sshd[224104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.169.130 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 14:57:54,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331474.741197, 'message': 'Dec 6 14:57:53 hqnl0246134 sshd[224104]: Failed password for invalid user sysadmin from 190.128.169.130 port 56174 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0471 seconds
INFO [2022-12-06 14:57:54,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670331474.741588, 'message': 'Dec 6 14:57:54 hqnl0246134 sshd[224106]: Invalid user Administrator from 152.89.196.123 port 16746', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-06 14:57:54,836] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.128.169.130', 'timestamp': 1670331474.7414553, 'message': 'Dec 6 14:57:53 hqnl0246134 sshd[224104]: Disconnected from invalid user sysadmin 190.128.169.130 port 56174 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0458 seconds
INFO [2022-12-06 14:57:54,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670331474.7417164, 'message': 'Dec 6 14:57:54 hqnl0246134 sshd[224106]: Failed none for invalid user Administrator from 152.89.196.123 port 16746 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0445 seconds
INFO [2022-12-06 14:57:54,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670331474.7418318, 'message': 'Dec 6 14:57:54 hqnl0246134 sshd[224106]: Disconnected from invalid user Administrator 152.89.196.123 port 16746 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
WARNING [2022-12-06 14:57:54,883] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:57:54,941] defence360agent.internals.the_sink: SensorIncidentList(<20 item(s)>) processed in 0.0752 seconds
INFO [2022-12-06 14:58:06,367] defence360agent.files: Updating all files
INFO [2022-12-06 14:58:06,764] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 14:58:06,764] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 14:58:07,156] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 14:58:07,156] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 14:58:07,483] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 14:58:07,483] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 14:58:07,878] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 14:58:07,878] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 14:58:07,879] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 14:58:08,204] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 12:58:08 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E35A38138CF73'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 14:58:08,208] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 14:58:08,209] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 14:58:09,023] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 14:58:09,023] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 14:58:09,289] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 14:58:09,290] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 14:58:09,620] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 14:58:09,621] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 14:58:10,406] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 14:58:10,406] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 14:58:10,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331490.7602913, 'message': 'Dec 6 14:58:08 hqnl0246134 sshd[224144]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0542 seconds
INFO [2022-12-06 14:58:10,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331490.7633052, 'message': 'Dec 6 14:58:08 hqnl0246134 sshd[224144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0569 seconds
INFO [2022-12-06 14:58:11,011] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 14:58:11,013] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 14:58:12,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331492.7590256, 'message': 'Dec 6 14:58:11 hqnl0246134 sshd[224144]: Failed password for root from 61.177.172.104 port 59595 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0658 seconds
INFO [2022-12-06 14:58:12,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331492.759443, 'message': 'Dec 6 14:58:11 hqnl0246134 sshd[224144]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0513 seconds
INFO [2022-12-06 14:58:14,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331494.7675178, 'message': 'Dec 6 14:58:13 hqnl0246134 sshd[224144]: Failed password for root from 61.177.172.104 port 59595 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-06 14:58:14,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331494.7680075, 'message': 'Dec 6 14:58:13 hqnl0246134 sshd[224144]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 14:58:16,806] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331496.7649462, 'message': 'Dec 6 14:58:15 hqnl0246134 sshd[224144]: Failed password for root from 61.177.172.104 port 59595 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0406 seconds
INFO [2022-12-06 14:58:19,662] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:58:19,663] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:58:19,703] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:58:19,761] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0836 seconds
INFO [2022-12-06 14:58:20,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331500.778781, 'message': 'Dec 6 14:58:19 hqnl0246134 sshd[224152]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0914 seconds
INFO [2022-12-06 14:58:21,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331500.7964234, 'message': 'Dec 6 14:58:19 hqnl0246134 sshd[224152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1685 seconds
INFO [2022-12-06 14:58:22,897] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331502.774393, 'message': 'Dec 6 14:58:21 hqnl0246134 sshd[224152]: Failed password for root from 61.177.172.104 port 39271 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1225 seconds
INFO [2022-12-06 14:58:24,687] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:58:24,692] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:58:24,710] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:58:24,751] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0573 seconds
INFO [2022-12-06 14:58:24,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '218.255.9.36', 'timestamp': 1670331504.785266, 'message': 'Dec 6 14:58:23 hqnl0246134 sshd[224161]: Invalid user user from 218.255.9.36 port 35458', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0669 seconds
INFO [2022-12-06 14:58:24,854] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331504.785493, 'message': 'Dec 6 14:58:23 hqnl0246134 sshd[224152]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0672 seconds
INFO [2022-12-06 14:58:24,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '218.255.9.36', 'timestamp': 1670331504.78567, 'message': 'Dec 6 14:58:23 hqnl0246134 sshd[224161]: pam_imunify(sshd:auth): [IM360_RBL] The IP 218.255.9.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 14:58:24,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '218.255.9.36', 'timestamp': 1670331504.7859163, 'message': 'Dec 6 14:58:23 hqnl0246134 sshd[224161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.255.9.36 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 14:58:26,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.81.96', 'timestamp': 1670331506.787782, 'message': 'Dec 6 14:58:25 hqnl0246134 sshd[224166]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.81.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0512 seconds
INFO [2022-12-06 14:58:26,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331506.7886121, 'message': 'Dec 6 14:58:25 hqnl0246134 sshd[224152]: Failed password for root from 61.177.172.104 port 39271 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0515 seconds
INFO [2022-12-06 14:58:26,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '218.255.9.36', 'timestamp': 1670331506.7889109, 'message': 'Dec 6 14:58:25 hqnl0246134 sshd[224161]: Failed password for invalid user user from 218.255.9.36 port 35458 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0514 seconds
INFO [2022-12-06 14:58:26,888] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.81.96', 'timestamp': 1670331506.7880335, 'message': 'Dec 6 14:58:25 hqnl0246134 sshd[224166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.81.96 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0459 seconds
INFO [2022-12-06 14:58:26,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '39.91.167.180', 'timestamp': 1670331506.789275, 'message': 'Dec 6 14:58:26 hqnl0246134 sshd[224167]: pam_imunify(sshd:auth): [IM360_RBL] The IP 39.91.167.180 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0460 seconds
INFO [2022-12-06 14:58:26,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331506.789079, 'message': 'Dec 6 14:58:26 hqnl0246134 sshd[224152]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0457 seconds
INFO [2022-12-06 14:58:26,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '39.91.167.180', 'timestamp': 1670331506.789431, 'message': 'Dec 6 14:58:26 hqnl0246134 sshd[224167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.91.167.180 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 14:58:28,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '218.255.9.36', 'timestamp': 1670331508.7895534, 'message': 'Dec 6 14:58:27 hqnl0246134 sshd[224161]: Disconnected from invalid user user 218.255.9.36 port 35458 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0782 seconds
INFO [2022-12-06 14:58:28,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.81.96', 'timestamp': 1670331508.7899156, 'message': 'Dec 6 14:58:27 hqnl0246134 sshd[224166]: Failed password for root from 43.153.81.96 port 44248 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0790 seconds
INFO [2022-12-06 14:58:28,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331508.790063, 'message': 'Dec 6 14:58:28 hqnl0246134 sshd[224152]: Failed password for root from 61.177.172.104 port 39271 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0789 seconds
INFO [2022-12-06 14:58:28,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '39.91.167.180', 'timestamp': 1670331508.7901845, 'message': 'Dec 6 14:58:28 hqnl0246134 sshd[224167]: Failed password for root from 39.91.167.180 port 58188 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0784 seconds
INFO [2022-12-06 14:58:32,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331512.7929993, 'message': 'Dec 6 14:58:32 hqnl0246134 sshd[224173]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 14:58:32,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331512.7936096, 'message': 'Dec 6 14:58:32 hqnl0246134 sshd[224173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 14:58:34,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331514.796538, 'message': 'Dec 6 14:58:34 hqnl0246134 sshd[224173]: Failed password for root from 61.177.172.104 port 12081 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 14:58:34,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331514.796807, 'message': 'Dec 6 14:58:34 hqnl0246134 sshd[224173]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 14:58:36,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.191.92.38', 'timestamp': 1670331516.7984734, 'message': 'Dec 6 14:58:35 hqnl0246134 sshd[224183]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.191.92.38 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0812 seconds
INFO [2022-12-06 14:58:36,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331516.7993798, 'message': 'Dec 6 14:58:36 hqnl0246134 sshd[224173]: Failed password for root from 61.177.172.104 port 12081 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0806 seconds
INFO [2022-12-06 14:58:36,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.191.92.38', 'timestamp': 1670331516.7989328, 'message': 'Dec 6 14:58:35 hqnl0246134 sshd[224183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.191.92.38 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 14:58:38,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331518.7984822, 'message': 'Dec 6 14:58:36 hqnl0246134 sshd[224173]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0426 seconds
INFO [2022-12-06 14:58:38,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.191.92.38', 'timestamp': 1670331518.7987292, 'message': 'Dec 6 14:58:36 hqnl0246134 sshd[224183]: Failed password for root from 103.191.92.38 port 44356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-06 14:58:40,707] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:58:40,709] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:58:40,719] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:58:40,738] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0287 seconds
INFO [2022-12-06 14:58:40,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331520.8018215, 'message': 'Dec 6 14:58:39 hqnl0246134 sshd[224173]: Failed password for root from 61.177.172.104 port 12081 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0579 seconds
INFO [2022-12-06 14:58:44,863] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331524.8079956, 'message': 'Dec 6 14:58:42 hqnl0246134 sshd[224204]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0539 seconds
INFO [2022-12-06 14:58:44,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331524.8085425, 'message': 'Dec 6 14:58:42 hqnl0246134 sshd[224204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0295 seconds
WARNING [2022-12-06 14:58:46,559] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:58:46,560] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:58:46,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331526.8100123, 'message': 'Dec 6 14:58:44 hqnl0246134 sshd[224204]: Failed password for root from 61.177.172.104 port 23996 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 14:58:46,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331526.8103786, 'message': 'Dec 6 14:58:45 hqnl0246134 sshd[224204]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0390 seconds
INFO [2022-12-06 14:58:48,856] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331528.8174047, 'message': 'Dec 6 14:58:46 hqnl0246134 sshd[224204]: Failed password for root from 61.177.172.104 port 23996 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 14:58:48,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331528.8214316, 'message': 'Dec 6 14:58:47 hqnl0246134 sshd[224204]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0514 seconds
INFO [2022-12-06 14:58:50,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670331530.818334, 'message': 'Dec 6 14:58:49 hqnl0246134 sshd[224204]: Failed password for root from 61.177.172.104 port 23996 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0247 seconds
WARNING [2022-12-06 14:58:54,885] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:58:54,940] defence360agent.internals.the_sink: SensorIncidentList(<16 item(s)>) processed in 0.0682 seconds
INFO [2022-12-06 14:59:20,006] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:59:20,008] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:59:20,032] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:59:20,051] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0330 seconds
INFO [2022-12-06 14:59:20,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.6.106.29', 'timestamp': 1670331560.857952, 'message': 'Dec 6 14:59:19 hqnl0246134 sshd[224268]: Invalid user postgres from 20.6.106.29 port 56326', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-06 14:59:20,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.6.106.29', 'timestamp': 1670331560.8614686, 'message': 'Dec 6 14:59:19 hqnl0246134 sshd[224268]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.6.106.29 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 14:59:20,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.6.106.29', 'timestamp': 1670331560.8616178, 'message': 'Dec 6 14:59:19 hqnl0246134 sshd[224268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.6.106.29 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 14:59:22,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.6.106.29', 'timestamp': 1670331562.8503609, 'message': 'Dec 6 14:59:22 hqnl0246134 sshd[224268]: Failed password for invalid user postgres from 20.6.106.29 port 56326 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 14:59:24,047] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:59:24,048] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:59:24,056] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:59:24,070] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 14:59:24,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.6.106.29', 'timestamp': 1670331564.8508394, 'message': 'Dec 6 14:59:24 hqnl0246134 sshd[224268]: Disconnected from invalid user postgres 20.6.106.29 port 56326 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 14:59:46,566] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 14:59:46,571] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 14:59:48,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.68.50.30', 'timestamp': 1670331588.921037, 'message': 'Dec 6 14:59:48 hqnl0246134 sshd[224298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.68.50.30 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0399 seconds
INFO [2022-12-06 14:59:48,993] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.68.50.30', 'timestamp': 1670331588.9230402, 'message': 'Dec 6 14:59:48 hqnl0246134 sshd[224298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.50.30 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 14:59:51,027] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.68.50.30', 'timestamp': 1670331590.9190297, 'message': 'Dec 6 14:59:50 hqnl0246134 sshd[224298]: Failed password for root from 138.68.50.30 port 52204 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1079 seconds
WARNING [2022-12-06 14:59:54,956] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:59:55,032] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.1564 seconds
INFO [2022-12-06 14:59:55,035] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331594.9270287, 'message': 'Dec 6 14:59:53 hqnl0246134 sshd[224306]: Invalid user http from 45.141.84.10 port 45356', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1080 seconds
INFO [2022-12-06 14:59:57,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331596.9289496, 'message': 'Dec 6 14:59:55 hqnl0246134 sshd[224306]: Failed none for invalid user http from 45.141.84.10 port 45356 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0790 seconds
INFO [2022-12-06 14:59:57,996] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 14:59:57,997] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 14:59:58,010] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 14:59:58,056] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0587 seconds
INFO [2022-12-06 14:59:58,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331598.9305162, 'message': 'Dec 6 14:59:57 hqnl0246134 sshd[224306]: Disconnecting invalid user http 45.141.84.10 port 45356: Change of username or service not allowed: (http,ssh-connection) -> (factory,ssh-connection) [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 15:00:17,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.172.153.100', 'timestamp': 1670331617.134622, 'message': 'Dec 6 15:00:15 hqnl0246134 sshd[224367]: Invalid user cron from 45.172.153.100 port 49334', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0663 seconds
INFO [2022-12-06 15:00:17,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.203.182.218', 'timestamp': 1670331617.1358087, 'message': 'Dec 6 15:00:15 hqnl0246134 sshd[224370]: Invalid user kwx from 159.203.182.218 port 34236', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0669 seconds
INFO [2022-12-06 15:00:17,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.172.153.100', 'timestamp': 1670331617.135451, 'message': 'Dec 6 15:00:15 hqnl0246134 sshd[224367]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.172.153.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0561 seconds
INFO [2022-12-06 15:00:17,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.203.182.218', 'timestamp': 1670331617.1359825, 'message': 'Dec 6 15:00:15 hqnl0246134 sshd[224370]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.203.182.218 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0566 seconds
INFO [2022-12-06 15:00:17,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.172.153.100', 'timestamp': 1670331617.1356602, 'message': 'Dec 6 15:00:15 hqnl0246134 sshd[224367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.172.153.100 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 15:00:17,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.203.182.218', 'timestamp': 1670331617.136107, 'message': 'Dec 6 15:00:15 hqnl0246134 sshd[224370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.182.218 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0442 seconds
INFO [2022-12-06 15:00:19,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.172.153.100', 'timestamp': 1670331619.1272345, 'message': 'Dec 6 15:00:17 hqnl0246134 sshd[224367]: Failed password for invalid user cron from 45.172.153.100 port 49334 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0678 seconds
INFO [2022-12-06 15:00:19,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.203.182.218', 'timestamp': 1670331619.1275003, 'message': 'Dec 6 15:00:17 hqnl0246134 sshd[224370]: Failed password for invalid user kwx from 159.203.182.218 port 34236 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0708 seconds
INFO [2022-12-06 15:00:19,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.172.153.100', 'timestamp': 1670331619.127761, 'message': 'Dec 6 15:00:17 hqnl0246134 sshd[224367]: Disconnected from invalid user cron 45.172.153.100 port 49334 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0603 seconds
INFO [2022-12-06 15:00:19,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.203.182.218', 'timestamp': 1670331619.127643, 'message': 'Dec 6 15:00:17 hqnl0246134 sshd[224370]: Disconnected from invalid user kwx 159.203.182.218 port 34236 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0606 seconds
INFO [2022-12-06 15:00:19,787] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:00:19,788] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:00:19,800] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:00:19,821] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0315 seconds
INFO [2022-12-06 15:00:23,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331623.1311765, 'message': 'Dec 6 15:00:22 hqnl0246134 sshd[224352]: Invalid user factory from 45.141.84.10 port 40237', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1335 seconds
INFO [2022-12-06 15:00:25,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331625.1335092, 'message': 'Dec 6 15:00:23 hqnl0246134 sshd[224352]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.141.84.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1095 seconds
INFO [2022-12-06 15:00:25,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331625.1338553, 'message': 'Dec 6 15:00:23 hqnl0246134 sshd[224352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.141.84.10 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0824 seconds
INFO [2022-12-06 15:00:26,126] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:00:26,127] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:00:26,144] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:00:26,170] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0414 seconds
INFO [2022-12-06 15:00:27,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331627.134684, 'message': 'Dec 6 15:00:25 hqnl0246134 sshd[224352]: Failed password for invalid user factory from 45.141.84.10 port 40237 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0578 seconds
INFO [2022-12-06 15:00:31,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.103.39', 'timestamp': 1670331631.2182822, 'message': 'Dec 6 15:00:29 hqnl0246134 sshd[224394]: Invalid user admin1 from 43.153.103.39 port 41072', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0447 seconds
INFO [2022-12-06 15:00:31,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331631.2216406, 'message': 'Dec 6 15:00:30 hqnl0246134 sshd[224352]: Disconnecting invalid user factory 45.141.84.10 port 40237: Change of username or service not allowed: (factory,ssh-connection) -> (3comcso,ssh-connection) [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0513 seconds
INFO [2022-12-06 15:00:31,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.103.39', 'timestamp': 1670331631.2212856, 'message': 'Dec 6 15:00:29 hqnl0246134 sshd[224394]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.103.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0535 seconds
INFO [2022-12-06 15:00:31,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.103.39', 'timestamp': 1670331631.2214663, 'message': 'Dec 6 15:00:29 hqnl0246134 sshd[224394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.103.39 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0533 seconds
INFO [2022-12-06 15:00:33,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.103.39', 'timestamp': 1670331633.194011, 'message': 'Dec 6 15:00:32 hqnl0246134 sshd[224394]: Failed password for invalid user admin1 from 43.153.103.39 port 41072 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 15:00:33,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.103.39', 'timestamp': 1670331633.1943092, 'message': 'Dec 6 15:00:32 hqnl0246134 sshd[224394]: Disconnected from invalid user admin1 43.153.103.39 port 41072 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
WARNING [2022-12-06 15:00:46,578] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:00:46,581] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 15:00:59,379] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:00:59,668] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 4.7697 seconds
INFO [2022-12-06 15:01:01,585] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '144.22.160.91', 'timestamp': 1670331661.242569, 'message': 'Dec 6 15:01:01 hqnl0246134 sshd[224426]: pam_imunify(sshd:auth): [IM360_RBL] The IP 144.22.160.91 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.3418 seconds
INFO [2022-12-06 15:01:01,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '144.22.160.91', 'timestamp': 1670331661.243087, 'message': 'Dec 6 15:01:01 hqnl0246134 sshd[224426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.160.91 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0908 seconds
INFO [2022-12-06 15:01:02,425] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 15:01:02,566] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 15:01:02,567] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 15:01:02,567] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 15:01:02,567] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 15:01:02,568] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 15:01:02,958] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 15:01:03,166] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.5886 seconds
WARNING [2022-12-06 15:01:03,394] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 15:01:03,470] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:01:03,872] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.8332 seconds
INFO [2022-12-06 15:01:03,875] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.7552 seconds
INFO [2022-12-06 15:01:03,901] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '144.22.160.91', 'timestamp': 1670331663.250032, 'message': 'Dec 6 15:01:02 hqnl0246134 sshd[224426]: Failed password for root from 144.22.160.91 port 44706 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.5460 seconds
INFO [2022-12-06 15:01:17,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331677.2543948, 'message': 'Dec 6 15:01:16 hqnl0246134 sshd[224419]: Invalid user 3comcso from 45.141.84.10 port 59917', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0553 seconds
INFO [2022-12-06 15:01:19,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331679.254944, 'message': 'Dec 6 15:01:17 hqnl0246134 sshd[224419]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.141.84.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0713 seconds
INFO [2022-12-06 15:01:19,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331679.2552223, 'message': 'Dec 6 15:01:17 hqnl0246134 sshd[224419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.141.84.10 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 15:01:21,199] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:01:21,200] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:01:21,226] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:01:21,251] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0491 seconds
INFO [2022-12-06 15:01:21,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.81.96', 'timestamp': 1670331681.2574744, 'message': 'Dec 6 15:01:19 hqnl0246134 sshd[224448]: Invalid user postgres from 43.153.81.96 port 34458', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0747 seconds
INFO [2022-12-06 15:01:21,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331681.2582064, 'message': 'Dec 6 15:01:19 hqnl0246134 sshd[224419]: Failed password for invalid user 3comcso from 45.141.84.10 port 59917 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0752 seconds
INFO [2022-12-06 15:01:21,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.81.96', 'timestamp': 1670331681.2577913, 'message': 'Dec 6 15:01:19 hqnl0246134 sshd[224448]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.81.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 15:01:21,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.81.96', 'timestamp': 1670331681.258019, 'message': 'Dec 6 15:01:19 hqnl0246134 sshd[224448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.81.96 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 15:01:23,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.81.96', 'timestamp': 1670331683.2596862, 'message': 'Dec 6 15:01:22 hqnl0246134 sshd[224448]: Failed password for invalid user postgres from 43.153.81.96 port 34458 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0710 seconds
INFO [2022-12-06 15:01:25,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331685.2670345, 'message': 'Dec 6 15:01:23 hqnl0246134 sshd[224419]: Disconnecting invalid user 3comcso 45.141.84.10 port 59917: Change of username or service not allowed: (3comcso,ssh-connection) -> (,ssh-connection) [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.2901 seconds
INFO [2022-12-06 15:01:25,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.81.96', 'timestamp': 1670331685.2673876, 'message': 'Dec 6 15:01:23 hqnl0246134 sshd[224448]: Disconnected from invalid user postgres 43.153.81.96 port 34458 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.2904 seconds
INFO [2022-12-06 15:01:31,343] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:01:31,350] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:01:31,401] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:01:31,474] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1236 seconds
INFO [2022-12-06 15:01:34,771] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:01:34,771] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:01:34,791] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:01:34,820] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0436 seconds
INFO [2022-12-06 15:01:40,458] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 15:01:40,462] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 15:01:40,463] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 15:01:45,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '92.106.169.34', 'timestamp': 1670331705.3100533, 'message': 'Dec 6 15:01:44 hqnl0246134 sshd[224477]: pam_imunify(sshd:auth): [IM360_RBL] The IP 92.106.169.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0460 seconds
INFO [2022-12-06 15:01:45,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '92.106.169.34', 'timestamp': 1670331705.3111267, 'message': 'Dec 6 15:01:44 hqnl0246134 sshd[224477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.106.169.34 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 15:01:46,584] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:01:46,585] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:01:47,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '92.106.169.34', 'timestamp': 1670331707.3083153, 'message': 'Dec 6 15:01:47 hqnl0246134 sshd[224477]: Failed password for root from 92.106.169.34 port 58382 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 15:01:49,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331709.3108094, 'message': 'Dec 6 15:01:49 hqnl0246134 sshd[224472]: Invalid user from 45.141.84.10 port 38000', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 15:01:51,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.66.204', 'timestamp': 1670331711.3156588, 'message': 'Dec 6 15:01:50 hqnl0246134 sshd[224480]: Invalid user ftp_user from 206.189.66.204 port 50404', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0508 seconds
INFO [2022-12-06 15:01:51,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331711.3168907, 'message': 'Dec 6 15:01:51 hqnl0246134 sshd[224472]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.141.84.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0495 seconds
INFO [2022-12-06 15:01:51,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.189.66.204', 'timestamp': 1670331711.316309, 'message': 'Dec 6 15:01:50 hqnl0246134 sshd[224480]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.189.66.204 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0496 seconds
INFO [2022-12-06 15:01:51,426] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331711.3173444, 'message': 'Dec 6 15:01:51 hqnl0246134 sshd[224472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.141.84.10 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0547 seconds
INFO [2022-12-06 15:01:51,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.189.66.204', 'timestamp': 1670331711.3166623, 'message': 'Dec 6 15:01:51 hqnl0246134 sshd[224480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.66.204 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0320 seconds
WARNING [2022-12-06 15:01:53,306] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 15:01:53,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.66.204', 'timestamp': 1670331713.3406355, 'message': 'Dec 6 15:01:52 hqnl0246134 sshd[224480]: Failed password for invalid user ftp_user from 206.189.66.204 port 50404 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0692 seconds
INFO [2022-12-06 15:01:53,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331713.3414652, 'message': 'Dec 6 15:01:52 hqnl0246134 sshd[224472]: Failed password for invalid user from 45.141.84.10 port 38000 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0697 seconds
WARNING [2022-12-06 15:01:54,931] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:01:55,040] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.1369 seconds
INFO [2022-12-06 15:01:55,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.66.204', 'timestamp': 1670331715.3424025, 'message': 'Dec 6 15:01:53 hqnl0246134 sshd[224480]: Disconnected from invalid user ftp_user 206.189.66.204 port 50404 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0441 seconds
INFO [2022-12-06 15:02:01,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331721.3536863, 'message': 'Dec 6 15:01:59 hqnl0246134 sshd[224472]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.141.84.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 15:02:01,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331721.3548675, 'message': 'Dec 6 15:02:00 hqnl0246134 sshd[224472]: Failed password for invalid user from 45.141.84.10 port 38000 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 15:02:07,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331727.3570213, 'message': 'Dec 6 15:02:06 hqnl0246134 sshd[224472]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.141.84.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0539 seconds
INFO [2022-12-06 15:02:09,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331729.3572721, 'message': 'Dec 6 15:02:08 hqnl0246134 sshd[224472]: Failed password for invalid user from 45.141.84.10 port 38000 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0763 seconds
INFO [2022-12-06 15:02:11,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331731.3584511, 'message': 'Dec 6 15:02:09 hqnl0246134 sshd[224472]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.141.84.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 15:02:11,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331731.3586953, 'message': 'Dec 6 15:02:10 hqnl0246134 sshd[224472]: Failed password for invalid user from 45.141.84.10 port 38000 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 15:02:21,586] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:02:21,587] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:02:21,616] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:02:21,646] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0492 seconds
INFO [2022-12-06 15:02:23,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670331743.3768368, 'message': 'Dec 6 15:02:22 hqnl0246134 sshd[224523]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0675 seconds
INFO [2022-12-06 15:02:23,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331743.377315, 'message': 'Dec 6 15:02:22 hqnl0246134 sshd[224472]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.141.84.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0681 seconds
INFO [2022-12-06 15:02:23,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670331743.3771033, 'message': 'Dec 6 15:02:22 hqnl0246134 sshd[224523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 15:02:25,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670331745.3806345, 'message': 'Dec 6 15:02:24 hqnl0246134 sshd[224523]: Failed password for root from 61.177.173.50 port 57282 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0697 seconds
INFO [2022-12-06 15:02:25,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331745.3828702, 'message': 'Dec 6 15:02:24 hqnl0246134 sshd[224472]: Failed password for invalid user from 45.141.84.10 port 38000 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0706 seconds
INFO [2022-12-06 15:02:26,002] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:02:26,003] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:02:26,032] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:02:26,076] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0725 seconds
INFO [2022-12-06 15:02:27,506] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.6.106.29', 'timestamp': 1670331747.3778887, 'message': 'Dec 6 15:02:26 hqnl0246134 sshd[224530]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.6.106.29 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1282 seconds
INFO [2022-12-06 15:02:27,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670331747.3782613, 'message': 'Dec 6 15:02:27 hqnl0246134 sshd[224523]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1286 seconds
INFO [2022-12-06 15:02:27,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.6.106.29', 'timestamp': 1670331747.3781137, 'message': 'Dec 6 15:02:26 hqnl0246134 sshd[224530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.6.106.29 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0435 seconds
INFO [2022-12-06 15:02:29,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331749.3833697, 'message': 'Dec 6 15:02:28 hqnl0246134 sshd[224472]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.141.84.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1336 seconds
INFO [2022-12-06 15:02:29,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.6.106.29', 'timestamp': 1670331749.3837824, 'message': 'Dec 6 15:02:29 hqnl0246134 sshd[224530]: Failed password for root from 20.6.106.29 port 40020 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1336 seconds
INFO [2022-12-06 15:02:29,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670331749.384018, 'message': 'Dec 6 15:02:29 hqnl0246134 sshd[224523]: Failed password for root from 61.177.173.50 port 57282 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1331 seconds
INFO [2022-12-06 15:02:31,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331751.3846684, 'message': 'Dec 6 15:02:30 hqnl0246134 sshd[224472]: Failed password for invalid user from 45.141.84.10 port 38000 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1086 seconds
INFO [2022-12-06 15:02:31,496] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': None, 'timestamp': 1670331751.385357, 'message': 'Dec 6 15:02:30 hqnl0246134 sshd[224472]: error: maximum authentication attempts exceeded for invalid user from 45.141.84.10 port 38000 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1088 seconds
INFO [2022-12-06 15:02:31,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.141.84.10', 'timestamp': 1670331751.3857064, 'message': 'Dec 6 15:02:30 hqnl0246134 sshd[224472]: Disconnecting invalid user 45.141.84.10 port 38000: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 15:02:33,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670331753.3864093, 'message': 'Dec 6 15:02:31 hqnl0246134 sshd[224523]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0541 seconds
INFO [2022-12-06 15:02:35,514] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:02:35,514] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:02:35,542] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:02:35,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670331755.3871932, 'message': 'Dec 6 15:02:33 hqnl0246134 sshd[224523]: Failed password for root from 61.177.173.50 port 57282 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1913 seconds
INFO [2022-12-06 15:02:35,581] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0649 seconds
INFO [2022-12-06 15:02:37,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670331757.391225, 'message': 'Dec 6 15:02:37 hqnl0246134 sshd[224541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 15:02:37,462] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670331757.391822, 'message': 'Dec 6 15:02:37 hqnl0246134 sshd[224541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 15:02:41,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670331761.3944986, 'message': 'Dec 6 15:02:39 hqnl0246134 sshd[224541]: Failed password for root from 61.177.173.50 port 63514 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0640 seconds
INFO [2022-12-06 15:02:43,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670331763.3964796, 'message': 'Dec 6 15:02:41 hqnl0246134 sshd[224541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
WARNING [2022-12-06 15:02:46,589] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:02:46,590] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 15:02:54,937] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:02:55,069] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.1516 seconds
INFO [2022-12-06 15:02:55,070] defence360agent.internals.the_sink: UnreportableLocalIncidentList(<1 item(s)>) processed in 0.1512 seconds
INFO [2022-12-06 15:03:22,184] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:03:22,189] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:03:22,236] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:03:22,286] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0814 seconds
INFO [2022-12-06 15:03:29,670] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:03:29,672] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:03:29,687] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:03:29,705] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0325 seconds
INFO [2022-12-06 15:03:40,128] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:03:40,129] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:03:40,143] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:03:40,159] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0294 seconds
WARNING [2022-12-06 15:03:46,652] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:03:46,654] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:04:20,666] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:04:20,668] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:04:20,679] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:04:20,719] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0497 seconds
INFO [2022-12-06 15:04:25,450] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:04:25,451] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:04:25,483] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:04:25,497] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0321 seconds
WARNING [2022-12-06 15:04:46,660] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:04:46,664] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:04:57,545] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:04:57,551] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:04:57,570] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:04:57,597] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0445 seconds
INFO [2022-12-06 15:05:20,978] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:05:20,979] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:05:20,992] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:05:21,010] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0296 seconds
INFO [2022-12-06 15:05:24,333] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:05:24,333] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:05:24,345] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:05:24,360] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0261 seconds
WARNING [2022-12-06 15:05:46,669] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:05:46,670] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:06:18,662] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:06:18,663] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:06:18,676] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:06:18,691] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0269 seconds
INFO [2022-12-06 15:06:21,447] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:06:21,448] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:06:21,457] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:06:21,470] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
WARNING [2022-12-06 15:06:46,674] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:06:46,676] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:06:58,020] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:06:58,022] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:06:58,042] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:06:58,071] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0463 seconds
INFO [2022-12-06 15:07:18,312] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:07:18,314] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:07:18,325] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:07:18,340] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0245 seconds
INFO [2022-12-06 15:07:21,189] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:07:21,189] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:07:21,198] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:07:21,209] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
WARNING [2022-12-06 15:07:46,681] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:07:46,684] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:08:18,742] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:08:18,744] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:08:18,759] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:08:18,782] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0359 seconds
INFO [2022-12-06 15:08:21,889] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:08:21,889] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:08:21,904] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:08:21,923] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0331 seconds
INFO [2022-12-06 15:08:24,537] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 15:08:24,615] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 15:08:24,616] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 15:08:24,616] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 15:08:24,616] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 15:08:24,617] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 15:08:24,636] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 15:08:24,657] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0402 seconds
WARNING [2022-12-06 15:08:24,665] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 15:08:24,668] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:08:24,688] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0395 seconds
INFO [2022-12-06 15:08:24,690] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0359 seconds
WARNING [2022-12-06 15:08:46,691] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:08:46,695] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:09:05,726] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 15:09:05,727] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 15:09:05,728] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 15:09:18,187] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:09:18,189] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:09:18,203] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:09:18,218] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0283 seconds
INFO [2022-12-06 15:09:21,243] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:09:21,244] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:09:21,251] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:09:21,263] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 15:09:31,297] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:09:31,297] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:09:31,304] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:09:31,315] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0166 seconds
WARNING [2022-12-06 15:09:46,697] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:09:46,699] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:10:18,233] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:10:18,234] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:10:18,249] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:10:18,271] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0355 seconds
INFO [2022-12-06 15:10:21,465] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:10:21,465] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:10:21,476] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:10:21,488] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
WARNING [2022-12-06 15:10:46,702] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:10:46,703] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:11:18,814] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:11:18,815] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:11:18,827] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:11:18,843] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0263 seconds
INFO [2022-12-06 15:11:23,927] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:11:23,928] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:11:23,936] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:11:23,949] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
WARNING [2022-12-06 15:11:46,707] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:11:46,708] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 15:11:53,310] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 15:12:19,157] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:12:19,159] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:12:19,174] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:12:19,195] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0352 seconds
INFO [2022-12-06 15:12:22,464] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:12:22,464] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:12:22,499] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:12:22,554] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0615 seconds
INFO [2022-12-06 15:12:24,738] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:12:24,738] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:12:24,750] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:12:24,771] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0320 seconds
WARNING [2022-12-06 15:12:46,712] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:12:46,715] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:12:48,712] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:12:48,713] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:12:48,725] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:12:48,742] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0289 seconds
INFO [2022-12-06 15:13:03,153] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 15:13:03,162] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:13:03,175] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0206 seconds
INFO [2022-12-06 15:13:21,129] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:13:21,130] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:13:21,140] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:13:21,154] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0228 seconds
INFO [2022-12-06 15:13:24,180] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:13:24,180] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:13:24,187] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:13:24,200] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 15:13:33,202] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 15:13:33,274] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 15:13:33,275] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 15:13:33,275] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 15:13:33,276] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 15:13:33,276] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 15:13:33,296] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 15:13:33,339] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0616 seconds
WARNING [2022-12-06 15:13:33,347] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 15:13:33,350] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:13:33,370] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0397 seconds
INFO [2022-12-06 15:13:33,372] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0357 seconds
INFO [2022-12-06 15:13:41,208] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:13:41,209] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:13:41,221] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:13:41,237] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0266 seconds
WARNING [2022-12-06 15:13:46,719] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:13:46,720] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:14:03,403] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 15:14:03,404] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 15:14:03,407] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 15:14:19,020] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:14:19,022] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:14:19,035] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:14:19,051] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0277 seconds
INFO [2022-12-06 15:14:22,420] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:14:22,421] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:14:22,432] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:14:22,452] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0305 seconds
WARNING [2022-12-06 15:14:46,723] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:14:46,725] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:15:18,625] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:15:18,626] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:15:18,646] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:15:18,674] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0473 seconds
INFO [2022-12-06 15:15:19,968] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:15:19,969] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:15:19,992] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:15:20,013] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0359 seconds
INFO [2022-12-06 15:15:21,814] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:15:21,815] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:15:21,823] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:22:43,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '39.91.167.180', 'timestamp': 1670332963.1655474, 'message': 'Dec 6 15:22:42 hqnl0246134 sshd[226293]: Invalid user ts3srv from 39.91.167.180 port 35176', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 15:22:45,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '39.91.167.180', 'timestamp': 1670332965.146072, 'message': 'Dec 6 15:22:44 hqnl0246134 sshd[226293]: pam_imunify(sshd:auth): [IM360_RBL] The IP 39.91.167.180 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 15:22:45,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '39.91.167.180', 'timestamp': 1670332965.1465433, 'message': 'Dec 6 15:22:44 hqnl0246134 sshd[226293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.91.167.180 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 15:22:45,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '39.91.167.180', 'timestamp': 1670332965.1468155, 'message': 'Dec 6 15:22:44 hqnl0246134 sshd[226293]: Failed password for invalid user ts3srv from 39.91.167.180 port 35176 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-06 15:22:46,801] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:22:46,802] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:22:47,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '39.91.167.180', 'timestamp': 1670332967.1442983, 'message': 'Dec 6 15:22:45 hqnl0246134 sshd[226293]: Disconnected from invalid user ts3srv 39.91.167.180 port 35176 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 15:23:08,715] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:23:09,634] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 1.2149 seconds
INFO [2022-12-06 15:23:16,563] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670332995.4848375, 'message': 'Dec 6 15:23:13 hqnl0246134 sshd[226328]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 1.0769 seconds
INFO [2022-12-06 15:23:17,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.53', 'timestamp': 1670332995.485682, 'message': 'Dec 6 15:23:13 hqnl0246134 sshd[226328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.53 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.4698 seconds
INFO [2022-12-06 15:23:17,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670332997.2204838, 'message': 'Dec 6 15:23:15 hqnl0246134 sshd[226328]: Failed password for root from 61.177.173.53 port 25578 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.6961 seconds
INFO [2022-12-06 15:23:23,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670332999.2278054, 'message': 'Dec 6 15:23:17 hqnl0246134 sshd[226328]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 4.4211 seconds
INFO [2022-12-06 15:23:23,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670333003.454458, 'message': 'Dec 6 15:23:19 hqnl0246134 sshd[226328]: Failed password for root from 61.177.173.53 port 25578 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1541 seconds
INFO [2022-12-06 15:23:26,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670333006.1712387, 'message': 'Dec 6 15:23:25 hqnl0246134 sshd[226328]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0729 seconds
INFO [2022-12-06 15:23:26,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670333006.1754541, 'message': 'Dec 6 15:23:25 hqnl0246134 sshd[226328]: Failed password for root from 61.177.173.53 port 25578 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 15:23:29,296] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:23:29,298] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:23:29,309] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:23:29,334] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0333 seconds
INFO [2022-12-06 15:23:32,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670333012.15381, 'message': 'Dec 6 15:23:31 hqnl0246134 sshd[226377]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-06 15:23:32,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.53', 'timestamp': 1670333012.1542046, 'message': 'Dec 6 15:23:31 hqnl0246134 sshd[226377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.53 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0515 seconds
INFO [2022-12-06 15:23:32,529] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:23:32,531] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:23:32,539] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:23:32,555] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
INFO [2022-12-06 15:23:33,307] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:23:33,307] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:23:33,315] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:23:33,327] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 15:23:34,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670333014.1543622, 'message': 'Dec 6 15:23:33 hqnl0246134 sshd[226377]: Failed password for root from 61.177.173.53 port 32288 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 15:23:36,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670333016.1585667, 'message': 'Dec 6 15:23:35 hqnl0246134 sshd[226377]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0445 seconds
INFO [2022-12-06 15:23:38,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670333018.1581483, 'message': 'Dec 6 15:23:36 hqnl0246134 sshd[226377]: Failed password for root from 61.177.173.53 port 32288 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 15:23:40,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670333020.160285, 'message': 'Dec 6 15:23:39 hqnl0246134 sshd[226377]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 15:23:42,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670333022.1626103, 'message': 'Dec 6 15:23:41 hqnl0246134 sshd[226377]: Failed password for root from 61.177.173.53 port 32288 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 15:23:46,814] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:23:46,819] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:24:06,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.165.247.254', 'timestamp': 1670333046.192629, 'message': 'Dec 6 15:24:04 hqnl0246134 sshd[227872]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.165.247.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0554 seconds
INFO [2022-12-06 15:24:06,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.165.247.254', 'timestamp': 1670333046.1934912, 'message': 'Dec 6 15:24:04 hqnl0246134 sshd[227872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.247.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0525 seconds
INFO [2022-12-06 15:24:08,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '122.165.247.254', 'timestamp': 1670333048.195843, 'message': 'Dec 6 15:24:06 hqnl0246134 sshd[227872]: Failed password for root from 122.165.247.254 port 54974 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
WARNING [2022-12-06 15:24:08,502] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:24:08,565] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0837 seconds
INFO [2022-12-06 15:24:18,306] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:24:18,308] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:24:18,324] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:24:18,339] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0299 seconds
INFO [2022-12-06 15:24:21,276] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:24:21,277] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:24:21,285] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:24:21,301] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0232 seconds
INFO [2022-12-06 15:24:21,937] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 15:24:22,022] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 15:24:22,023] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 15:24:22,023] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 15:24:22,024] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 15:24:22,024] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 15:24:22,040] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 15:24:22,067] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0428 seconds
WARNING [2022-12-06 15:24:22,077] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 15:24:22,080] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:24:22,103] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0473 seconds
INFO [2022-12-06 15:24:22,105] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0406 seconds
WARNING [2022-12-06 15:24:46,822] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:24:46,823] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:24:52,173] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 15:24:52,174] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 15:24:52,184] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 15:25:00,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '188.32.176.34', 'timestamp': 1670333100.2574234, 'message': 'Dec 6 15:24:59 hqnl0246134 sshd[228174]: Accepted publickey for root from 188.32.176.34 port 49518 ssh2: RSA SHA256:M5XvbkooZmQvvjfo3fKHU5lbqUaXL4LET3qhCF0FT28', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0364 seconds
WARNING [2022-12-06 15:25:08,503] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:25:08,713] defence360agent.internals.the_sink: SensorIncidentList(<1 item(s)>) processed in 0.2278 seconds
INFO [2022-12-06 15:25:19,272] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:25:19,273] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:25:19,283] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:25:19,297] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0229 seconds
INFO [2022-12-06 15:25:22,517] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:25:22,518] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:25:22,545] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:25:22,581] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0483 seconds
WARNING [2022-12-06 15:25:46,827] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:25:46,828] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:26:10,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '114.4.227.194', 'timestamp': 1670333170.3412511, 'message': 'Dec 6 15:26:10 hqnl0246134 sshd[228392]: pam_imunify(sshd:auth): [IM360_RBL] The IP 114.4.227.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 15:26:10,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '114.4.227.194', 'timestamp': 1670333170.342153, 'message': 'Dec 6 15:26:10 hqnl0246134 sshd[228392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.4.227.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 15:26:14,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '114.4.227.194', 'timestamp': 1670333174.3427088, 'message': 'Dec 6 15:26:12 hqnl0246134 sshd[228392]: Failed password for root from 114.4.227.194 port 56080 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0584 seconds
INFO [2022-12-06 15:26:17,702] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:26:17,703] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:26:17,735] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:26:17,790] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0722 seconds
INFO [2022-12-06 15:26:19,176] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:26:19,177] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:26:19,191] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:26:19,202] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 15:26:22,196] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:26:22,197] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:26:22,205] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:26:22,219] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 15:26:30,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333190.3628626, 'message': 'Dec 6 15:26:30 hqnl0246134 sshd[228455]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 15:26:30,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333190.3633533, 'message': 'Dec 6 15:26:30 hqnl0246134 sshd[228455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 15:26:32,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333192.3620324, 'message': 'Dec 6 15:26:32 hqnl0246134 sshd[228455]: Failed password for root from 61.177.173.39 port 23962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 15:26:34,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333194.3642478, 'message': 'Dec 6 15:26:34 hqnl0246134 sshd[228455]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0584 seconds
INFO [2022-12-06 15:26:36,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333196.3659914, 'message': 'Dec 6 15:26:36 hqnl0246134 sshd[228455]: Failed password for root from 61.177.173.39 port 23962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 15:26:38,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333198.3681772, 'message': 'Dec 6 15:26:36 hqnl0246134 sshd[228455]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 15:26:40,392] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333200.3708591, 'message': 'Dec 6 15:26:38 hqnl0246134 sshd[228455]: Failed password for root from 61.177.173.39 port 23962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 15:26:42,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333202.3726535, 'message': 'Dec 6 15:26:40 hqnl0246134 sshd[228463]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 15:26:42,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333202.3741298, 'message': 'Dec 6 15:26:40 hqnl0246134 sshd[228463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 15:26:44,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333204.37546, 'message': 'Dec 6 15:26:43 hqnl0246134 sshd[228463]: Failed password for root from 61.177.173.39 port 46455 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 15:26:44,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333204.3757257, 'message': 'Dec 6 15:26:43 hqnl0246134 sshd[228465]: Invalid user teste from 177.9.50.112 port 44172', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 15:26:44,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333204.3758614, 'message': 'Dec 6 15:26:43 hqnl0246134 sshd[228465]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.9.50.112 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 15:26:44,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333204.3760028, 'message': 'Dec 6 15:26:43 hqnl0246134 sshd[228465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.9.50.112 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 15:26:46,426] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333206.3797047, 'message': 'Dec 6 15:26:44 hqnl0246134 sshd[228463]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0448 seconds
INFO [2022-12-06 15:26:46,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333206.3802977, 'message': 'Dec 6 15:26:45 hqnl0246134 sshd[228465]: Failed password for invalid user teste from 177.9.50.112 port 44172 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0447 seconds
INFO [2022-12-06 15:26:46,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333206.3819218, 'message': 'Dec 6 15:26:46 hqnl0246134 sshd[228465]: Disconnected from invalid user teste 177.9.50.112 port 44172 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
WARNING [2022-12-06 15:26:46,831] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:26:46,832] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:26:48,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333208.3805175, 'message': 'Dec 6 15:26:47 hqnl0246134 sshd[228463]: Failed password for root from 61.177.173.39 port 46455 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 15:26:50,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333210.3819017, 'message': 'Dec 6 15:26:49 hqnl0246134 sshd[228463]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 15:26:52,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333212.3845654, 'message': 'Dec 6 15:26:51 hqnl0246134 sshd[228463]: Failed password for root from 61.177.173.39 port 46455 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 15:26:56,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333216.3896449, 'message': 'Dec 6 15:26:55 hqnl0246134 sshd[228495]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 15:26:56,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333216.3902996, 'message': 'Dec 6 15:26:55 hqnl0246134 sshd[228495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 15:26:58,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333218.3915854, 'message': 'Dec 6 15:26:57 hqnl0246134 sshd[228495]: Failed password for root from 61.177.173.39 port 45843 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 15:26:58,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333218.391872, 'message': 'Dec 6 15:26:57 hqnl0246134 sshd[228495]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 15:27:00,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333220.3941913, 'message': 'Dec 6 15:26:59 hqnl0246134 sshd[228495]: Failed password for root from 61.177.173.39 port 45843 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 15:27:00,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333220.394421, 'message': 'Dec 6 15:26:59 hqnl0246134 sshd[228495]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 15:27:02,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670333222.3978677, 'message': 'Dec 6 15:27:01 hqnl0246134 sshd[228495]: Failed password for root from 61.177.173.39 port 45843 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0365 seconds
WARNING [2022-12-06 15:27:08,506] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:27:08,542] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0491 seconds
INFO [2022-12-06 15:27:18,294] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:27:18,295] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:27:18,305] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:27:18,318] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0222 seconds
INFO [2022-12-06 15:27:21,132] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:27:21,133] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:27:21,141] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:27:21,154] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
WARNING [2022-12-06 15:27:46,834] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:27:46,835] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:28:11,018] defence360agent.files: Updating all files
INFO [2022-12-06 15:28:11,494] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 15:28:11,495] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 15:28:12,021] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 15:28:12,021] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 15:28:12,299] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 15:28:12,299] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 15:28:12,678] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 15:28:12,679] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 15:28:12,679] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 15:28:12,948] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 13:28:12 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E3747B4BFB0B9'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 15:28:12,951] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 15:28:12,952] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 15:28:13,539] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 15:28:13,540] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 15:28:13,807] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 15:28:13,809] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 15:28:14,073] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 15:28:14,075] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 15:28:14,522] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 15:28:14,523] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 15:28:15,137] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 15:28:15,142] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 15:28:18,199] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:28:18,199] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:28:18,210] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:28:18,224] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0241 seconds
INFO [2022-12-06 15:28:21,385] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:28:21,386] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:28:21,393] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:28:21,406] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
WARNING [2022-12-06 15:28:46,991] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:28:47,003] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:29:18,432] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:29:18,434] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:29:18,447] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:29:18,462] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0267 seconds
INFO [2022-12-06 15:29:21,296] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:29:21,297] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:29:21,315] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:29:21,331] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0318 seconds
INFO [2022-12-06 15:29:26,764] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333366.7122033, 'message': 'Dec 6 15:29:25 hqnl0246134 sshd[228691]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.81.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0504 seconds
INFO [2022-12-06 15:29:26,806] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333366.7131758, 'message': 'Dec 6 15:29:25 hqnl0246134 sshd[228691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.81.96 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 15:29:28,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333368.7118611, 'message': 'Dec 6 15:29:27 hqnl0246134 sshd[228691]: Failed password for root from 43.153.81.96 port 53148 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0492 seconds
INFO [2022-12-06 15:29:33,262] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:29:33,262] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:29:33,274] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:29:33,290] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0275 seconds
INFO [2022-12-06 15:29:44,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333384.7354636, 'message': 'Dec 6 15:29:43 hqnl0246134 sshd[228702]: Invalid user jm from 43.153.20.186 port 60892', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 15:29:44,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333384.741436, 'message': 'Dec 6 15:29:43 hqnl0246134 sshd[228702]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.20.186 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 15:29:44,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333384.7416096, 'message': 'Dec 6 15:29:43 hqnl0246134 sshd[228702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.20.186 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 15:29:46,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333386.7369268, 'message': 'Dec 6 15:29:45 hqnl0246134 sshd[228702]: Failed password for invalid user jm from 43.153.20.186 port 60892 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 15:29:46,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333386.7371337, 'message': 'Dec 6 15:29:46 hqnl0246134 sshd[228702]: Disconnected from invalid user jm 43.153.20.186 port 60892 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0340 seconds
WARNING [2022-12-06 15:29:47,007] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:29:47,008] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:29:56,147] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 15:29:56,221] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 15:29:56,222] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 15:29:56,222] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 15:29:56,222] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 15:29:56,223] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 15:29:56,248] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 15:29:56,279] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0534 seconds
WARNING [2022-12-06 15:29:56,291] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 15:29:56,296] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:29:56,317] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0481 seconds
INFO [2022-12-06 15:29:56,319] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0436 seconds
INFO [2022-12-06 15:30:00,806] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.121.203.115', 'timestamp': 1670333400.7543578, 'message': 'Dec 6 15:29:59 hqnl0246134 sshd[228714]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.121.203.115 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0497 seconds
INFO [2022-12-06 15:30:00,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.121.203.115', 'timestamp': 1670333400.7554572, 'message': 'Dec 6 15:29:59 hqnl0246134 sshd[228714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.121.203.115 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 15:30:02,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '186.121.203.115', 'timestamp': 1670333402.755741, 'message': 'Dec 6 15:30:00 hqnl0246134 sshd[228714]: Failed password for root from 186.121.203.115 port 37724 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0774 seconds
WARNING [2022-12-06 15:30:08,529] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:30:08,585] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0868 seconds
INFO [2022-12-06 15:30:14,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333414.7749474, 'message': 'Dec 6 15:30:12 hqnl0246134 sshd[228745]: Invalid user julian from 128.199.68.220 port 37494', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1355 seconds
INFO [2022-12-06 15:30:15,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333414.7777746, 'message': 'Dec 6 15:30:12 hqnl0246134 sshd[228745]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.68.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1489 seconds
INFO [2022-12-06 15:30:15,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333414.7779346, 'message': 'Dec 6 15:30:12 hqnl0246134 sshd[228745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.68.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 15:30:16,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333416.7845478, 'message': 'Dec 6 15:30:15 hqnl0246134 sshd[228745]: Failed password for invalid user julian from 128.199.68.220 port 37494 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0602 seconds
INFO [2022-12-06 15:30:16,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333416.7849715, 'message': 'Dec 6 15:30:16 hqnl0246134 sshd[228745]: Disconnected from invalid user julian 128.199.68.220 port 37494 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0406 seconds
INFO [2022-12-06 15:30:19,441] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:30:19,442] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:30:19,459] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:30:19,483] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0396 seconds
INFO [2022-12-06 15:30:22,840] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:30:22,842] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:30:22,861] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:30:22,882] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0384 seconds
INFO [2022-12-06 15:30:22,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333422.8453836, 'message': 'Dec 6 15:30:20 hqnl0246134 sshd[228766]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 15:30:22,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333422.8457386, 'message': 'Dec 6 15:30:20 hqnl0246134 sshd[228766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 15:30:22,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333422.845963, 'message': 'Dec 6 15:30:22 hqnl0246134 sshd[228766]: Failed password for root from 61.177.173.52 port 17115 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 15:30:24,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333424.7786288, 'message': 'Dec 6 15:30:22 hqnl0246134 sshd[228766]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0433 seconds
INFO [2022-12-06 15:30:24,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333424.7789204, 'message': 'Dec 6 15:30:24 hqnl0246134 sshd[228766]: Failed password for root from 61.177.173.52 port 17115 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0410 seconds
INFO [2022-12-06 15:30:26,348] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 15:30:26,350] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 15:30:26,352] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 15:30:26,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333426.781134, 'message': 'Dec 6 15:30:25 hqnl0246134 sshd[228766]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 15:30:28,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333428.7822928, 'message': 'Dec 6 15:30:27 hqnl0246134 sshd[228766]: Failed password for root from 61.177.173.52 port 17115 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0439 seconds
INFO [2022-12-06 15:30:32,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333432.7877896, 'message': 'Dec 6 15:30:31 hqnl0246134 sshd[228777]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 15:30:32,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333432.7880616, 'message': 'Dec 6 15:30:31 hqnl0246134 sshd[228777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 15:30:34,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333434.7903936, 'message': 'Dec 6 15:30:33 hqnl0246134 sshd[228777]: Failed password for root from 61.177.173.52 port 44618 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 15:30:36,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333436.7941868, 'message': 'Dec 6 15:30:35 hqnl0246134 sshd[228777]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 15:30:38,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333438.7963758, 'message': 'Dec 6 15:30:37 hqnl0246134 sshd[228777]: Failed password for root from 61.177.173.52 port 44618 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 15:30:38,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333438.7966228, 'message': 'Dec 6 15:30:37 hqnl0246134 sshd[228777]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 15:30:40,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670333440.7991095, 'message': 'Dec 6 15:30:40 hqnl0246134 sshd[228777]: Failed password for root from 61.177.173.52 port 44618 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
WARNING [2022-12-06 15:30:47,011] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:30:47,014] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 15:31:08,520] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:31:08,557] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0536 seconds
INFO [2022-12-06 15:31:16,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333476.8552258, 'message': 'Dec 6 15:31:15 hqnl0246134 sshd[228800]: Invalid user administrator from 103.226.250.223 port 41512', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 15:31:16,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333476.8555522, 'message': 'Dec 6 15:31:15 hqnl0246134 sshd[228800]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.226.250.223 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 15:31:16,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333476.855704, 'message': 'Dec 6 15:31:15 hqnl0246134 sshd[228800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.226.250.223 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 15:31:18,593] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:31:18,593] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:31:18,602] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:31:18,617] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0223 seconds
INFO [2022-12-06 15:31:18,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333478.8546028, 'message': 'Dec 6 15:31:17 hqnl0246134 sshd[228800]: Failed password for invalid user administrator from 103.226.250.223 port 41512 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 15:31:20,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333480.8582828, 'message': 'Dec 6 15:31:19 hqnl0246134 sshd[228800]: Disconnected from invalid user administrator 103.226.250.223 port 41512 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 15:31:21,583] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:31:21,584] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:31:21,591] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:31:21,602] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 15:31:22,050] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:31:22,051] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:31:22,058] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:31:22,070] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
WARNING [2022-12-06 15:31:47,017] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:31:47,020] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 15:31:53,322] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 15:32:08,520] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:32:08,552] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0436 seconds
INFO [2022-12-06 15:32:12,950] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333532.9140701, 'message': 'Dec 6 15:32:11 hqnl0246134 sshd[228867]: Invalid user guest from 43.153.81.96 port 43340', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 15:32:12,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333532.9144707, 'message': 'Dec 6 15:32:12 hqnl0246134 sshd[228867]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.81.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 15:32:13,000] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333532.9168983, 'message': 'Dec 6 15:32:12 hqnl0246134 sshd[228867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.81.96 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 15:32:14,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333534.9190657, 'message': 'Dec 6 15:32:14 hqnl0246134 sshd[228867]: Failed password for invalid user guest from 43.153.81.96 port 43340 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 15:32:14,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333534.9193869, 'message': 'Dec 6 15:32:14 hqnl0246134 sshd[228867]: Disconnected from invalid user guest 43.153.81.96 port 43340 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 15:32:16,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333536.9212081, 'message': 'Dec 6 15:32:16 hqnl0246134 sshd[228870]: Invalid user amir from 177.9.50.112 port 42322', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0461 seconds
INFO [2022-12-06 15:32:17,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333536.9214923, 'message': 'Dec 6 15:32:16 hqnl0246134 sshd[228870]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.9.50.112 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0727 seconds
INFO [2022-12-06 15:32:17,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333536.9271188, 'message': 'Dec 6 15:32:16 hqnl0246134 sshd[228870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.9.50.112 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0649 seconds
INFO [2022-12-06 15:32:18,943] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333538.9215617, 'message': 'Dec 6 15:32:18 hqnl0246134 sshd[228870]: Failed password for invalid user amir from 177.9.50.112 port 42322 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 15:32:19,410] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:32:19,411] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:32:19,418] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:32:19,430] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 15:32:20,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333540.9239213, 'message': 'Dec 6 15:32:20 hqnl0246134 sshd[228870]: Disconnected from invalid user amir 177.9.50.112 port 42322 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0535 seconds
INFO [2022-12-06 15:32:22,378] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:32:22,378] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:32:22,406] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:32:22,436] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0570 seconds
INFO [2022-12-06 15:32:30,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333550.9419215, 'message': 'Dec 6 15:32:29 hqnl0246134 sshd[228907]: Invalid user build from 43.153.20.186 port 54656', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 15:32:30,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333550.9434118, 'message': 'Dec 6 15:32:30 hqnl0246134 sshd[228907]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.20.186 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 15:32:30,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333550.9435663, 'message': 'Dec 6 15:32:30 hqnl0246134 sshd[228907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.20.186 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 15:32:32,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333552.9486237, 'message': 'Dec 6 15:32:32 hqnl0246134 sshd[228907]: Failed password for invalid user build from 43.153.20.186 port 54656 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 15:32:34,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333554.9501376, 'message': 'Dec 6 15:32:33 hqnl0246134 sshd[228907]: Disconnected from invalid user build 43.153.20.186 port 54656 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
WARNING [2022-12-06 15:32:47,023] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:32:47,024] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:33:01,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '114.4.227.194', 'timestamp': 1670333580.9972486, 'message': 'Dec 6 15:33:00 hqnl0246134 sshd[228925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 114.4.227.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 15:33:01,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '114.4.227.194', 'timestamp': 1670333580.9984913, 'message': 'Dec 6 15:33:00 hqnl0246134 sshd[228925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.4.227.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 15:33:03,005] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '114.4.227.194', 'timestamp': 1670333582.985917, 'message': 'Dec 6 15:33:02 hqnl0246134 sshd[228925]: Failed password for root from 114.4.227.194 port 49146 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 15:33:08,522] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:33:08,780] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.2675 seconds
INFO [2022-12-06 15:33:19,338] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:33:19,339] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:33:19,429] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:33:19,475] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1243 seconds
INFO [2022-12-06 15:33:22,386] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:33:22,387] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:33:22,397] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:33:22,408] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 15:33:33,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333613.0377045, 'message': 'Dec 6 15:33:32 hqnl0246134 sshd[228967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0471 seconds
INFO [2022-12-06 15:33:33,146] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333613.0384347, 'message': 'Dec 6 15:33:32 hqnl0246134 sshd[228967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0576 seconds
INFO [2022-12-06 15:33:35,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333615.030911, 'message': 'Dec 6 15:33:34 hqnl0246134 sshd[228967]: Failed password for root from 61.177.173.51 port 53442 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 15:33:37,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333617.0325658, 'message': 'Dec 6 15:33:36 hqnl0246134 sshd[228967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 15:33:39,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333619.0341413, 'message': 'Dec 6 15:33:37 hqnl0246134 sshd[228973]: Invalid user guest from 128.199.68.220 port 55416', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 15:33:39,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333619.034857, 'message': 'Dec 6 15:33:38 hqnl0246134 sshd[228967]: Failed password for root from 61.177.173.51 port 53442 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 15:33:39,097] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333619.034315, 'message': 'Dec 6 15:33:37 hqnl0246134 sshd[228973]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.68.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 15:33:39,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333619.0350285, 'message': 'Dec 6 15:33:38 hqnl0246134 sshd[228967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 15:33:39,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333619.0344548, 'message': 'Dec 6 15:33:37 hqnl0246134 sshd[228973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.68.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 15:33:41,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333621.0367725, 'message': 'Dec 6 15:33:39 hqnl0246134 sshd[228973]: Failed password for invalid user guest from 128.199.68.220 port 55416 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0687 seconds
INFO [2022-12-06 15:33:41,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670333621.0431418, 'message': 'Dec 6 15:33:40 hqnl0246134 sshd[228976]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0774 seconds
INFO [2022-12-06 15:33:41,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333621.0433557, 'message': 'Dec 6 15:33:40 hqnl0246134 sshd[228967]: Failed password for root from 61.177.173.51 port 53442 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0786 seconds
INFO [2022-12-06 15:33:41,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333621.0429735, 'message': 'Dec 6 15:33:40 hqnl0246134 sshd[228973]: Disconnected from invalid user guest 128.199.68.220 port 55416 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0558 seconds
INFO [2022-12-06 15:33:41,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670333621.0432527, 'message': 'Dec 6 15:33:40 hqnl0246134 sshd[228976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 user=uucp', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0464 seconds
INFO [2022-12-06 15:33:43,009] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:33:43,009] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:33:43,016] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:33:43,028] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 15:33:43,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '152.89.196.220', 'timestamp': 1670333623.037627, 'message': 'Dec 6 15:33:42 hqnl0246134 sshd[228976]: Failed password for uucp from 152.89.196.220 port 54366 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 15:33:43,068] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333623.038465, 'message': 'Dec 6 15:33:42 hqnl0246134 sshd[228980]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 15:33:43,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333623.0386086, 'message': 'Dec 6 15:33:42 hqnl0246134 sshd[228980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 15:33:47,026] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:33:47,027] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:33:47,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333627.0419762, 'message': 'Dec 6 15:33:45 hqnl0246134 sshd[228980]: Failed password for root from 61.177.173.51 port 30524 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 15:33:47,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333627.0422168, 'message': 'Dec 6 15:33:47 hqnl0246134 sshd[228980]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 15:33:49,071] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333629.0428264, 'message': 'Dec 6 15:33:49 hqnl0246134 sshd[228980]: Failed password for root from 61.177.173.51 port 30524 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 15:33:51,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333631.0459778, 'message': 'Dec 6 15:33:49 hqnl0246134 sshd[228980]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 15:33:51,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670333631.053448, 'message': 'Dec 6 15:33:50 hqnl0246134 sshd[228980]: Failed password for root from 61.177.173.51 port 30524 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
WARNING [2022-12-06 15:34:08,745] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:34:09,101] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.5809 seconds
INFO [2022-12-06 15:34:18,332] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:34:18,333] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:34:18,342] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:34:18,355] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 15:34:21,805] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:34:21,806] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:34:21,814] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:34:21,828] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
WARNING [2022-12-06 15:34:47,030] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:34:47,032] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:34:57,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333697.126071, 'message': 'Dec 6 15:34:56 hqnl0246134 sshd[229054]: Invalid user julian from 43.153.81.96 port 33518', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0848 seconds
INFO [2022-12-06 15:34:57,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333697.1276157, 'message': 'Dec 6 15:34:56 hqnl0246134 sshd[229054]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.81.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-06 15:34:57,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333697.1279867, 'message': 'Dec 6 15:34:56 hqnl0246134 sshd[229054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.81.96 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 15:34:59,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333699.1237574, 'message': 'Dec 6 15:34:58 hqnl0246134 sshd[229054]: Failed password for invalid user julian from 43.153.81.96 port 33518 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0436 seconds
INFO [2022-12-06 15:34:59,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.81.96', 'timestamp': 1670333699.1440043, 'message': 'Dec 6 15:34:58 hqnl0246134 sshd[229054]: Disconnected from invalid user julian 43.153.81.96 port 33518 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 15:35:01,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333701.1245732, 'message': 'Dec 6 15:34:59 hqnl0246134 sshd[229058]: Invalid user tsserver from 103.226.250.223 port 43412', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 15:35:01,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333701.1248746, 'message': 'Dec 6 15:34:59 hqnl0246134 sshd[229058]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.226.250.223 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 15:35:01,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333701.1250997, 'message': 'Dec 6 15:34:59 hqnl0246134 sshd[229058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.226.250.223 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0509 seconds
INFO [2022-12-06 15:35:03,437] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:35:03,438] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:35:03,469] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:35:03,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333703.1277578, 'message': 'Dec 6 15:35:01 hqnl0246134 sshd[229058]: Failed password for invalid user tsserver from 103.226.250.223 port 43412 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.3703 seconds
INFO [2022-12-06 15:35:03,512] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0714 seconds
INFO [2022-12-06 15:35:03,533] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333703.1364288, 'message': 'Dec 6 15:35:02 hqnl0246134 sshd[229058]: Disconnected from invalid user tsserver 103.226.250.223 port 43412 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0340 seconds
WARNING [2022-12-06 15:35:08,536] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:35:08,577] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0526 seconds
INFO [2022-12-06 15:35:17,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.148.81.208', 'timestamp': 1670333717.1480887, 'message': 'Dec 6 15:35:16 hqnl0246134 sshd[229107]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.148.81.208 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0481 seconds
INFO [2022-12-06 15:35:17,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.148.81.208', 'timestamp': 1670333717.1488087, 'message': 'Dec 6 15:35:16 hqnl0246134 sshd[229107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.148.81.208 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 15:35:18,621] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:35:18,621] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:35:18,629] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:35:18,640] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 15:35:19,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '34.148.81.208', 'timestamp': 1670333719.148478, 'message': 'Dec 6 15:35:18 hqnl0246134 sshd[229107]: Failed password for root from 34.148.81.208 port 37790 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 15:35:21,695] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:35:21,696] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:35:21,749] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:35:21,777] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0636 seconds
INFO [2022-12-06 15:35:25,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333725.1550047, 'message': 'Dec 6 15:35:24 hqnl0246134 sshd[229131]: Invalid user test from 43.153.20.186 port 60050', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 15:35:25,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333725.155493, 'message': 'Dec 6 15:35:24 hqnl0246134 sshd[229131]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.20.186 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 15:35:25,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333725.1556454, 'message': 'Dec 6 15:35:24 hqnl0246134 sshd[229131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.20.186 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 15:35:27,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333727.1565335, 'message': 'Dec 6 15:35:26 hqnl0246134 sshd[229131]: Failed password for invalid user test from 43.153.20.186 port 60050 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0667 seconds
INFO [2022-12-06 15:35:27,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.20.186', 'timestamp': 1670333727.156729, 'message': 'Dec 6 15:35:27 hqnl0246134 sshd[229131]: Disconnected from invalid user test 43.153.20.186 port 60050 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0534 seconds
WARNING [2022-12-06 15:35:47,036] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:35:47,038] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:36:01,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333761.1982036, 'message': 'Dec 6 15:36:00 hqnl0246134 sshd[229148]: Invalid user vbox from 177.9.50.112 port 48090', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0451 seconds
INFO [2022-12-06 15:36:01,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333761.2001987, 'message': 'Dec 6 15:36:00 hqnl0246134 sshd[229148]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.9.50.112 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 15:36:01,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333761.2006228, 'message': 'Dec 6 15:36:00 hqnl0246134 sshd[229148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.9.50.112 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 15:36:03,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333763.19661, 'message': 'Dec 6 15:36:02 hqnl0246134 sshd[229148]: Failed password for invalid user vbox from 177.9.50.112 port 48090 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 15:36:05,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333765.1976073, 'message': 'Dec 6 15:36:04 hqnl0246134 sshd[229148]: Disconnected from invalid user vbox 177.9.50.112 port 48090 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 15:36:07,812] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:36:07,812] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:36:07,821] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:36:07,835] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
WARNING [2022-12-06 15:36:08,535] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:36:08,640] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.1123 seconds
INFO [2022-12-06 15:36:18,256] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:36:18,257] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:36:18,271] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:36:18,296] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0378 seconds
INFO [2022-12-06 15:36:19,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.39.193', 'timestamp': 1670333779.2132277, 'message': 'Dec 6 15:36:18 hqnl0246134 sshd[229175]: Invalid user elk from 104.131.39.193 port 44554', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0436 seconds
INFO [2022-12-06 15:36:19,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '104.131.39.193', 'timestamp': 1670333779.2134736, 'message': 'Dec 6 15:36:18 hqnl0246134 sshd[229175]: pam_imunify(sshd:auth): [IM360_RBL] The IP 104.131.39.193 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 15:36:19,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '104.131.39.193', 'timestamp': 1670333779.2136292, 'message': 'Dec 6 15:36:18 hqnl0246134 sshd[229175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.39.193 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 15:36:21,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.39.193', 'timestamp': 1670333781.213909, 'message': 'Dec 6 15:36:20 hqnl0246134 sshd[229175]: Failed password for invalid user elk from 104.131.39.193 port 44554 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 15:36:21,875] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:36:21,875] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:36:21,882] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:36:21,894] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 15:36:23,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.39.193', 'timestamp': 1670333783.21755, 'message': 'Dec 6 15:36:21 hqnl0246134 sshd[229175]: Disconnected from invalid user elk 104.131.39.193 port 44554 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 15:36:37,390] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 15:36:37,460] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 15:36:37,461] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 15:36:37,461] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 15:36:37,461] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 15:36:37,462] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 15:36:37,474] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 15:36:37,508] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0456 seconds
WARNING [2022-12-06 15:36:37,515] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 15:36:37,518] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:36:37,537] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0360 seconds
INFO [2022-12-06 15:36:37,539] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0333 seconds
WARNING [2022-12-06 15:36:47,043] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:36:47,044] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:36:49,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '114.4.227.194', 'timestamp': 1670333809.268901, 'message': 'Dec 6 15:36:48 hqnl0246134 sshd[229194]: pam_imunify(sshd:auth): [IM360_RBL] The IP 114.4.227.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 15:36:49,324] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '114.4.227.194', 'timestamp': 1670333809.269364, 'message': 'Dec 6 15:36:48 hqnl0246134 sshd[229194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.4.227.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 15:36:51,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '114.4.227.194', 'timestamp': 1670333811.2723992, 'message': 'Dec 6 15:36:50 hqnl0246134 sshd[229194]: Failed password for root from 114.4.227.194 port 39314 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 15:36:53,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333813.27661, 'message': 'Dec 6 15:36:51 hqnl0246134 sshd[229196]: Invalid user user from 128.199.68.220 port 45114', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 15:36:53,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333813.2770934, 'message': 'Dec 6 15:36:51 hqnl0246134 sshd[229196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.68.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 15:36:53,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333813.2774408, 'message': 'Dec 6 15:36:51 hqnl0246134 sshd[229196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.68.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 15:36:55,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333815.2782564, 'message': 'Dec 6 15:36:53 hqnl0246134 sshd[229196]: Failed password for invalid user user from 128.199.68.220 port 45114 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 15:36:55,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.68.220', 'timestamp': 1670333815.2785053, 'message': 'Dec 6 15:36:53 hqnl0246134 sshd[229196]: Disconnected from invalid user user 128.199.68.220 port 45114 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 15:37:07,588] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 15:37:07,588] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 15:37:07,589] im360.plugins.client360: Waiting 6 minutes before retry...
WARNING [2022-12-06 15:37:08,544] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:37:08,854] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.3217 seconds
INFO [2022-12-06 15:37:11,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.85.27.201', 'timestamp': 1670333831.3076766, 'message': 'Dec 6 15:37:10 hqnl0246134 sshd[229231]: Invalid user rsync from 95.85.27.201 port 50446', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 15:37:11,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.85.27.201', 'timestamp': 1670333831.307927, 'message': 'Dec 6 15:37:10 hqnl0246134 sshd[229231]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.85.27.201 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 15:37:11,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.85.27.201', 'timestamp': 1670333831.3091276, 'message': 'Dec 6 15:37:10 hqnl0246134 sshd[229231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.27.201 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 15:37:13,328] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.85.27.201', 'timestamp': 1670333833.3076646, 'message': 'Dec 6 15:37:11 hqnl0246134 sshd[229231]: Failed password for invalid user rsync from 95.85.27.201 port 50446 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 15:37:13,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.85.27.201', 'timestamp': 1670333833.3080084, 'message': 'Dec 6 15:37:12 hqnl0246134 sshd[229231]: Disconnected from invalid user rsync 95.85.27.201 port 50446 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 15:37:18,334] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:37:18,335] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:37:18,372] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:37:18,402] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0465 seconds
INFO [2022-12-06 15:37:21,154] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:37:21,155] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:37:21,164] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:37:21,178] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0222 seconds
WARNING [2022-12-06 15:37:47,047] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:37:47,049] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 15:38:08,632] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:38:08,766] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.2262 seconds
INFO [2022-12-06 15:38:18,308] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:38:18,309] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:38:18,319] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:38:18,334] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0243 seconds
INFO [2022-12-06 15:38:19,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '2.200.248.77', 'timestamp': 1670333899.3800519, 'message': 'Dec 6 15:38:18 hqnl0246134 sshd[229313]: Invalid user isaac from 2.200.248.77 port 58978', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 15:38:19,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '2.200.248.77', 'timestamp': 1670333899.3857913, 'message': 'Dec 6 15:38:18 hqnl0246134 sshd[229313]: pam_imunify(sshd:auth): [IM360_RBL] The IP 2.200.248.77 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 15:38:19,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '2.200.248.77', 'timestamp': 1670333899.385919, 'message': 'Dec 6 15:38:18 hqnl0246134 sshd[229313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.200.248.77 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 15:38:21,300] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:38:21,301] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:38:21,309] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:38:21,321] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 15:38:21,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '2.200.248.77', 'timestamp': 1670333901.380896, 'message': 'Dec 6 15:38:20 hqnl0246134 sshd[229313]: Failed password for invalid user isaac from 2.200.248.77 port 58978 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 15:38:21,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '2.200.248.77', 'timestamp': 1670333901.3810937, 'message': 'Dec 6 15:38:20 hqnl0246134 sshd[229313]: Disconnected from invalid user isaac 2.200.248.77 port 58978 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 15:38:23,516] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:38:23,516] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:38:23,532] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:38:23,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333903.384082, 'message': 'Dec 6 15:38:21 hqnl0246134 sshd[229315]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1684 seconds
INFO [2022-12-06 15:38:23,554] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0371 seconds
INFO [2022-12-06 15:38:23,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333903.5185475, 'message': 'Dec 6 15:38:21 hqnl0246134 sshd[229315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 15:38:23,597] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333903.5189455, 'message': 'Dec 6 15:38:23 hqnl0246134 sshd[229315]: Failed password for root from 61.177.173.36 port 30157 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 15:38:27,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333907.3877566, 'message': 'Dec 6 15:38:25 hqnl0246134 sshd[229315]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 15:38:29,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333909.390245, 'message': 'Dec 6 15:38:27 hqnl0246134 sshd[229315]: Failed password for root from 61.177.173.36 port 30157 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 15:38:31,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333911.39227, 'message': 'Dec 6 15:38:29 hqnl0246134 sshd[229315]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 15:38:33,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333913.3955472, 'message': 'Dec 6 15:38:31 hqnl0246134 sshd[229315]: Failed password for root from 61.177.173.36 port 30157 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 15:38:37,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670333917.400495, 'message': 'Dec 6 15:38:37 hqnl0246134 sshd[229340]: Invalid user tor from 133.130.99.35 port 33624', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 15:38:37,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333917.4007132, 'message': 'Dec 6 15:38:37 hqnl0246134 sshd[229337]: Invalid user postgres from 103.226.250.223 port 57414', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 15:38:37,471] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '133.130.99.35', 'timestamp': 1670333917.4012346, 'message': 'Dec 6 15:38:37 hqnl0246134 sshd[229340]: pam_imunify(sshd:auth): [IM360_RBL] The IP 133.130.99.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 15:38:37,472] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333917.4008625, 'message': 'Dec 6 15:38:37 hqnl0246134 sshd[229337]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.226.250.223 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 15:38:37,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '133.130.99.35', 'timestamp': 1670333917.4013898, 'message': 'Dec 6 15:38:37 hqnl0246134 sshd[229340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.99.35 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 15:38:37,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333917.4010873, 'message': 'Dec 6 15:38:37 hqnl0246134 sshd[229337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.226.250.223 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 15:38:39,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333919.4024627, 'message': 'Dec 6 15:38:37 hqnl0246134 sshd[229338]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 15:38:39,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333919.4029014, 'message': 'Dec 6 15:38:39 hqnl0246134 sshd[229337]: Failed password for invalid user postgres from 103.226.250.223 port 57414 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 15:38:39,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333919.4027486, 'message': 'Dec 6 15:38:37 hqnl0246134 sshd[229338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 15:38:41,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670333921.4042482, 'message': 'Dec 6 15:38:39 hqnl0246134 sshd[229340]: Failed password for invalid user tor from 133.130.99.35 port 33624 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 15:38:41,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333921.404432, 'message': 'Dec 6 15:38:39 hqnl0246134 sshd[229338]: Failed password for root from 61.177.173.36 port 42973 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 15:38:43,472] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.226.250.223', 'timestamp': 1670333923.4059262, 'message': 'Dec 6 15:38:41 hqnl0246134 sshd[229337]: Disconnected from invalid user postgres 103.226.250.223 port 57414 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0659 seconds
INFO [2022-12-06 15:38:43,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670333923.4061809, 'message': 'Dec 6 15:38:41 hqnl0246134 sshd[229340]: Disconnected from invalid user tor 133.130.99.35 port 33624 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0667 seconds
INFO [2022-12-06 15:38:43,474] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333923.4063096, 'message': 'Dec 6 15:38:42 hqnl0246134 sshd[229338]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0668 seconds
INFO [2022-12-06 15:38:45,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333925.406959, 'message': 'Dec 6 15:38:44 hqnl0246134 sshd[229338]: Failed password for root from 61.177.173.36 port 42973 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0350 seconds
WARNING [2022-12-06 15:38:47,051] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:38:47,053] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:38:47,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333927.4090428, 'message': 'Dec 6 15:38:46 hqnl0246134 sshd[229338]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0466 seconds
INFO [2022-12-06 15:38:49,487] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333929.4109957, 'message': 'Dec 6 15:38:48 hqnl0246134 sshd[229338]: Failed password for root from 61.177.173.36 port 42973 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0760 seconds
INFO [2022-12-06 15:38:53,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333933.4154625, 'message': 'Dec 6 15:38:52 hqnl0246134 sshd[229354]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 15:38:53,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333933.4158726, 'message': 'Dec 6 15:38:52 hqnl0246134 sshd[229354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 15:38:55,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333935.4165528, 'message': 'Dec 6 15:38:54 hqnl0246134 sshd[229354]: Failed password for root from 61.177.173.36 port 52161 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 15:38:55,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333935.4167974, 'message': 'Dec 6 15:38:54 hqnl0246134 sshd[229354]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 15:38:57,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333937.4190564, 'message': 'Dec 6 15:38:56 hqnl0246134 sshd[229354]: Failed password for root from 61.177.173.36 port 52161 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 15:38:59,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333939.420151, 'message': 'Dec 6 15:38:59 hqnl0246134 sshd[229354]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 15:39:01,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670333941.4747388, 'message': 'Dec 6 15:39:01 hqnl0246134 sshd[229354]: Failed password for root from 61.177.173.36 port 52161 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
WARNING [2022-12-06 15:39:08,619] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:39:08,849] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.2915 seconds
INFO [2022-12-06 15:39:18,048] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:39:18,049] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:39:18,058] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:39:18,075] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0229 seconds
INFO [2022-12-06 15:39:21,402] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:39:21,403] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:39:21,568] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:39:21,682] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.2780 seconds
INFO [2022-12-06 15:39:39,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333979.5583823, 'message': 'Dec 6 15:39:39 hqnl0246134 sshd[229544]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.9.50.112 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 15:39:39,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333979.5594647, 'message': 'Dec 6 15:39:39 hqnl0246134 sshd[229544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.9.50.112 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 15:39:41,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '177.9.50.112', 'timestamp': 1670333981.5563147, 'message': 'Dec 6 15:39:40 hqnl0246134 sshd[229544]: Failed password for root from 177.9.50.112 port 51712 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 15:39:44,373] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:39:44,374] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:39:44,383] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:39:44,394] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
WARNING [2022-12-06 15:39:47,056] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:39:47,057] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 15:40:08,573] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:40:08,599] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0375 seconds
INFO [2022-12-06 15:40:18,242] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:40:18,243] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:40:18,253] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:40:18,266] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0224 seconds
INFO [2022-12-06 15:40:21,211] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:40:21,212] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:40:21,219] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:40:21,231] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 15:40:27,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.144.167.169', 'timestamp': 1670334027.6152635, 'message': 'Dec 6 15:40:26 hqnl0246134 sshd[229617]: Invalid user test from 59.144.167.169 port 53458', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 15:40:27,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.144.167.169', 'timestamp': 1670334027.6158876, 'message': 'Dec 6 15:40:26 hqnl0246134 sshd[229617]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.144.167.169 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 15:40:27,673] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.144.167.169', 'timestamp': 1670334027.621953, 'message': 'Dec 6 15:40:26 hqnl0246134 sshd[229617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.167.169 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 15:40:29,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.144.167.169', 'timestamp': 1670334029.615964, 'message': 'Dec 6 15:40:28 hqnl0246134 sshd[229617]: Failed password for invalid user test from 59.144.167.169 port 53458 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 15:40:39,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334039.6254451, 'message': 'Dec 6 15:40:37 hqnl0246134 sshd[229619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 15:40:39,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334039.6260467, 'message': 'Dec 6 15:40:37 hqnl0246134 sshd[229619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 15:40:39,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334039.6263022, 'message': 'Dec 6 15:40:39 hqnl0246134 sshd[229619]: Failed password for root from 222.168.30.19 port 1650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 15:40:41,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334041.6258032, 'message': 'Dec 6 15:40:39 hqnl0246134 sshd[229619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 15:40:43,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334043.626555, 'message': 'Dec 6 15:40:41 hqnl0246134 sshd[229619]: Failed password for root from 222.168.30.19 port 1650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 15:40:45,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334045.6291242, 'message': 'Dec 6 15:40:44 hqnl0246134 sshd[229619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 15:40:45,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '114.4.227.194', 'timestamp': 1670334045.6328557, 'message': 'Dec 6 15:40:44 hqnl0246134 sshd[229622]: Invalid user yt from 114.4.227.194 port 57732', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 15:40:45,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '114.4.227.194', 'timestamp': 1670334045.6336803, 'message': 'Dec 6 15:40:44 hqnl0246134 sshd[229622]: pam_imunify(sshd:auth): [IM360_RBL] The IP 114.4.227.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 15:40:45,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '114.4.227.194', 'timestamp': 1670334045.6338325, 'message': 'Dec 6 15:40:44 hqnl0246134 sshd[229622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.4.227.194 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0225 seconds
WARNING [2022-12-06 15:40:47,060] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:40:47,060] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:40:47,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334047.6310835, 'message': 'Dec 6 15:40:46 hqnl0246134 sshd[229619]: Failed password for root from 222.168.30.19 port 1650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0468 seconds
INFO [2022-12-06 15:40:47,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '114.4.227.194', 'timestamp': 1670334047.6315005, 'message': 'Dec 6 15:40:46 hqnl0246134 sshd[229622]: Failed password for invalid user yt from 114.4.227.194 port 57732 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0479 seconds
INFO [2022-12-06 15:40:47,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.85.27.201', 'timestamp': 1670334047.6316073, 'message': 'Dec 6 15:40:47 hqnl0246134 sshd[229624]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.85.27.201 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0483 seconds
INFO [2022-12-06 15:40:47,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334047.6313663, 'message': 'Dec 6 15:40:46 hqnl0246134 sshd[229619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0482 seconds
INFO [2022-12-06 15:40:47,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.85.27.201', 'timestamp': 1670334047.63175, 'message': 'Dec 6 15:40:47 hqnl0246134 sshd[229624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.27.201 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0465 seconds
INFO [2022-12-06 15:40:49,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '114.4.227.194', 'timestamp': 1670334049.6371143, 'message': 'Dec 6 15:40:48 hqnl0246134 sshd[229622]: Disconnected from invalid user yt 114.4.227.194 port 57732 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0621 seconds
INFO [2022-12-06 15:40:49,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334049.637391, 'message': 'Dec 6 15:40:48 hqnl0246134 sshd[229619]: Failed password for root from 222.168.30.19 port 1650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0629 seconds
INFO [2022-12-06 15:40:49,702] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '95.85.27.201', 'timestamp': 1670334049.6376853, 'message': 'Dec 6 15:40:48 hqnl0246134 sshd[229624]: Failed password for root from 95.85.27.201 port 35246 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0629 seconds
INFO [2022-12-06 15:40:49,721] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334049.637552, 'message': 'Dec 6 15:40:48 hqnl0246134 sshd[229619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 15:40:51,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334051.637609, 'message': 'Dec 6 15:40:50 hqnl0246134 sshd[229619]: Failed password for root from 222.168.30.19 port 1650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 15:40:51,677] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334051.6377935, 'message': 'Dec 6 15:40:51 hqnl0246134 sshd[229619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 15:40:53,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334053.6386623, 'message': 'Dec 6 15:40:53 hqnl0246134 sshd[229619]: Failed password for root from 222.168.30.19 port 1650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 15:40:55,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5758, 'attackers_ip': '222.168.30.19', 'timestamp': 1670334055.6412647, 'message': 'Dec 6 15:40:55 hqnl0246134 sshd[229619]: error: maximum authentication attempts exceeded for root from 222.168.30.19 port 1650 ssh2 [preauth]', 'severity': 3, 'name': 'Maximum authentication attempts exceeded.', 'tag': []}) processed in 0.0230 seconds
WARNING [2022-12-06 15:41:08,583] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:41:08,945] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.3778 seconds
INFO [2022-12-06 15:41:20,260] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:41:20,261] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:41:20,269] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:41:20,281] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 15:41:23,283] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:41:23,284] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:41:23,311] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:41:23,343] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0493 seconds
INFO [2022-12-06 15:41:27,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.169.175.102', 'timestamp': 1670334087.6779826, 'message': 'Dec 6 15:41:26 hqnl0246134 sshd[229669]: Invalid user user1 from 194.169.175.102 port 55372', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 15:41:27,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.169.175.102', 'timestamp': 1670334087.6784284, 'message': 'Dec 6 15:41:26 hqnl0246134 sshd[229669]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.169.175.102 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 15:41:27,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.169.175.102', 'timestamp': 1670334087.6786218, 'message': 'Dec 6 15:41:26 hqnl0246134 sshd[229669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 15:41:29,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.169.175.102', 'timestamp': 1670334089.6790366, 'message': 'Dec 6 15:41:29 hqnl0246134 sshd[229669]: Failed password for invalid user user1 from 194.169.175.102 port 55372 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 15:41:31,702] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.169.175.102', 'timestamp': 1670334091.681408, 'message': 'Dec 6 15:41:30 hqnl0246134 sshd[229669]: Disconnected from invalid user user1 194.169.175.102 port 55372 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 15:41:33,812] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:41:33,813] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:41:33,820] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:41:33,833] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
WARNING [2022-12-06 15:41:47,063] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:41:47,064] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 15:41:53,325] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 15:42:08,593] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:42:08,628] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0525 seconds
INFO [2022-12-06 15:42:15,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.228.25', 'timestamp': 1670334135.725766, 'message': 'Dec 6 15:42:13 hqnl0246134 sshd[229702]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.228.25 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0545 seconds
INFO [2022-12-06 15:42:15,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.228.25', 'timestamp': 1670334135.7263465, 'message': 'Dec 6 15:42:13 hqnl0246134 sshd[229702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.228.25 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0596 seconds
INFO [2022-12-06 15:42:17,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '128.199.228.25', 'timestamp': 1670334137.725546, 'message': 'Dec 6 15:42:15 hqnl0246134 sshd[229702]: Failed password for root from 128.199.228.25 port 56812 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 15:42:18,127] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:42:18,127] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:42:18,134] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:42:18,146] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 15:42:21,321] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:42:21,322] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:42:21,330] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:42:21,343] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 15:42:39,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334159.7516117, 'message': 'Dec 6 15:42:38 hqnl0246134 sshd[229729]: Invalid user csgo from 186.121.203.115 port 60582', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 15:42:39,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334159.7527297, 'message': 'Dec 6 15:42:38 hqnl0246134 sshd[229729]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.121.203.115 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 15:42:39,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334159.752991, 'message': 'Dec 6 15:42:38 hqnl0246134 sshd[229729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.121.203.115 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 15:42:41,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334161.7498844, 'message': 'Dec 6 15:42:41 hqnl0246134 sshd[229729]: Failed password for invalid user csgo from 186.121.203.115 port 60582 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 15:42:43,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334163.7519574, 'message': 'Dec 6 15:42:43 hqnl0246134 sshd[229729]: Disconnected from invalid user csgo 186.121.203.115 port 60582 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 15:42:47,067] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:42:47,068] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:42:47,777] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334167.7569244, 'message': 'Dec 6 15:42:46 hqnl0246134 sshd[229732]: Invalid user ai from 133.130.99.35 port 43060', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 15:42:47,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334167.7571192, 'message': 'Dec 6 15:42:46 hqnl0246134 sshd[229732]: pam_imunify(sshd:auth): [IM360_RBL] The IP 133.130.99.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 15:42:47,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334167.7572527, 'message': 'Dec 6 15:42:46 hqnl0246134 sshd[229732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.99.35 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 15:42:49,786] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334169.7589998, 'message': 'Dec 6 15:42:48 hqnl0246134 sshd[229732]: Failed password for invalid user ai from 133.130.99.35 port 43060 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 15:42:49,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334169.75939, 'message': 'Dec 6 15:42:48 hqnl0246134 sshd[229732]: Disconnected from invalid user ai 133.130.99.35 port 43060 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0283 seconds
WARNING [2022-12-06 15:43:08,593] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:43:08,637] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0555 seconds
INFO [2022-12-06 15:43:19,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334199.7967613, 'message': 'Dec 6 15:43:17 hqnl0246134 sshd[229757]: Invalid user ubuntu from 34.148.81.208 port 43900', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 15:43:19,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.85.27.201', 'timestamp': 1670334199.798456, 'message': 'Dec 6 15:43:18 hqnl0246134 sshd[229764]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.85.27.201 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0493 seconds
INFO [2022-12-06 15:43:19,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334199.7975285, 'message': 'Dec 6 15:43:17 hqnl0246134 sshd[229757]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.148.81.208 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 15:43:19,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.85.27.201', 'timestamp': 1670334199.798764, 'message': 'Dec 6 15:43:18 hqnl0246134 sshd[229764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.27.201 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 15:43:19,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334199.798163, 'message': 'Dec 6 15:43:17 hqnl0246134 sshd[229757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.148.81.208 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 15:43:20,799] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:43:20,799] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:43:20,807] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:43:20,818] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 15:43:21,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334201.7972245, 'message': 'Dec 6 15:43:19 hqnl0246134 sshd[229757]: Failed password for invalid user ubuntu from 34.148.81.208 port 43900 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0476 seconds
INFO [2022-12-06 15:43:21,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '95.85.27.201', 'timestamp': 1670334201.79756, 'message': 'Dec 6 15:43:20 hqnl0246134 sshd[229764]: Failed password for root from 95.85.27.201 port 39214 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 15:43:21,863] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334201.7974448, 'message': 'Dec 6 15:43:20 hqnl0246134 sshd[229757]: Disconnected from invalid user ubuntu 34.148.81.208 port 43900 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 15:43:23,174] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:43:23,174] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:43:23,186] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:43:23,199] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
INFO [2022-12-06 15:43:23,675] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:43:23,675] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:43:23,686] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:43:23,698] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 15:43:33,933] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 15:43:34,017] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 15:43:34,017] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 15:43:34,018] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 15:43:34,018] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 15:43:34,018] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 15:43:34,033] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 15:43:34,053] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0341 seconds
WARNING [2022-12-06 15:43:34,061] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 15:43:34,064] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:43:34,085] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0408 seconds
INFO [2022-12-06 15:43:34,086] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0357 seconds
WARNING [2022-12-06 15:43:47,071] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:43:47,072] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:43:55,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334235.8470347, 'message': 'Dec 6 15:43:54 hqnl0246134 sshd[229820]: Invalid user admin from 133.130.99.35 port 58362', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 15:43:55,893] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334235.8475103, 'message': 'Dec 6 15:43:54 hqnl0246134 sshd[229820]: pam_imunify(sshd:auth): [IM360_RBL] The IP 133.130.99.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 15:43:55,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334235.8476703, 'message': 'Dec 6 15:43:54 hqnl0246134 sshd[229820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.99.35 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 15:43:57,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334237.8457174, 'message': 'Dec 6 15:43:57 hqnl0246134 sshd[229820]: Failed password for invalid user admin from 133.130.99.35 port 58362 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 15:43:59,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334239.8491693, 'message': 'Dec 6 15:43:58 hqnl0246134 sshd[229822]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0453 seconds
INFO [2022-12-06 15:43:59,897] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334239.849694, 'message': 'Dec 6 15:43:58 hqnl0246134 sshd[229820]: Disconnected from invalid user admin 133.130.99.35 port 58362 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0458 seconds
INFO [2022-12-06 15:43:59,919] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334239.849515, 'message': 'Dec 6 15:43:58 hqnl0246134 sshd[229822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 15:43:59,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334239.8498578, 'message': 'Dec 6 15:43:59 hqnl0246134 sshd[229822]: Failed password for root from 61.177.173.49 port 49099 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 15:44:01,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334241.852899, 'message': 'Dec 6 15:44:00 hqnl0246134 sshd[229822]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 15:44:03,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334243.8539226, 'message': 'Dec 6 15:44:01 hqnl0246134 sshd[229822]: Failed password for root from 61.177.173.49 port 49099 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 15:44:03,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334243.8542988, 'message': 'Dec 6 15:44:02 hqnl0246134 sshd[229822]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 15:44:04,146] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 15:44:04,147] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 15:44:04,148] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 15:44:05,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334245.8569598, 'message': 'Dec 6 15:44:05 hqnl0246134 sshd[229822]: Failed password for root from 61.177.173.49 port 49099 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0254 seconds
WARNING [2022-12-06 15:44:08,595] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:44:08,630] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0442 seconds
INFO [2022-12-06 15:44:11,888] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334251.8639662, 'message': 'Dec 6 15:44:10 hqnl0246134 sshd[229831]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 15:44:11,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334251.8642747, 'message': 'Dec 6 15:44:10 hqnl0246134 sshd[229831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 15:44:13,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334253.8657796, 'message': 'Dec 6 15:44:12 hqnl0246134 sshd[229831]: Failed password for root from 61.177.173.49 port 64392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 15:44:13,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334253.8660917, 'message': 'Dec 6 15:44:13 hqnl0246134 sshd[229831]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 15:44:17,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334257.8706179, 'message': 'Dec 6 15:44:16 hqnl0246134 sshd[229831]: Failed password for root from 61.177.173.49 port 64392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 15:44:18,346] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:44:18,347] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:44:18,367] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:44:18,381] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 15:44:19,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334259.8742929, 'message': 'Dec 6 15:44:17 hqnl0246134 sshd[229831]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0541 seconds
INFO [2022-12-06 15:44:19,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.109.225.178', 'timestamp': 1670334259.8745801, 'message': 'Dec 6 15:44:18 hqnl0246134 sshd[229838]: Invalid user kbe from 189.109.225.178 port 52598', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0544 seconds
INFO [2022-12-06 15:44:19,958] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.109.225.178', 'timestamp': 1670334259.874797, 'message': 'Dec 6 15:44:18 hqnl0246134 sshd[229838]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.109.225.178 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 15:44:19,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.109.225.178', 'timestamp': 1670334259.8749778, 'message': 'Dec 6 15:44:18 hqnl0246134 sshd[229838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.109.225.178 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 15:44:21,424] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:44:21,425] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:44:21,433] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:44:21,458] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0311 seconds
INFO [2022-12-06 15:44:21,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670334261.8747413, 'message': 'Dec 6 15:44:20 hqnl0246134 sshd[229831]: Failed password for root from 61.177.173.49 port 64392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 15:44:21,924] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.109.225.178', 'timestamp': 1670334261.8750868, 'message': 'Dec 6 15:44:21 hqnl0246134 sshd[229838]: Failed password for invalid user kbe from 189.109.225.178 port 52598 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0481 seconds
INFO [2022-12-06 15:44:23,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.109.225.178', 'timestamp': 1670334263.8768609, 'message': 'Dec 6 15:44:22 hqnl0246134 sshd[229838]: Disconnected from invalid user kbe 189.109.225.178 port 52598 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 15:44:27,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.12.193.109', 'timestamp': 1670334267.8831491, 'message': 'Dec 6 15:44:26 hqnl0246134 sshd[229860]: Invalid user arun from 59.12.193.109 port 39680', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0689 seconds
INFO [2022-12-06 15:44:27,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.12.193.109', 'timestamp': 1670334267.8835318, 'message': 'Dec 6 15:44:26 hqnl0246134 sshd[229860]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.12.193.109 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 15:44:28,024] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.12.193.109', 'timestamp': 1670334267.883868, 'message': 'Dec 6 15:44:26 hqnl0246134 sshd[229860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.12.193.109 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 15:44:29,922] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.12.193.109', 'timestamp': 1670334269.8842432, 'message': 'Dec 6 15:44:28 hqnl0246134 sshd[229860]: Failed password for invalid user arun from 59.12.193.109 port 39680 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 15:44:31,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.12.193.109', 'timestamp': 1670334271.8867645, 'message': 'Dec 6 15:44:30 hqnl0246134 sshd[229860]: Disconnected from invalid user arun 59.12.193.109 port 39680 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 15:44:33,434] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:44:33,435] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:44:33,447] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:44:33,460] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0244 seconds
WARNING [2022-12-06 15:44:47,075] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:44:47,076] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:45:00,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334299.9258716, 'message': 'Dec 6 15:44:59 hqnl0246134 sshd[229897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.25.144 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0803 seconds
INFO [2022-12-06 15:45:02,029] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334301.9266908, 'message': 'Dec 6 15:45:01 hqnl0246134 sshd[229897]: Failed password for root from 27.71.25.144 port 50980 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1019 seconds
INFO [2022-12-06 15:45:05,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334305.934525, 'message': 'Dec 6 15:45:04 hqnl0246134 sshd[229916]: pam_imunify(sshd:auth): [IM360_RBL] The IP 133.130.99.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 15:45:05,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334305.934832, 'message': 'Dec 6 15:45:04 hqnl0246134 sshd[229916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.99.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 15:45:07,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '133.130.99.35', 'timestamp': 1670334307.9437268, 'message': 'Dec 6 15:45:06 hqnl0246134 sshd[229916]: Failed password for root from 133.130.99.35 port 45434 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 15:45:08,601] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:45:08,641] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0514 seconds
INFO [2022-12-06 15:45:18,363] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:45:18,364] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:45:18,372] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:45:18,392] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0273 seconds
INFO [2022-12-06 15:45:21,598] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:45:21,599] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:45:21,609] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:45:21,626] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0270 seconds
INFO [2022-12-06 15:45:25,995] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334325.970016, 'message': 'Dec 6 15:45:25 hqnl0246134 sshd[229944]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 15:45:26,019] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334325.9704936, 'message': 'Dec 6 15:45:25 hqnl0246134 sshd[229944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 15:45:27,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334327.9724762, 'message': 'Dec 6 15:45:27 hqnl0246134 sshd[229944]: Failed password for root from 61.177.172.98 port 56809 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 15:45:29,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334329.9742687, 'message': 'Dec 6 15:45:29 hqnl0246134 sshd[229944]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 15:45:32,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334331.9821048, 'message': 'Dec 6 15:45:31 hqnl0246134 sshd[229944]: Failed password for root from 61.177.172.98 port 56809 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0413 seconds
INFO [2022-12-06 15:45:34,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334333.9848633, 'message': 'Dec 6 15:45:33 hqnl0246134 sshd[229944]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0448 seconds
INFO [2022-12-06 15:45:36,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334335.986324, 'message': 'Dec 6 15:45:35 hqnl0246134 sshd[229944]: Failed password for root from 61.177.172.98 port 56809 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
WARNING [2022-12-06 15:45:47,079] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:45:47,081] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:45:48,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334348.0062637, 'message': 'Dec 6 15:45:47 hqnl0246134 sshd[229959]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 15:45:48,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334348.0067973, 'message': 'Dec 6 15:45:47 hqnl0246134 sshd[229961]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 15:45:48,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334348.0066519, 'message': 'Dec 6 15:45:47 hqnl0246134 sshd[229959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0413 seconds
INFO [2022-12-06 15:45:48,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334348.006907, 'message': 'Dec 6 15:45:47 hqnl0246134 sshd[229961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0416 seconds
INFO [2022-12-06 15:45:50,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334350.0114703, 'message': 'Dec 6 15:45:49 hqnl0246134 sshd[229959]: Failed password for root from 61.177.172.90 port 49235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 15:45:50,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334350.011689, 'message': 'Dec 6 15:45:49 hqnl0246134 sshd[229961]: Failed password for root from 61.177.172.98 port 21910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 15:45:52,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334352.014657, 'message': 'Dec 6 15:45:51 hqnl0246134 sshd[229959]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 15:45:52,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334352.0149083, 'message': 'Dec 6 15:45:51 hqnl0246134 sshd[229961]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 15:45:54,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.85.27.201', 'timestamp': 1670334354.018008, 'message': 'Dec 6 15:45:52 hqnl0246134 sshd[229964]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.85.27.201 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0552 seconds
INFO [2022-12-06 15:45:54,076] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334354.01865, 'message': 'Dec 6 15:45:52 hqnl0246134 sshd[229959]: Failed password for root from 61.177.172.90 port 49235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0558 seconds
INFO [2022-12-06 15:45:54,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334354.0187938, 'message': 'Dec 6 15:45:53 hqnl0246134 sshd[229961]: Failed password for root from 61.177.172.98 port 21910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0557 seconds
INFO [2022-12-06 15:45:54,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.85.27.201', 'timestamp': 1670334354.018453, 'message': 'Dec 6 15:45:52 hqnl0246134 sshd[229964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.27.201 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-06 15:45:54,120] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334354.0190768, 'message': 'Dec 6 15:45:53 hqnl0246134 sshd[229959]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0431 seconds
INFO [2022-12-06 15:45:54,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '95.85.27.201', 'timestamp': 1670334354.0189195, 'message': 'Dec 6 15:45:53 hqnl0246134 sshd[229964]: Failed password for root from 95.85.27.201 port 43210 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 15:45:56,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334356.023404, 'message': 'Dec 6 15:45:54 hqnl0246134 sshd[229961]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0483 seconds
INFO [2022-12-06 15:45:56,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334356.0249412, 'message': 'Dec 6 15:45:54 hqnl0246134 sshd[229959]: Failed password for root from 61.177.172.90 port 49235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-06 15:45:58,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334358.0250335, 'message': 'Dec 6 15:45:56 hqnl0246134 sshd[229961]: Failed password for root from 61.177.172.98 port 21910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 15:45:58,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334358.0252607, 'message': 'Dec 6 15:45:57 hqnl0246134 sshd[229975]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 15:45:58,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334358.0254316, 'message': 'Dec 6 15:45:57 hqnl0246134 sshd[229975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 15:46:00,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334360.0260208, 'message': 'Dec 6 15:45:58 hqnl0246134 sshd[229977]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.121.203.115 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 15:46:00,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334360.026418, 'message': 'Dec 6 15:45:59 hqnl0246134 sshd[229975]: Failed password for root from 61.177.172.90 port 17389 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 15:46:00,084] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334360.0262396, 'message': 'Dec 6 15:45:58 hqnl0246134 sshd[229977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.121.203.115 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 15:46:02,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334362.0303469, 'message': 'Dec 6 15:46:00 hqnl0246134 sshd[229977]: Failed password for root from 186.121.203.115 port 35218 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 15:46:02,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334362.0306234, 'message': 'Dec 6 15:46:01 hqnl0246134 sshd[229975]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 15:46:04,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334364.029869, 'message': 'Dec 6 15:46:03 hqnl0246134 sshd[229987]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 15:46:04,073] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334364.0300617, 'message': 'Dec 6 15:46:03 hqnl0246134 sshd[229987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 15:46:06,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334366.0321074, 'message': 'Dec 6 15:46:04 hqnl0246134 sshd[229975]: Failed password for root from 61.177.172.90 port 17389 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0570 seconds
INFO [2022-12-06 15:46:06,090] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334366.0323365, 'message': 'Dec 6 15:46:05 hqnl0246134 sshd[229987]: Failed password for root from 61.177.172.98 port 34498 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0573 seconds
INFO [2022-12-06 15:46:07,117] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:46:07,118] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:46:07,128] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:46:07,142] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0229 seconds
INFO [2022-12-06 15:46:08,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334368.0354378, 'message': 'Dec 6 15:46:06 hqnl0246134 sshd[229987]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 15:46:08,073] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334368.0356874, 'message': 'Dec 6 15:46:06 hqnl0246134 sshd[229975]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 15:46:08,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334368.0358348, 'message': 'Dec 6 15:46:07 hqnl0246134 sshd[229987]: Failed password for root from 61.177.172.98 port 34498 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
WARNING [2022-12-06 15:46:08,601] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:46:08,652] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0589 seconds
INFO [2022-12-06 15:46:10,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334370.038294, 'message': 'Dec 6 15:46:08 hqnl0246134 sshd[229975]: Failed password for root from 61.177.172.90 port 17389 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0411 seconds
INFO [2022-12-06 15:46:10,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334370.0385983, 'message': 'Dec 6 15:46:08 hqnl0246134 sshd[229987]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0410 seconds
INFO [2022-12-06 15:46:11,398] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:46:11,398] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:46:11,406] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:46:11,418] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 15:46:12,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334372.0417967, 'message': 'Dec 6 15:46:10 hqnl0246134 sshd[230008]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0423 seconds
INFO [2022-12-06 15:46:12,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334372.0422957, 'message': 'Dec 6 15:46:11 hqnl0246134 sshd[229987]: Failed password for root from 61.177.172.98 port 34498 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0434 seconds
INFO [2022-12-06 15:46:12,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334372.0420997, 'message': 'Dec 6 15:46:10 hqnl0246134 sshd[230008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 15:46:14,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334374.0456932, 'message': 'Dec 6 15:46:12 hqnl0246134 sshd[230008]: Failed password for root from 61.177.172.90 port 45992 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 15:46:14,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334374.0459692, 'message': 'Dec 6 15:46:12 hqnl0246134 sshd[230008]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 15:46:16,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334376.0473757, 'message': 'Dec 6 15:46:14 hqnl0246134 sshd[230008]: Failed password for root from 61.177.172.90 port 45992 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0659 seconds
INFO [2022-12-06 15:46:16,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334376.0477285, 'message': 'Dec 6 15:46:14 hqnl0246134 sshd[230014]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0672 seconds
INFO [2022-12-06 15:46:16,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.186.252.110', 'timestamp': 1670334376.0480227, 'message': 'Dec 6 15:46:16 hqnl0246134 sshd[230016]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.186.252.110 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0672 seconds
INFO [2022-12-06 15:46:16,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334376.0476124, 'message': 'Dec 6 15:46:14 hqnl0246134 sshd[230008]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0617 seconds
INFO [2022-12-06 15:46:16,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334376.047914, 'message': 'Dec 6 15:46:14 hqnl0246134 sshd[230014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0608 seconds
INFO [2022-12-06 15:46:16,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.186.252.110', 'timestamp': 1670334376.0481327, 'message': 'Dec 6 15:46:16 hqnl0246134 sshd[230016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.186.252.110 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0603 seconds
INFO [2022-12-06 15:46:18,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334378.0490232, 'message': 'Dec 6 15:46:16 hqnl0246134 sshd[230008]: Failed password for root from 61.177.172.90 port 45992 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0847 seconds
INFO [2022-12-06 15:46:18,136] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334378.049417, 'message': 'Dec 6 15:46:16 hqnl0246134 sshd[230014]: Failed password for root from 61.177.172.98 port 57187 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0853 seconds
INFO [2022-12-06 15:46:18,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '122.186.252.110', 'timestamp': 1670334378.049677, 'message': 'Dec 6 15:46:17 hqnl0246134 sshd[230016]: Failed password for root from 122.186.252.110 port 57298 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0854 seconds
INFO [2022-12-06 15:46:18,172] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334378.049546, 'message': 'Dec 6 15:46:17 hqnl0246134 sshd[230014]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 15:46:18,499] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:46:18,500] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:46:18,507] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:46:18,523] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 15:46:20,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334380.0503798, 'message': 'Dec 6 15:46:18 hqnl0246134 sshd[230014]: Failed password for root from 61.177.172.98 port 57187 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 15:46:20,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334380.0507185, 'message': 'Dec 6 15:46:19 hqnl0246134 sshd[230026]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0403 seconds
INFO [2022-12-06 15:46:20,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334380.050591, 'message': 'Dec 6 15:46:19 hqnl0246134 sshd[230014]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 15:46:20,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334380.0508277, 'message': 'Dec 6 15:46:19 hqnl0246134 sshd[230026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 15:46:21,715] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:46:21,716] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:46:21,729] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:46:21,745] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0283 seconds
INFO [2022-12-06 15:46:22,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670334382.0525591, 'message': 'Dec 6 15:46:21 hqnl0246134 sshd[230014]: Failed password for root from 61.177.172.98 port 57187 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 15:46:24,079] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334384.056647, 'message': 'Dec 6 15:46:22 hqnl0246134 sshd[230026]: Failed password for root from 61.177.172.90 port 50391 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 15:46:26,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334386.0603657, 'message': 'Dec 6 15:46:24 hqnl0246134 sshd[230026]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 15:46:28,083] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334388.0637808, 'message': 'Dec 6 15:46:26 hqnl0246134 sshd[230026]: Failed password for root from 61.177.172.90 port 50391 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 15:46:30,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334390.0674605, 'message': 'Dec 6 15:46:28 hqnl0246134 sshd[230026]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 15:46:32,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334392.069925, 'message': 'Dec 6 15:46:30 hqnl0246134 sshd[230026]: Failed password for root from 61.177.172.90 port 50391 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 15:46:38,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334398.0751848, 'message': 'Dec 6 15:46:37 hqnl0246134 sshd[230049]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 15:46:38,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334398.0762718, 'message': 'Dec 6 15:46:37 hqnl0246134 sshd[230049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 15:46:40,098] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334400.077589, 'message': 'Dec 6 15:46:39 hqnl0246134 sshd[230049]: Failed password for root from 61.177.172.90 port 60515 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 15:46:42,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334402.0813446, 'message': 'Dec 6 15:46:40 hqnl0246134 sshd[230049]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 15:46:42,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334402.0816438, 'message': 'Dec 6 15:46:41 hqnl0246134 sshd[230049]: Failed password for root from 61.177.172.90 port 60515 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 15:46:44,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334404.0857465, 'message': 'Dec 6 15:46:42 hqnl0246134 sshd[230049]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 15:46:46,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670334406.0880313, 'message': 'Dec 6 15:46:44 hqnl0246134 sshd[230049]: Failed password for root from 61.177.172.90 port 60515 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
WARNING [2022-12-06 15:46:47,084] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:46:47,085] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 15:47:08,615] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:47:08,660] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0589 seconds
INFO [2022-12-06 15:47:18,230] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:47:18,230] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:47:18,245] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:47:18,263] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0288 seconds
INFO [2022-12-06 15:47:20,991] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:47:20,992] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:47:20,999] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:47:21,012] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 15:47:42,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334462.1918242, 'message': 'Dec 6 15:47:40 hqnl0246134 sshd[230130]: Invalid user logview from 34.148.81.208 port 33466', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 15:47:42,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.83.17.205', 'timestamp': 1670334462.1949937, 'message': 'Dec 6 15:47:40 hqnl0246134 sshd[230134]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.83.17.205 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0439 seconds
INFO [2022-12-06 15:47:42,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334462.1923583, 'message': 'Dec 6 15:47:40 hqnl0246134 sshd[230130]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.148.81.208 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 15:47:42,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.83.17.205', 'timestamp': 1670334462.1954088, 'message': 'Dec 6 15:47:40 hqnl0246134 sshd[230134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.205 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 15:47:42,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334462.1951501, 'message': 'Dec 6 15:47:40 hqnl0246134 sshd[230130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.148.81.208 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 15:47:44,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334464.1906726, 'message': 'Dec 6 15:47:43 hqnl0246134 sshd[230130]: Failed password for invalid user logview from 34.148.81.208 port 33466 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 15:47:44,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '202.83.17.205', 'timestamp': 1670334464.190921, 'message': 'Dec 6 15:47:43 hqnl0246134 sshd[230134]: Failed password for root from 202.83.17.205 port 34220 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 15:47:44,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334464.1910796, 'message': 'Dec 6 15:47:43 hqnl0246134 sshd[230130]: Disconnected from invalid user logview 34.148.81.208 port 33466 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 15:47:47,071] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:47:47,072] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:47:47,078] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 15:47:47,086] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:47:47,086] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:47:47,100] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0281 seconds
INFO [2022-12-06 15:47:58,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '104.131.39.193', 'timestamp': 1670334478.2127583, 'message': 'Dec 6 15:47:56 hqnl0246134 sshd[230151]: pam_imunify(sshd:auth): [IM360_RBL] The IP 104.131.39.193 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 15:47:58,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '104.131.39.193', 'timestamp': 1670334478.213404, 'message': 'Dec 6 15:47:56 hqnl0246134 sshd[230151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.39.193 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 15:47:58,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '104.131.39.193', 'timestamp': 1670334478.2135787, 'message': 'Dec 6 15:47:57 hqnl0246134 sshd[230151]: Failed password for root from 104.131.39.193 port 43620 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
WARNING [2022-12-06 15:48:08,618] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:48:08,651] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0427 seconds
INFO [2022-12-06 15:48:17,931] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:48:17,931] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:48:17,951] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:48:17,979] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0348 seconds
INFO [2022-12-06 15:48:21,279] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:48:21,280] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:48:21,286] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:48:21,298] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 15:48:30,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334510.2580695, 'message': 'Dec 6 15:48:28 hqnl0246134 sshd[230193]: pam_imunify(sshd:auth): [IM360_RBL] The IP 27.71.25.144 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 15:48:30,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334510.2614336, 'message': 'Dec 6 15:48:28 hqnl0246134 sshd[230193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.25.144 user=www-data', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0557 seconds
INFO [2022-12-06 15:48:32,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334512.2574675, 'message': 'Dec 6 15:48:30 hqnl0246134 sshd[230193]: Failed password for www-data from 27.71.25.144 port 28831 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
WARNING [2022-12-06 15:48:47,090] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:48:47,091] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:48:56,593] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 15:48:56,663] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 15:48:56,664] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 15:48:56,664] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 15:48:56,664] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 15:48:56,665] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 15:48:56,678] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 15:48:56,698] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0322 seconds
WARNING [2022-12-06 15:48:56,705] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 15:48:56,708] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:48:56,727] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0357 seconds
INFO [2022-12-06 15:48:56,728] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0331 seconds
WARNING [2022-12-06 15:49:08,627] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:49:08,653] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0383 seconds
INFO [2022-12-06 15:49:14,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334554.3255057, 'message': 'Dec 6 15:49:12 hqnl0246134 sshd[230219]: Invalid user oracle from 186.121.203.115 port 59602', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 15:49:14,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334554.325739, 'message': 'Dec 6 15:49:12 hqnl0246134 sshd[230219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.121.203.115 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 15:49:14,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334554.3258963, 'message': 'Dec 6 15:49:12 hqnl0246134 sshd[230219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.121.203.115 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 15:49:16,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334556.325877, 'message': 'Dec 6 15:49:15 hqnl0246134 sshd[230219]: Failed password for invalid user oracle from 186.121.203.115 port 59602 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 15:49:18,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.121.203.115', 'timestamp': 1670334558.3279207, 'message': 'Dec 6 15:49:16 hqnl0246134 sshd[230219]: Disconnected from invalid user oracle 186.121.203.115 port 59602 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0752 seconds
INFO [2022-12-06 15:49:18,696] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:49:18,697] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:49:18,705] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:49:18,718] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 15:49:19,647] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:49:19,648] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:49:19,657] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:49:19,679] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0304 seconds
INFO [2022-12-06 15:49:21,687] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:49:21,688] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:49:21,695] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:49:21,708] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 15:49:30,429] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 15:49:30,430] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 15:49:30,432] im360.plugins.client360: Waiting 6 minutes before retry...
WARNING [2022-12-06 15:49:47,095] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:49:47,096] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:49:54,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '2.200.248.77', 'timestamp': 1670334594.4217458, 'message': 'Dec 6 15:49:53 hqnl0246134 sshd[230256]: pam_imunify(sshd:auth): [IM360_RBL] The IP 2.200.248.77 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 15:49:54,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '2.200.248.77', 'timestamp': 1670334594.4222884, 'message': 'Dec 6 15:49:53 hqnl0246134 sshd[230256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.200.248.77 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 15:49:56,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '2.200.248.77', 'timestamp': 1670334596.4266765, 'message': 'Dec 6 15:49:55 hqnl0246134 sshd[230256]: Failed password for root from 2.200.248.77 port 49930 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 15:50:08,627] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:50:08,663] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0447 seconds
INFO [2022-12-06 15:50:10,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334610.4549835, 'message': 'Dec 6 15:50:09 hqnl0246134 sshd[230305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 15:50:10,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334610.4567225, 'message': 'Dec 6 15:50:09 hqnl0246134 sshd[230305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 15:50:12,490] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334612.4571555, 'message': 'Dec 6 15:50:11 hqnl0246134 sshd[230305]: Failed password for root from 61.177.173.39 port 37505 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 15:50:14,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334614.4619198, 'message': 'Dec 6 15:50:13 hqnl0246134 sshd[230305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 15:50:16,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334616.4648273, 'message': 'Dec 6 15:50:15 hqnl0246134 sshd[230305]: Failed password for root from 61.177.173.39 port 37505 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 15:50:16,506] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334616.4650679, 'message': 'Dec 6 15:50:16 hqnl0246134 sshd[230305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 15:50:17,963] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:50:17,964] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:50:17,977] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:50:17,994] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0248 seconds
INFO [2022-12-06 15:50:18,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334618.4661129, 'message': 'Dec 6 15:50:18 hqnl0246134 sshd[230305]: Failed password for root from 61.177.173.39 port 37505 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 15:50:20,908] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:50:20,909] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:50:20,916] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:50:20,928] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 15:50:22,513] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334622.4703543, 'message': 'Dec 6 15:50:21 hqnl0246134 sshd[230329]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0419 seconds
INFO [2022-12-06 15:50:22,571] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334622.470621, 'message': 'Dec 6 15:50:21 hqnl0246134 sshd[230329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0578 seconds
INFO [2022-12-06 15:50:24,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334624.4843087, 'message': 'Dec 6 15:50:24 hqnl0246134 sshd[230329]: Failed password for root from 61.177.173.39 port 31235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0789 seconds
INFO [2022-12-06 15:50:26,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334626.4753568, 'message': 'Dec 6 15:50:26 hqnl0246134 sshd[230329]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 15:50:28,509] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334628.479768, 'message': 'Dec 6 15:50:28 hqnl0246134 sshd[230329]: Failed password for root from 61.177.173.39 port 31235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 15:50:30,502] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334630.4827096, 'message': 'Dec 6 15:50:28 hqnl0246134 sshd[230329]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 15:50:30,523] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334630.4829645, 'message': 'Dec 6 15:50:30 hqnl0246134 sshd[230329]: Failed password for root from 61.177.173.39 port 31235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 15:50:32,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334632.4864511, 'message': 'Dec 6 15:50:32 hqnl0246134 sshd[230344]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 15:50:32,528] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334632.4869525, 'message': 'Dec 6 15:50:32 hqnl0246134 sshd[230344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 15:50:34,509] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334634.4879396, 'message': 'Dec 6 15:50:34 hqnl0246134 sshd[230344]: Failed password for root from 61.177.173.39 port 49428 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 15:50:38,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334638.4936774, 'message': 'Dec 6 15:50:36 hqnl0246134 sshd[230344]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 15:50:38,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334638.4957695, 'message': 'Dec 6 15:50:38 hqnl0246134 sshd[230344]: Failed password for root from 61.177.173.39 port 49428 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 15:50:40,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334640.4943204, 'message': 'Dec 6 15:50:38 hqnl0246134 sshd[230344]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 15:50:40,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '104.131.39.193', 'timestamp': 1670334640.4945843, 'message': 'Dec 6 15:50:39 hqnl0246134 sshd[230347]: pam_imunify(sshd:auth): [IM360_RBL] The IP 104.131.39.193 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 15:50:40,546] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '104.131.39.193', 'timestamp': 1670334640.4947324, 'message': 'Dec 6 15:50:39 hqnl0246134 sshd[230347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.39.193 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 15:50:42,533] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670334642.5021036, 'message': 'Dec 6 15:50:41 hqnl0246134 sshd[230344]: Failed password for root from 61.177.173.39 port 49428 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 15:50:42,534] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '104.131.39.193', 'timestamp': 1670334642.502445, 'message': 'Dec 6 15:50:42 hqnl0246134 sshd[230347]: Failed password for root from 104.131.39.193 port 32860 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
WARNING [2022-12-06 15:50:47,100] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:50:47,101] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:50:58,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334658.5254018, 'message': 'Dec 6 15:50:56 hqnl0246134 sshd[230361]: Invalid user git from 27.71.25.144 port 53905', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 15:50:58,569] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334658.5259137, 'message': 'Dec 6 15:50:56 hqnl0246134 sshd[230361]: pam_imunify(sshd:auth): [IM360_RBL] The IP 27.71.25.144 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 15:50:58,597] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334658.5260806, 'message': 'Dec 6 15:50:56 hqnl0246134 sshd[230361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.25.144 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 15:51:00,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334660.531517, 'message': 'Dec 6 15:50:59 hqnl0246134 sshd[230361]: Failed password for invalid user git from 27.71.25.144 port 53905 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 15:51:02,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334662.5337253, 'message': 'Dec 6 15:51:01 hqnl0246134 sshd[230361]: Disconnected from invalid user git 27.71.25.144 port 53905 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 15:51:04,018] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:51:04,018] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:51:04,025] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:51:04,037] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
WARNING [2022-12-06 15:51:08,634] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:51:08,661] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0383 seconds
INFO [2022-12-06 15:51:18,031] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:51:18,032] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:51:18,038] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:51:18,050] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 15:51:20,659] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:51:20,659] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:51:20,666] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:51:20,677] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0165 seconds
INFO [2022-12-06 15:51:40,087] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 15:51:40,093] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 15:51:40,995] im360.plugins.pam: PAM module has been enabled for dovecot-pam
WARNING [2022-12-06 15:51:47,105] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:51:47,106] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:51:48,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334708.5952766, 'message': 'Dec 6 15:51:46 hqnl0246134 sshd[230416]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.148.81.208 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 15:51:48,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334708.5962186, 'message': 'Dec 6 15:51:46 hqnl0246134 sshd[230416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.148.81.208 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 15:51:48,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '34.148.81.208', 'timestamp': 1670334708.5965147, 'message': 'Dec 6 15:51:48 hqnl0246134 sshd[230416]: Failed password for root from 34.148.81.208 port 51260 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
WARNING [2022-12-06 15:51:53,328] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 15:52:08,636] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:52:08,663] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0373 seconds
INFO [2022-12-06 15:52:17,897] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:52:17,898] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:52:17,913] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:52:17,929] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0292 seconds
INFO [2022-12-06 15:52:20,725] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:52:20,726] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:52:20,733] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:52:20,745] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 15:52:44,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.79.42.236', 'timestamp': 1670334764.7015114, 'message': 'Dec 6 15:52:44 hqnl0246134 sshd[230487]: Invalid user analytics from 217.79.42.236 port 58246', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 15:52:44,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.79.42.236', 'timestamp': 1670334764.7021203, 'message': 'Dec 6 15:52:44 hqnl0246134 sshd[230487]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.79.42.236 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 15:52:44,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.79.42.236', 'timestamp': 1670334764.702285, 'message': 'Dec 6 15:52:44 hqnl0246134 sshd[230487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.79.42.236 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 15:52:46,696] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.79.42.236', 'timestamp': 1670334766.663368, 'message': 'Dec 6 15:52:46 hqnl0246134 sshd[230487]: Failed password for invalid user analytics from 217.79.42.236 port 58246 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
WARNING [2022-12-06 15:52:47,108] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:52:47,109] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:52:50,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.79.42.236', 'timestamp': 1670334770.6697237, 'message': 'Dec 6 15:52:48 hqnl0246134 sshd[230487]: Disconnected from invalid user analytics 217.79.42.236 port 58246 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 15:53:02,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.83.17.205', 'timestamp': 1670334782.6885722, 'message': 'Dec 6 15:53:02 hqnl0246134 sshd[230503]: Invalid user wy from 202.83.17.205 port 60644', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 15:53:02,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.83.17.205', 'timestamp': 1670334782.6890612, 'message': 'Dec 6 15:53:02 hqnl0246134 sshd[230503]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.83.17.205 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 15:53:02,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.83.17.205', 'timestamp': 1670334782.6892605, 'message': 'Dec 6 15:53:02 hqnl0246134 sshd[230503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.205 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 15:53:04,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.83.17.205', 'timestamp': 1670334784.690569, 'message': 'Dec 6 15:53:04 hqnl0246134 sshd[230503]: Failed password for invalid user wy from 202.83.17.205 port 60644 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 15:53:06,725] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.83.17.205', 'timestamp': 1670334786.6938019, 'message': 'Dec 6 15:53:06 hqnl0246134 sshd[230503]: Disconnected from invalid user wy 202.83.17.205 port 60644 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
WARNING [2022-12-06 15:53:08,637] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:53:08,665] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0359 seconds
INFO [2022-12-06 15:53:08,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.89.12', 'timestamp': 1670334788.6968424, 'message': 'Dec 6 15:53:07 hqnl0246134 sshd[230512]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.89.12 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0410 seconds
INFO [2022-12-06 15:53:08,883] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:53:08,884] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:53:08,898] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:53:08,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.89.12', 'timestamp': 1670334788.6971698, 'message': 'Dec 6 15:53:07 hqnl0246134 sshd[230512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.89.12 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1715 seconds
INFO [2022-12-06 15:53:08,921] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0355 seconds
INFO [2022-12-06 15:53:08,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.89.12', 'timestamp': 1670334788.6973965, 'message': 'Dec 6 15:53:08 hqnl0246134 sshd[230512]: Failed password for root from 43.153.89.12 port 50656 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 15:53:17,674] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:53:17,675] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:53:17,683] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:53:17,694] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 15:53:20,329] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:53:20,329] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:53:20,338] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:53:20,355] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0256 seconds
INFO [2022-12-06 15:53:20,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334800.7128258, 'message': 'Dec 6 15:53:19 hqnl0246134 sshd[230527]: pam_imunify(sshd:auth): [IM360_RBL] The IP 27.71.25.144 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 15:53:20,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334800.7130013, 'message': 'Dec 6 15:53:19 hqnl0246134 sshd[230527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.25.144 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 15:53:22,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '27.71.25.144', 'timestamp': 1670334802.7186654, 'message': 'Dec 6 15:53:21 hqnl0246134 sshd[230527]: Failed password for root from 27.71.25.144 port 22478 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 15:53:28,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.39.193', 'timestamp': 1670334808.7258806, 'message': 'Dec 6 15:53:27 hqnl0246134 sshd[230544]: Invalid user user from 104.131.39.193 port 50494', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 15:53:28,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '104.131.39.193', 'timestamp': 1670334808.7262375, 'message': 'Dec 6 15:53:27 hqnl0246134 sshd[230544]: pam_imunify(sshd:auth): [IM360_RBL] The IP 104.131.39.193 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 15:53:28,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '104.131.39.193', 'timestamp': 1670334808.7264132, 'message': 'Dec 6 15:53:27 hqnl0246134 sshd[230544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.39.193 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 15:53:30,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.39.193', 'timestamp': 1670334810.7280126, 'message': 'Dec 6 15:53:29 hqnl0246134 sshd[230544]: Failed password for invalid user user from 104.131.39.193 port 50494 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 15:53:32,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.39.193', 'timestamp': 1670334812.7306604, 'message': 'Dec 6 15:53:31 hqnl0246134 sshd[230544]: Disconnected from invalid user user 104.131.39.193 port 50494 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 15:53:44,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.186.252.110', 'timestamp': 1670334824.7590804, 'message': 'Dec 6 15:53:43 hqnl0246134 sshd[230547]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.186.252.110 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 15:53:44,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.186.252.110', 'timestamp': 1670334824.7594137, 'message': 'Dec 6 15:53:43 hqnl0246134 sshd[230547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.186.252.110 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 15:53:46,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '122.186.252.110', 'timestamp': 1670334826.7613, 'message': 'Dec 6 15:53:45 hqnl0246134 sshd[230547]: Failed password for root from 122.186.252.110 port 54558 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-06 15:53:47,114] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:53:47,115] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:53:52,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '2.200.248.77', 'timestamp': 1670334832.7774296, 'message': 'Dec 6 15:53:50 hqnl0246134 sshd[230552]: Invalid user ghost from 2.200.248.77 port 39582', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 15:53:52,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.12.193.109', 'timestamp': 1670334832.778526, 'message': 'Dec 6 15:53:52 hqnl0246134 sshd[230555]: Invalid user postgres from 59.12.193.109 port 47801', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 15:53:52,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '2.200.248.77', 'timestamp': 1670334832.7780142, 'message': 'Dec 6 15:53:50 hqnl0246134 sshd[230552]: pam_imunify(sshd:auth): [IM360_RBL] The IP 2.200.248.77 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 15:53:52,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.12.193.109', 'timestamp': 1670334832.7787263, 'message': 'Dec 6 15:53:52 hqnl0246134 sshd[230555]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.12.193.109 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 15:53:52,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '2.200.248.77', 'timestamp': 1670334832.7782524, 'message': 'Dec 6 15:53:50 hqnl0246134 sshd[230552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.200.248.77 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 15:53:52,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.12.193.109', 'timestamp': 1670334832.7789094, 'message': 'Dec 6 15:53:52 hqnl0246134 sshd[230555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.12.193.109 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 15:53:54,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '58.17.200.197', 'timestamp': 1670334834.7791812, 'message': 'Dec 6 15:53:52 hqnl0246134 sshd[230554]: Invalid user ivan from 58.17.200.197 port 57606', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0419 seconds
INFO [2022-12-06 15:53:54,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '2.200.248.77', 'timestamp': 1670334834.7794442, 'message': 'Dec 6 15:53:52 hqnl0246134 sshd[230552]: Failed password for invalid user ghost from 2.200.248.77 port 39582 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-06 15:53:54,825] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.12.193.109', 'timestamp': 1670334834.7806876, 'message': 'Dec 6 15:53:53 hqnl0246134 sshd[230555]: Failed password for invalid user postgres from 59.12.193.109 port 47801 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 15:53:54,852] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '58.17.200.197', 'timestamp': 1670334834.7795591, 'message': 'Dec 6 15:53:53 hqnl0246134 sshd[230554]: pam_imunify(sshd:auth): [IM360_RBL] The IP 58.17.200.197 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 15:53:54,854] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '2.200.248.77', 'timestamp': 1670334834.7809303, 'message': 'Dec 6 15:53:54 hqnl0246134 sshd[230552]: Disconnected from invalid user ghost 2.200.248.77 port 39582 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 15:53:54,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '58.17.200.197', 'timestamp': 1670334834.7796624, 'message': 'Dec 6 15:53:53 hqnl0246134 sshd[230554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.17.200.197 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 15:53:54,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '58.17.200.197', 'timestamp': 1670334834.7808082, 'message': 'Dec 6 15:53:54 hqnl0246134 sshd[230554]: Failed password for invalid user ivan from 58.17.200.197 port 57606 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 15:53:56,827] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.12.193.109', 'timestamp': 1670334836.7813866, 'message': 'Dec 6 15:53:54 hqnl0246134 sshd[230555]: Disconnected from invalid user postgres 59.12.193.109 port 47801 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-06 15:53:56,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '58.17.200.197', 'timestamp': 1670334836.7817702, 'message': 'Dec 6 15:53:56 hqnl0246134 sshd[230554]: Disconnected from invalid user ivan 58.17.200.197 port 57606 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0456 seconds
INFO [2022-12-06 15:53:58,809] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.86.165.90', 'timestamp': 1670334838.7880971, 'message': 'Dec 6 15:53:57 hqnl0246134 sshd[230566]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.86.165.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 15:53:58,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.86.165.90', 'timestamp': 1670334838.7884157, 'message': 'Dec 6 15:53:57 hqnl0246134 sshd[230566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.86.165.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 15:54:00,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '95.86.165.90', 'timestamp': 1670334840.7933755, 'message': 'Dec 6 15:53:59 hqnl0246134 sshd[230566]: Failed password for root from 95.86.165.90 port 56208 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0235 seconds
WARNING [2022-12-06 15:54:08,645] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:54:08,694] defence360agent.internals.the_sink: SensorIncidentList(<24 item(s)>) processed in 0.0599 seconds
INFO [2022-12-06 15:54:17,921] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:54:17,921] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:54:17,932] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:54:17,943] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 15:54:20,529] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:54:20,530] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:54:20,540] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:54:20,554] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 15:54:30,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '141.144.246.33', 'timestamp': 1670334870.8514426, 'message': 'Dec 6 15:54:29 hqnl0246134 sshd[230603]: pam_imunify(sshd:auth): [IM360_RBL] The IP 141.144.246.33 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0546 seconds
INFO [2022-12-06 15:54:30,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '141.144.246.33', 'timestamp': 1670334870.8518605, 'message': 'Dec 6 15:54:29 hqnl0246134 sshd[230603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.144.246.33 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0673 seconds
INFO [2022-12-06 15:54:32,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '141.144.246.33', 'timestamp': 1670334872.8540907, 'message': 'Dec 6 15:54:31 hqnl0246134 sshd[230603]: Failed password for root from 141.144.246.33 port 60560 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 15:54:34,191] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:54:34,191] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:54:34,200] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:54:34,212] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 15:54:36,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.30.235', 'timestamp': 1670334876.8590696, 'message': 'Dec 6 15:54:35 hqnl0246134 sshd[230614]: Invalid user analytics from 188.166.30.235 port 54542', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 15:54:36,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '188.166.30.235', 'timestamp': 1670334876.8592415, 'message': 'Dec 6 15:54:35 hqnl0246134 sshd[230614]: pam_imunify(sshd:auth): [IM360_RBL] The IP 188.166.30.235 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 15:54:36,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '188.166.30.235', 'timestamp': 1670334876.8607934, 'message': 'Dec 6 15:54:35 hqnl0246134 sshd[230614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.30.235 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 15:54:38,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.30.235', 'timestamp': 1670334878.8627036, 'message': 'Dec 6 15:54:37 hqnl0246134 sshd[230614]: Failed password for invalid user analytics from 188.166.30.235 port 54542 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 15:54:38,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.30.235', 'timestamp': 1670334878.8630111, 'message': 'Dec 6 15:54:38 hqnl0246134 sshd[230614]: Disconnected from invalid user analytics 188.166.30.235 port 54542 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0258 seconds
WARNING [2022-12-06 15:54:47,121] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:54:47,122] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:54:52,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.246.155.29', 'timestamp': 1670334892.885457, 'message': 'Dec 6 15:54:51 hqnl0246134 sshd[230617]: Invalid user ventas from 190.246.155.29 port 50990', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 15:54:52,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.246.155.29', 'timestamp': 1670334892.885861, 'message': 'Dec 6 15:54:51 hqnl0246134 sshd[230617]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.246.155.29 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 15:54:52,943] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.246.155.29', 'timestamp': 1670334892.8860075, 'message': 'Dec 6 15:54:51 hqnl0246134 sshd[230617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.155.29 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 15:54:54,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.246.155.29', 'timestamp': 1670334894.8855674, 'message': 'Dec 6 15:54:53 hqnl0246134 sshd[230617]: Failed password for invalid user ventas from 190.246.155.29 port 50990 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 15:54:54,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.246.155.29', 'timestamp': 1670334894.8857956, 'message': 'Dec 6 15:54:54 hqnl0246134 sshd[230617]: Disconnected from invalid user ventas 190.246.155.29 port 50990 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 15:55:08,656] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:55:08,686] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0469 seconds
INFO [2022-12-06 15:55:17,876] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:55:17,877] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:55:17,885] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:55:17,897] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 15:55:20,521] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:55:20,522] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:55:20,533] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:55:20,550] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0275 seconds
WARNING [2022-12-06 15:55:47,125] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:55:47,126] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:55:59,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '112.133.228.250', 'timestamp': 1670334959.0222828, 'message': 'Dec 6 15:55:57 hqnl0246134 sshd[230701]: pam_imunify(sshd:auth): [IM360_RBL] The IP 112.133.228.250 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0615 seconds
INFO [2022-12-06 15:55:59,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '112.133.228.250', 'timestamp': 1670334959.0229158, 'message': 'Dec 6 15:55:57 hqnl0246134 sshd[230701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.133.228.250 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0460 seconds
INFO [2022-12-06 15:55:59,614] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 15:55:59,680] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 15:55:59,680] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 15:55:59,680] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 15:55:59,681] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 15:55:59,681] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 15:55:59,690] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 15:55:59,705] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0239 seconds
WARNING [2022-12-06 15:55:59,712] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 15:55:59,715] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:55:59,731] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0314 seconds
INFO [2022-12-06 15:55:59,732] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0297 seconds
INFO [2022-12-06 15:56:01,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '112.133.228.250', 'timestamp': 1670334961.0220153, 'message': 'Dec 6 15:56:00 hqnl0246134 sshd[230701]: Failed password for root from 112.133.228.250 port 37360 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0395 seconds
INFO [2022-12-06 15:56:05,528] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:56:05,529] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:56:05,539] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:56:05,558] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0281 seconds
WARNING [2022-12-06 15:56:08,653] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:56:08,676] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0336 seconds
INFO [2022-12-06 15:56:17,057] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670334977.0384994, 'message': 'Dec 6 15:56:16 hqnl0246134 sshd[230722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 15:56:17,819] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:56:17,819] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:56:17,830] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:56:17,849] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0291 seconds
INFO [2022-12-06 15:56:19,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670334979.0408115, 'message': 'Dec 6 15:56:18 hqnl0246134 sshd[230722]: Failed password for root from 61.177.173.18 port 30427 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 15:56:19,071] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '163.44.254.105', 'timestamp': 1670334979.041007, 'message': 'Dec 6 15:56:18 hqnl0246134 sshd[230727]: Invalid user gui from 163.44.254.105 port 47790', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 15:56:20,514] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:56:20,514] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:56:20,522] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:56:20,533] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 15:56:21,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '163.44.254.105', 'timestamp': 1670334981.0451963, 'message': 'Dec 6 15:56:19 hqnl0246134 sshd[230727]: pam_imunify(sshd:auth): [IM360_RBL] The IP 163.44.254.105 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0541 seconds
INFO [2022-12-06 15:56:21,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.83.17.205', 'timestamp': 1670334981.0455854, 'message': 'Dec 6 15:56:19 hqnl0246134 sshd[230731]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.83.17.205 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0543 seconds
INFO [2022-12-06 15:56:21,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670334981.0458956, 'message': 'Dec 6 15:56:20 hqnl0246134 sshd[230722]: Failed password for root from 61.177.173.18 port 30427 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0532 seconds
INFO [2022-12-06 15:56:21,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '163.44.254.105', 'timestamp': 1670334981.0454369, 'message': 'Dec 6 15:56:19 hqnl0246134 sshd[230727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.254.105 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 15:56:21,134] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.83.17.205', 'timestamp': 1670334981.0457528, 'message': 'Dec 6 15:56:19 hqnl0246134 sshd[230731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.205 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 15:56:21,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '163.44.254.105', 'timestamp': 1670334981.0460334, 'message': 'Dec 6 15:56:20 hqnl0246134 sshd[230727]: Failed password for invalid user gui from 163.44.254.105 port 47790 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 15:56:21,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '202.83.17.205', 'timestamp': 1670334981.04617, 'message': 'Dec 6 15:56:20 hqnl0246134 sshd[230731]: Failed password for root from 202.83.17.205 port 51062 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 15:56:23,073] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '163.44.254.105', 'timestamp': 1670334983.049642, 'message': 'Dec 6 15:56:21 hqnl0246134 sshd[230727]: Disconnected from invalid user gui 163.44.254.105 port 47790 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 15:56:25,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670334985.0545032, 'message': 'Dec 6 15:56:23 hqnl0246134 sshd[230722]: Failed password for root from 61.177.173.18 port 30427 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 15:56:27,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.228.25', 'timestamp': 1670334987.0620391, 'message': 'Dec 6 15:56:25 hqnl0246134 sshd[230739]: Invalid user will from 128.199.228.25 port 49860', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 15:56:27,110] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.228.25', 'timestamp': 1670334987.0625827, 'message': 'Dec 6 15:56:26 hqnl0246134 sshd[230739]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.228.25 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 15:56:27,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.228.25', 'timestamp': 1670334987.0635672, 'message': 'Dec 6 15:56:26 hqnl0246134 sshd[230739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.228.25 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 15:56:29,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.228.25', 'timestamp': 1670334989.0636325, 'message': 'Dec 6 15:56:28 hqnl0246134 sshd[230739]: Failed password for invalid user will from 128.199.228.25 port 49860 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 15:56:31,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.228.25', 'timestamp': 1670334991.066797, 'message': 'Dec 6 15:56:29 hqnl0246134 sshd[230739]: Disconnected from invalid user will 128.199.228.25 port 49860 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 15:56:37,986] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 15:56:37,987] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 15:56:37,988] im360.plugins.client360: Waiting 2 minutes before retry...
WARNING [2022-12-06 15:56:47,131] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:56:47,131] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 15:57:08,663] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:57:08,700] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0491 seconds
INFO [2022-12-06 15:57:09,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.186.252.110', 'timestamp': 1670335029.1232388, 'message': 'Dec 6 15:57:08 hqnl0246134 sshd[230778]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.186.252.110 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 15:57:09,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.186.252.110', 'timestamp': 1670335029.1235404, 'message': 'Dec 6 15:57:08 hqnl0246134 sshd[230778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.186.252.110 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 15:57:11,161] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '122.186.252.110', 'timestamp': 1670335031.1255977, 'message': 'Dec 6 15:57:10 hqnl0246134 sshd[230778]: Failed password for root from 122.186.252.110 port 44246 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 15:57:17,954] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:57:17,955] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:57:17,967] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:57:17,979] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0228 seconds
INFO [2022-12-06 15:57:20,579] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:57:20,580] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:57:20,588] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:57:20,599] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
WARNING [2022-12-06 15:57:47,137] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:57:47,138] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:57:51,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '2.200.248.77', 'timestamp': 1670335071.1822944, 'message': 'Dec 6 15:57:50 hqnl0246134 sshd[230808]: Invalid user bitbucket from 2.200.248.77 port 57452', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 15:57:51,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '2.200.248.77', 'timestamp': 1670335071.1827915, 'message': 'Dec 6 15:57:50 hqnl0246134 sshd[230808]: pam_imunify(sshd:auth): [IM360_RBL] The IP 2.200.248.77 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 15:57:51,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '2.200.248.77', 'timestamp': 1670335071.1849782, 'message': 'Dec 6 15:57:50 hqnl0246134 sshd[230808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.200.248.77 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 15:57:53,202] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335073.1845243, 'message': 'Dec 6 15:57:51 hqnl0246134 sshd[230810]: Invalid user gui from 52.170.31.174 port 46740', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 15:57:53,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335073.1847072, 'message': 'Dec 6 15:57:52 hqnl0246134 sshd[230810]: pam_imunify(sshd:auth): [IM360_RBL] The IP 52.170.31.174 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 15:57:53,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335073.1848354, 'message': 'Dec 6 15:57:52 hqnl0246134 sshd[230810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.170.31.174 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 15:57:55,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '2.200.248.77', 'timestamp': 1670335075.1862066, 'message': 'Dec 6 15:57:53 hqnl0246134 sshd[230808]: Failed password for invalid user bitbucket from 2.200.248.77 port 57452 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0466 seconds
INFO [2022-12-06 15:57:55,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335075.1904044, 'message': 'Dec 6 15:57:54 hqnl0246134 sshd[230810]: Failed password for invalid user gui from 52.170.31.174 port 46740 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0444 seconds
INFO [2022-12-06 15:57:55,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '2.200.248.77', 'timestamp': 1670335075.1909182, 'message': 'Dec 6 15:57:54 hqnl0246134 sshd[230808]: Disconnected from invalid user bitbucket 2.200.248.77 port 57452 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 15:57:55,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335075.1907208, 'message': 'Dec 6 15:57:54 hqnl0246134 sshd[230810]: Disconnected from invalid user gui 52.170.31.174 port 46740 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 15:57:56,851] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:57:56,851] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:57:56,860] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:57:56,873] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
WARNING [2022-12-06 15:58:08,675] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:58:08,717] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0559 seconds
INFO [2022-12-06 15:58:11,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335091.2177796, 'message': 'Dec 6 15:58:09 hqnl0246134 sshd[230841]: Invalid user test_ftp from 190.246.155.29 port 57010', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 15:58:11,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335091.218045, 'message': 'Dec 6 15:58:09 hqnl0246134 sshd[230841]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.246.155.29 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 15:58:11,290] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335091.2182305, 'message': 'Dec 6 15:58:09 hqnl0246134 sshd[230841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.155.29 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 15:58:13,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335093.2235346, 'message': 'Dec 6 15:58:11 hqnl0246134 sshd[230841]: Failed password for invalid user test_ftp from 190.246.155.29 port 57010 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 15:58:15,144] defence360agent.files: Updating all files
INFO [2022-12-06 15:58:15,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335095.2262573, 'message': 'Dec 6 15:58:13 hqnl0246134 sshd[230841]: Disconnected from invalid user test_ftp 190.246.155.29 port 57010 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 15:58:15,496] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 15:58:15,496] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 15:58:15,871] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 15:58:15,871] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 15:58:16,195] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 15:58:16,195] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 15:58:16,552] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 15:58:16,553] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 15:58:16,553] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 15:58:16,866] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 13:58:16 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E38EBB6AD90E4'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 15:58:16,867] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 15:58:16,867] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 15:58:17,510] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 15:58:17,510] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 15:58:17,832] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 15:58:17,833] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 15:58:18,101] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:58:18,102] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:58:18,115] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:58:18,135] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0321 seconds
INFO [2022-12-06 15:58:18,162] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 15:58:18,162] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 15:58:18,648] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 15:58:18,648] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 15:58:19,188] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 15:58:19,189] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 15:58:21,089] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:58:21,090] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:58:21,096] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:58:21,107] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0166 seconds
INFO [2022-12-06 15:58:27,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '163.44.254.105', 'timestamp': 1670335107.242192, 'message': 'Dec 6 15:58:26 hqnl0246134 sshd[230854]: pam_imunify(sshd:auth): [IM360_RBL] The IP 163.44.254.105 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 15:58:27,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '163.44.254.105', 'timestamp': 1670335107.2426038, 'message': 'Dec 6 15:58:26 hqnl0246134 sshd[230854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.254.105 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 15:58:29,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335109.2455072, 'message': 'Dec 6 15:58:29 hqnl0246134 sshd[230865]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.89.12 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 15:58:29,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '163.44.254.105', 'timestamp': 1670335109.245815, 'message': 'Dec 6 15:58:29 hqnl0246134 sshd[230854]: Failed password for root from 163.44.254.105 port 42420 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 15:58:29,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335109.2456818, 'message': 'Dec 6 15:58:29 hqnl0246134 sshd[230865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.89.12 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 15:58:31,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335111.2485194, 'message': 'Dec 6 15:58:30 hqnl0246134 sshd[230865]: Failed password for root from 43.153.89.12 port 40032 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 15:58:35,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.228.25', 'timestamp': 1670335115.255048, 'message': 'Dec 6 15:58:33 hqnl0246134 sshd[230868]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.228.25 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 15:58:35,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.228.25', 'timestamp': 1670335115.2554486, 'message': 'Dec 6 15:58:33 hqnl0246134 sshd[230868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.228.25 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 15:58:37,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '128.199.228.25', 'timestamp': 1670335117.255849, 'message': 'Dec 6 15:58:35 hqnl0246134 sshd[230868]: Failed password for root from 128.199.228.25 port 50490 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 15:58:45,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.58.20.99', 'timestamp': 1670335125.2658148, 'message': 'Dec 6 15:58:43 hqnl0246134 sshd[230877]: Invalid user ubuntu from 20.58.20.99 port 39580', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 15:58:45,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.58.20.99', 'timestamp': 1670335125.2662325, 'message': 'Dec 6 15:58:44 hqnl0246134 sshd[230877]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.58.20.99 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 15:58:45,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.58.20.99', 'timestamp': 1670335125.2692099, 'message': 'Dec 6 15:58:44 hqnl0246134 sshd[230877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.58.20.99 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 15:58:47,141] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:58:47,142] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:58:47,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.58.20.99', 'timestamp': 1670335127.2658274, 'message': 'Dec 6 15:58:45 hqnl0246134 sshd[230877]: Failed password for invalid user ubuntu from 20.58.20.99 port 39580 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 15:58:47,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.58.20.99', 'timestamp': 1670335127.2660851, 'message': 'Dec 6 15:58:46 hqnl0246134 sshd[230877]: Disconnected from invalid user ubuntu 20.58.20.99 port 39580 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0215 seconds
WARNING [2022-12-06 15:59:08,679] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:59:08,737] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0705 seconds
INFO [2022-12-06 15:59:12,983] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 15:59:13,044] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 15:59:13,044] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 15:59:13,044] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 15:59:13,045] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 15:59:13,045] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 15:59:13,056] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 15:59:13,072] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0264 seconds
WARNING [2022-12-06 15:59:13,081] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 15:59:13,085] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:59:13,119] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0537 seconds
INFO [2022-12-06 15:59:13,123] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0533 seconds
INFO [2022-12-06 15:59:15,324] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.12.193.109', 'timestamp': 1670335155.305694, 'message': 'Dec 6 15:59:13 hqnl0246134 sshd[230919]: Invalid user facturacion from 59.12.193.109 port 43549', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 15:59:15,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.12.193.109', 'timestamp': 1670335155.3059313, 'message': 'Dec 6 15:59:13 hqnl0246134 sshd[230919]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.12.193.109 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 15:59:15,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.12.193.109', 'timestamp': 1670335155.306884, 'message': 'Dec 6 15:59:13 hqnl0246134 sshd[230919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.12.193.109 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 15:59:17,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.12.193.109', 'timestamp': 1670335157.3075125, 'message': 'Dec 6 15:59:16 hqnl0246134 sshd[230919]: Failed password for invalid user facturacion from 59.12.193.109 port 43549 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 15:59:17,853] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:59:17,854] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:59:17,861] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:59:17,873] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 15:59:19,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.12.193.109', 'timestamp': 1670335159.3107703, 'message': 'Dec 6 15:59:18 hqnl0246134 sshd[230919]: Disconnected from invalid user facturacion 59.12.193.109 port 43549 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 15:59:20,758] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:59:20,758] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:59:20,765] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:59:20,776] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 15:59:21,214] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 15:59:21,214] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 15:59:21,222] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 15:59:21,234] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 15:59:39,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.83.17.205', 'timestamp': 1670335179.3338294, 'message': 'Dec 6 15:59:38 hqnl0246134 sshd[230950]: Invalid user will from 202.83.17.205 port 41488', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0602 seconds
INFO [2022-12-06 15:59:39,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '163.44.254.105', 'timestamp': 1670335179.3349607, 'message': 'Dec 6 15:59:38 hqnl0246134 sshd[230952]: Invalid user postgres from 163.44.254.105 port 58400', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0591 seconds
INFO [2022-12-06 15:59:39,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.83.17.205', 'timestamp': 1670335179.3344924, 'message': 'Dec 6 15:59:38 hqnl0246134 sshd[230950]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.83.17.205 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 15:59:39,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '163.44.254.105', 'timestamp': 1670335179.3351674, 'message': 'Dec 6 15:59:38 hqnl0246134 sshd[230952]: pam_imunify(sshd:auth): [IM360_RBL] The IP 163.44.254.105 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 15:59:39,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.83.17.205', 'timestamp': 1670335179.3347454, 'message': 'Dec 6 15:59:38 hqnl0246134 sshd[230950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.205 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 15:59:39,462] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '163.44.254.105', 'timestamp': 1670335179.3377914, 'message': 'Dec 6 15:59:38 hqnl0246134 sshd[230952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.254.105 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 15:59:41,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.83.17.205', 'timestamp': 1670335181.3343046, 'message': 'Dec 6 15:59:40 hqnl0246134 sshd[230950]: Failed password for invalid user will from 202.83.17.205 port 41488 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 15:59:41,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '163.44.254.105', 'timestamp': 1670335181.3346272, 'message': 'Dec 6 15:59:40 hqnl0246134 sshd[230952]: Failed password for invalid user postgres from 163.44.254.105 port 58400 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 15:59:43,171] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 15:59:43,172] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 15:59:43,173] im360.plugins.client360: Waiting 2 minutes before retry...
INFO [2022-12-06 15:59:43,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '163.44.254.105', 'timestamp': 1670335183.3366156, 'message': 'Dec 6 15:59:41 hqnl0246134 sshd[230952]: Disconnected from invalid user postgres 163.44.254.105 port 58400 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 15:59:43,372] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.83.17.205', 'timestamp': 1670335183.3368492, 'message': 'Dec 6 15:59:42 hqnl0246134 sshd[230950]: Disconnected from invalid user will 202.83.17.205 port 41488 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 15:59:45,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335185.3403392, 'message': 'Dec 6 15:59:44 hqnl0246134 sshd[230954]: Invalid user allen from 190.246.155.29 port 45622', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 15:59:45,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335185.3405335, 'message': 'Dec 6 15:59:44 hqnl0246134 sshd[230954]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.246.155.29 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 15:59:45,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335185.340647, 'message': 'Dec 6 15:59:44 hqnl0246134 sshd[230954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.155.29 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 15:59:47,145] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 15:59:47,146] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 15:59:47,361] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335187.3428986, 'message': 'Dec 6 15:59:46 hqnl0246134 sshd[230954]: Failed password for invalid user allen from 190.246.155.29 port 45622 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 15:59:47,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335187.3431463, 'message': 'Dec 6 15:59:47 hqnl0246134 sshd[230954]: Disconnected from invalid user allen 190.246.155.29 port 45622 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 15:59:57,425] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335197.3612928, 'message': 'Dec 6 15:59:55 hqnl0246134 sshd[230958]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0626 seconds
INFO [2022-12-06 15:59:57,428] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.109.225.178', 'timestamp': 1670335197.3622112, 'message': 'Dec 6 15:59:57 hqnl0246134 sshd[230960]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.109.225.178 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0628 seconds
INFO [2022-12-06 15:59:57,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335197.3619266, 'message': 'Dec 6 15:59:55 hqnl0246134 sshd[230958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0572 seconds
INFO [2022-12-06 15:59:57,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.109.225.178', 'timestamp': 1670335197.3624706, 'message': 'Dec 6 15:59:57 hqnl0246134 sshd[230960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.109.225.178 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0563 seconds
INFO [2022-12-06 15:59:59,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335199.3634307, 'message': 'Dec 6 15:59:57 hqnl0246134 sshd[230958]: Failed password for root from 61.177.172.19 port 13445 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 15:59:59,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '189.109.225.178', 'timestamp': 1670335199.363655, 'message': 'Dec 6 15:59:58 hqnl0246134 sshd[230960]: Failed password for root from 189.109.225.178 port 62842 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 16:00:01,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335201.3772604, 'message': 'Dec 6 15:59:59 hqnl0246134 sshd[230958]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 16:00:03,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335203.369596, 'message': 'Dec 6 16:00:01 hqnl0246134 sshd[230958]: Failed password for root from 61.177.172.19 port 13445 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 16:00:05,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335205.3734057, 'message': 'Dec 6 16:00:04 hqnl0246134 sshd[230958]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 16:00:05,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335205.3735938, 'message': 'Dec 6 16:00:05 hqnl0246134 sshd[231007]: Invalid user gui from 43.153.89.12 port 47650', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 16:00:05,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335205.3737054, 'message': 'Dec 6 16:00:05 hqnl0246134 sshd[231007]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.89.12 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:00:05,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335205.3739042, 'message': 'Dec 6 16:00:05 hqnl0246134 sshd[231007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.89.12 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 16:00:07,426] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335207.3754184, 'message': 'Dec 6 16:00:05 hqnl0246134 sshd[230958]: Failed password for root from 61.177.172.19 port 13445 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0504 seconds
INFO [2022-12-06 16:00:07,428] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335207.375774, 'message': 'Dec 6 16:00:06 hqnl0246134 sshd[231007]: Failed password for invalid user gui from 43.153.89.12 port 47650 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0506 seconds
WARNING [2022-12-06 16:00:08,679] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:00:08,709] defence360agent.internals.the_sink: SensorIncidentList(<21 item(s)>) processed in 0.0392 seconds
INFO [2022-12-06 16:00:09,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335209.3771625, 'message': 'Dec 6 16:00:08 hqnl0246134 sshd[231007]: Disconnected from invalid user gui 43.153.89.12 port 47650 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:00:18,971] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:00:18,972] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:00:18,980] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:00:18,991] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 16:00:21,696] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:00:21,697] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:00:21,704] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:00:21,714] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 16:00:31,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.38.229', 'timestamp': 1670335231.4024115, 'message': 'Dec 6 16:00:31 hqnl0246134 sshd[231050]: Invalid user db2inst1 from 46.101.38.229 port 46886', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 16:00:33,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335233.4051096, 'message': 'Dec 6 16:00:31 hqnl0246134 sshd[231047]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 16:00:33,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.38.229', 'timestamp': 1670335233.4055665, 'message': 'Dec 6 16:00:31 hqnl0246134 sshd[231050]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.38.229 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 16:00:33,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335233.4054089, 'message': 'Dec 6 16:00:31 hqnl0246134 sshd[231047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 16:00:33,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.38.229', 'timestamp': 1670335233.4057016, 'message': 'Dec 6 16:00:31 hqnl0246134 sshd[231050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.38.229 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 16:00:33,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335233.4061246, 'message': 'Dec 6 16:00:32 hqnl0246134 sshd[231047]: Failed password for root from 61.177.172.19 port 29927 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 16:00:33,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.38.229', 'timestamp': 1670335233.4062548, 'message': 'Dec 6 16:00:33 hqnl0246134 sshd[231050]: Failed password for invalid user db2inst1 from 46.101.38.229 port 46886 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 16:00:33,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.38.229', 'timestamp': 1670335233.4067523, 'message': 'Dec 6 16:00:33 hqnl0246134 sshd[231050]: Disconnected from invalid user db2inst1 46.101.38.229 port 46886 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:00:35,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335235.405748, 'message': 'Dec 6 16:00:33 hqnl0246134 sshd[231047]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 16:00:37,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.186.252.110', 'timestamp': 1670335237.4067686, 'message': 'Dec 6 16:00:36 hqnl0246134 sshd[231055]: Invalid user es from 122.186.252.110 port 33932', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0448 seconds
INFO [2022-12-06 16:00:37,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335237.4076147, 'message': 'Dec 6 16:00:36 hqnl0246134 sshd[231047]: Failed password for root from 61.177.172.19 port 29927 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0439 seconds
INFO [2022-12-06 16:00:37,471] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.186.252.110', 'timestamp': 1670335237.4071357, 'message': 'Dec 6 16:00:36 hqnl0246134 sshd[231055]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.186.252.110 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:00:37,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.186.252.110', 'timestamp': 1670335237.407403, 'message': 'Dec 6 16:00:36 hqnl0246134 sshd[231055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.186.252.110 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 16:00:39,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.186.252.110', 'timestamp': 1670335239.4090788, 'message': 'Dec 6 16:00:37 hqnl0246134 sshd[231055]: Failed password for invalid user es from 122.186.252.110 port 33932 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 16:00:39,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335239.4093533, 'message': 'Dec 6 16:00:38 hqnl0246134 sshd[231047]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 16:00:39,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.186.252.110', 'timestamp': 1670335239.409518, 'message': 'Dec 6 16:00:38 hqnl0246134 sshd[231055]: Disconnected from invalid user es 122.186.252.110 port 33932 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 16:00:41,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335241.4102252, 'message': 'Dec 6 16:00:40 hqnl0246134 sshd[231047]: Failed password for root from 61.177.172.19 port 29927 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 16:00:41,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.228.25', 'timestamp': 1670335241.4104972, 'message': 'Dec 6 16:00:41 hqnl0246134 sshd[231057]: Invalid user wy from 128.199.228.25 port 51100', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 16:00:41,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.228.25', 'timestamp': 1670335241.4177, 'message': 'Dec 6 16:00:41 hqnl0246134 sshd[231057]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.228.25 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:00:41,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.228.25', 'timestamp': 1670335241.417839, 'message': 'Dec 6 16:00:41 hqnl0246134 sshd[231057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.228.25 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 16:00:43,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.228.25', 'timestamp': 1670335243.4122705, 'message': 'Dec 6 16:00:42 hqnl0246134 sshd[231057]: Failed password for invalid user wy from 128.199.228.25 port 51100 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:00:43,448] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.228.25', 'timestamp': 1670335243.420929, 'message': 'Dec 6 16:00:43 hqnl0246134 sshd[231057]: Disconnected from invalid user wy 128.199.228.25 port 51100 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 16:00:45,158] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:00:45,159] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:00:45,166] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:00:45,178] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
WARNING [2022-12-06 16:00:47,150] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:00:47,150] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:00:47,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335247.4164042, 'message': 'Dec 6 16:00:46 hqnl0246134 sshd[231061]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 16:00:47,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335247.4167044, 'message': 'Dec 6 16:00:46 hqnl0246134 sshd[231061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 16:00:49,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335249.4217732, 'message': 'Dec 6 16:00:48 hqnl0246134 sshd[231061]: Failed password for root from 61.177.172.19 port 12871 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 16:00:49,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '163.44.254.105', 'timestamp': 1670335249.4260342, 'message': 'Dec 6 16:00:48 hqnl0246134 sshd[231067]: pam_imunify(sshd:auth): [IM360_RBL] The IP 163.44.254.105 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 16:00:49,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '163.44.254.105', 'timestamp': 1670335249.4262059, 'message': 'Dec 6 16:00:48 hqnl0246134 sshd[231067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.254.105 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:00:51,493] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '163.44.254.105', 'timestamp': 1670335251.4272025, 'message': 'Dec 6 16:00:50 hqnl0246134 sshd[231067]: Failed password for root from 163.44.254.105 port 46148 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0642 seconds
INFO [2022-12-06 16:00:51,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335251.4276092, 'message': 'Dec 6 16:00:50 hqnl0246134 sshd[231081]: Invalid user gui from 95.86.165.90 port 39640', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0644 seconds
INFO [2022-12-06 16:00:51,496] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335251.4283159, 'message': 'Dec 6 16:00:50 hqnl0246134 sshd[231061]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0635 seconds
INFO [2022-12-06 16:00:51,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335251.4278054, 'message': 'Dec 6 16:00:50 hqnl0246134 sshd[231081]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.86.165.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 16:00:51,523] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335251.4290986, 'message': 'Dec 6 16:00:51 hqnl0246134 sshd[231083]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 16:00:51,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335251.4280198, 'message': 'Dec 6 16:00:50 hqnl0246134 sshd[231081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.86.165.90 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 16:00:51,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335251.429296, 'message': 'Dec 6 16:00:51 hqnl0246134 sshd[231083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 16:00:53,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335253.4329486, 'message': 'Dec 6 16:00:52 hqnl0246134 sshd[231081]: Failed password for invalid user gui from 95.86.165.90 port 39640 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 16:00:53,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335253.4332037, 'message': 'Dec 6 16:00:52 hqnl0246134 sshd[231061]: Failed password for root from 61.177.172.19 port 12871 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0431 seconds
INFO [2022-12-06 16:00:53,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335253.4338903, 'message': 'Dec 6 16:00:53 hqnl0246134 sshd[231083]: Failed password for root from 61.177.173.18 port 20524 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0431 seconds
INFO [2022-12-06 16:00:53,504] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335253.4334826, 'message': 'Dec 6 16:00:53 hqnl0246134 sshd[231081]: Disconnected from invalid user gui 95.86.165.90 port 39640 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 16:00:53,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335253.4333305, 'message': 'Dec 6 16:00:52 hqnl0246134 sshd[231061]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 16:00:55,458] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335255.4367702, 'message': 'Dec 6 16:00:55 hqnl0246134 sshd[231061]: Failed password for root from 61.177.172.19 port 12871 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 16:00:57,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335257.438202, 'message': 'Dec 6 16:00:56 hqnl0246134 sshd[231083]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0467 seconds
INFO [2022-12-06 16:00:59,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335259.4410143, 'message': 'Dec 6 16:00:58 hqnl0246134 sshd[231083]: Failed password for root from 61.177.173.18 port 20524 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 16:01:01,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335261.4495533, 'message': 'Dec 6 16:01:00 hqnl0246134 sshd[231083]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 16:01:03,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335263.4458745, 'message': 'Dec 6 16:01:01 hqnl0246134 sshd[231083]: Failed password for root from 61.177.173.18 port 20524 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0268 seconds
WARNING [2022-12-06 16:01:09,461] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:01:09,499] defence360agent.internals.the_sink: SensorIncidentList(<22 item(s)>) processed in 0.8140 seconds
INFO [2022-12-06 16:01:09,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '58.17.200.197', 'timestamp': 1670335269.4528131, 'message': 'Dec 6 16:01:07 hqnl0246134 sshd[231115]: Invalid user postgres from 58.17.200.197 port 54502', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0479 seconds
INFO [2022-12-06 16:01:09,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '58.17.200.197', 'timestamp': 1670335269.4529731, 'message': 'Dec 6 16:01:07 hqnl0246134 sshd[231115]: pam_imunify(sshd:auth): [IM360_RBL] The IP 58.17.200.197 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 16:01:09,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '58.17.200.197', 'timestamp': 1670335269.4531014, 'message': 'Dec 6 16:01:07 hqnl0246134 sshd[231115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.17.200.197 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 16:01:11,474] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '58.17.200.197', 'timestamp': 1670335271.453584, 'message': 'Dec 6 16:01:09 hqnl0246134 sshd[231115]: Failed password for invalid user postgres from 58.17.200.197 port 54502 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 16:01:11,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '58.17.200.197', 'timestamp': 1670335271.4537568, 'message': 'Dec 6 16:01:10 hqnl0246134 sshd[231115]: Disconnected from invalid user postgres 58.17.200.197 port 54502 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 16:01:19,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335279.4659212, 'message': 'Dec 6 16:01:18 hqnl0246134 sshd[231120]: Invalid user ahmad from 190.246.155.29 port 34224', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 16:01:19,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335279.466287, 'message': 'Dec 6 16:01:18 hqnl0246134 sshd[231120]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.246.155.29 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 16:01:19,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335279.4665368, 'message': 'Dec 6 16:01:18 hqnl0246134 sshd[231120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.155.29 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:01:19,626] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:01:19,627] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:01:19,634] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:01:19,646] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 16:01:21,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335281.4738686, 'message': 'Dec 6 16:01:20 hqnl0246134 sshd[231120]: Failed password for invalid user ahmad from 190.246.155.29 port 34224 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 16:01:21,504] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335281.4740632, 'message': 'Dec 6 16:01:20 hqnl0246134 sshd[231125]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 16:01:21,530] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.246.155.29', 'timestamp': 1670335281.4742765, 'message': 'Dec 6 16:01:21 hqnl0246134 sshd[231120]: Disconnected from invalid user ahmad 190.246.155.29 port 34224 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 16:01:21,531] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335281.4741724, 'message': 'Dec 6 16:01:20 hqnl0246134 sshd[231125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 16:01:22,360] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:01:22,361] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:01:22,368] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:01:22,390] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0284 seconds
INFO [2022-12-06 16:01:23,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335283.4764302, 'message': 'Dec 6 16:01:22 hqnl0246134 sshd[231125]: Failed password for root from 61.177.172.19 port 48680 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 16:01:25,509] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335285.4789767, 'message': 'Dec 6 16:01:24 hqnl0246134 sshd[231134]: Invalid user postgres from 43.153.89.12 port 44878', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 16:01:25,511] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335285.4795153, 'message': 'Dec 6 16:01:25 hqnl0246134 sshd[231125]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 16:01:25,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335285.4792376, 'message': 'Dec 6 16:01:24 hqnl0246134 sshd[231134]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.89.12 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 16:01:25,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335285.479363, 'message': 'Dec 6 16:01:24 hqnl0246134 sshd[231134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.89.12 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 16:01:27,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335287.4814546, 'message': 'Dec 6 16:01:26 hqnl0246134 sshd[231134]: Failed password for invalid user postgres from 43.153.89.12 port 44878 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 16:01:27,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335287.4820008, 'message': 'Dec 6 16:01:26 hqnl0246134 sshd[231125]: Failed password for root from 61.177.172.19 port 48680 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 16:01:27,537] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.89.12', 'timestamp': 1670335287.4818547, 'message': 'Dec 6 16:01:26 hqnl0246134 sshd[231134]: Disconnected from invalid user postgres 43.153.89.12 port 44878 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:01:29,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335289.482479, 'message': 'Dec 6 16:01:27 hqnl0246134 sshd[231125]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:01:31,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670335291.4859104, 'message': 'Dec 6 16:01:30 hqnl0246134 sshd[231125]: Failed password for root from 61.177.172.19 port 48680 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
WARNING [2022-12-06 16:01:47,153] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:01:47,154] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:01:49,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335309.5054424, 'message': 'Dec 6 16:01:49 hqnl0246134 sshd[231157]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0876 seconds
INFO [2022-12-06 16:01:49,595] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335309.5061126, 'message': 'Dec 6 16:01:49 hqnl0246134 sshd[231155]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0876 seconds
INFO [2022-12-06 16:01:49,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335309.5059917, 'message': 'Dec 6 16:01:49 hqnl0246134 sshd[231157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0715 seconds
INFO [2022-12-06 16:01:49,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335309.5062265, 'message': 'Dec 6 16:01:49 hqnl0246134 sshd[231155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0713 seconds
INFO [2022-12-06 16:01:51,554] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335311.5068383, 'message': 'Dec 6 16:01:50 hqnl0246134 sshd[231157]: Failed password for root from 61.177.173.18 port 10073 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0463 seconds
INFO [2022-12-06 16:01:51,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335311.507197, 'message': 'Dec 6 16:01:50 hqnl0246134 sshd[231155]: Failed password for root from 61.177.172.104 port 15515 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0463 seconds
INFO [2022-12-06 16:01:51,583] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335311.5074604, 'message': 'Dec 6 16:01:51 hqnl0246134 sshd[231157]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 16:01:51,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335311.5076482, 'message': 'Dec 6 16:01:51 hqnl0246134 sshd[231155]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
WARNING [2022-12-06 16:01:53,331] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 16:01:55,554] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335315.5137217, 'message': 'Dec 6 16:01:53 hqnl0246134 sshd[231157]: Failed password for root from 61.177.173.18 port 10073 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-06 16:01:55,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335315.5142102, 'message': 'Dec 6 16:01:53 hqnl0246134 sshd[231155]: Failed password for root from 61.177.172.104 port 15515 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0393 seconds
INFO [2022-12-06 16:01:57,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335317.5179918, 'message': 'Dec 6 16:01:55 hqnl0246134 sshd[231157]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 16:01:57,557] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335317.5183415, 'message': 'Dec 6 16:01:55 hqnl0246134 sshd[231155]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 16:01:59,561] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335319.52027, 'message': 'Dec 6 16:01:57 hqnl0246134 sshd[231157]: Failed password for root from 61.177.173.18 port 10073 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0408 seconds
INFO [2022-12-06 16:01:59,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335319.5204868, 'message': 'Dec 6 16:01:57 hqnl0246134 sshd[231155]: Failed password for root from 61.177.172.104 port 15515 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0414 seconds
INFO [2022-12-06 16:02:02,603] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:02:02,604] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:02:02,611] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:02:02,622] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
WARNING [2022-12-06 16:02:08,696] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:02:08,726] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0379 seconds
INFO [2022-12-06 16:02:11,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '58.17.200.197', 'timestamp': 1670335331.5490153, 'message': 'Dec 6 16:02:11 hqnl0246134 sshd[231196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 58.17.200.197 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 16:02:11,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '58.17.200.197', 'timestamp': 1670335331.5493667, 'message': 'Dec 6 16:02:11 hqnl0246134 sshd[231196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.17.200.197 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:02:13,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '58.17.200.197', 'timestamp': 1670335333.5518794, 'message': 'Dec 6 16:02:12 hqnl0246134 sshd[231196]: Failed password for root from 58.17.200.197 port 38422 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0438 seconds
INFO [2022-12-06 16:02:13,597] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335333.5522022, 'message': 'Dec 6 16:02:13 hqnl0246134 sshd[231199]: pam_imunify(sshd:auth): [IM360_RBL] The IP 52.170.31.174 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0436 seconds
INFO [2022-12-06 16:02:13,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335333.552454, 'message': 'Dec 6 16:02:13 hqnl0246134 sshd[231199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.170.31.174 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 16:02:15,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335335.554285, 'message': 'Dec 6 16:02:15 hqnl0246134 sshd[231199]: Failed password for root from 52.170.31.174 port 42612 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 16:02:17,805] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:02:17,806] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:02:17,813] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:02:17,825] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 16:02:20,428] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:02:20,428] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:02:20,437] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:02:20,448] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 16:02:22,659] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 16:02:22,740] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 16:02:22,740] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 16:02:22,741] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 16:02:22,741] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 16:02:22,741] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 16:02:22,753] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 16:02:22,769] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0271 seconds
WARNING [2022-12-06 16:02:22,775] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 16:02:22,777] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:02:22,796] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0330 seconds
INFO [2022-12-06 16:02:22,798] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0311 seconds
INFO [2022-12-06 16:02:25,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335345.5704675, 'message': 'Dec 6 16:02:23 hqnl0246134 sshd[231211]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0741 seconds
INFO [2022-12-06 16:02:25,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335345.5710855, 'message': 'Dec 6 16:02:24 hqnl0246134 sshd[231213]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0748 seconds
INFO [2022-12-06 16:02:25,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335345.570777, 'message': 'Dec 6 16:02:23 hqnl0246134 sshd[231211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0432 seconds
INFO [2022-12-06 16:02:25,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335345.5712564, 'message': 'Dec 6 16:02:24 hqnl0246134 sshd[231213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 16:02:25,708] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335345.5713956, 'message': 'Dec 6 16:02:25 hqnl0246134 sshd[231211]: Failed password for root from 61.177.172.104 port 26623 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:02:27,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335347.5730064, 'message': 'Dec 6 16:02:26 hqnl0246134 sshd[231211]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0519 seconds
INFO [2022-12-06 16:02:27,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335347.5733402, 'message': 'Dec 6 16:02:26 hqnl0246134 sshd[231213]: Failed password for root from 61.177.173.39 port 51975 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0523 seconds
INFO [2022-12-06 16:02:27,628] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335347.5736704, 'message': 'Dec 6 16:02:26 hqnl0246134 sshd[231219]: Invalid user admin from 51.79.146.239 port 48588', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0515 seconds
INFO [2022-12-06 16:02:27,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335347.5735483, 'message': 'Dec 6 16:02:26 hqnl0246134 sshd[231213]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 16:02:27,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335347.573802, 'message': 'Dec 6 16:02:27 hqnl0246134 sshd[231219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.79.146.239 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 16:02:27,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335347.5739262, 'message': 'Dec 6 16:02:27 hqnl0246134 sshd[231219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.146.239 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 16:02:29,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335349.5749233, 'message': 'Dec 6 16:02:28 hqnl0246134 sshd[231211]: Failed password for root from 61.177.172.104 port 26623 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-06 16:02:29,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335349.5751054, 'message': 'Dec 6 16:02:29 hqnl0246134 sshd[231213]: Failed password for root from 61.177.173.39 port 51975 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0459 seconds
INFO [2022-12-06 16:02:29,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335349.5752165, 'message': 'Dec 6 16:02:29 hqnl0246134 sshd[231219]: Failed password for invalid user admin from 51.79.146.239 port 48588 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0457 seconds
INFO [2022-12-06 16:02:31,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335351.582236, 'message': 'Dec 6 16:02:30 hqnl0246134 sshd[231211]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0638 seconds
INFO [2022-12-06 16:02:31,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335351.582458, 'message': 'Dec 6 16:02:30 hqnl0246134 sshd[231219]: Disconnected from invalid user admin 51.79.146.239 port 48588 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0642 seconds
INFO [2022-12-06 16:02:31,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335351.582568, 'message': 'Dec 6 16:02:31 hqnl0246134 sshd[231213]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0641 seconds
INFO [2022-12-06 16:02:33,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670335353.5840437, 'message': 'Dec 6 16:02:32 hqnl0246134 sshd[231211]: Failed password for root from 61.177.172.104 port 26623 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 16:02:33,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335353.5842614, 'message': 'Dec 6 16:02:32 hqnl0246134 sshd[231213]: Failed password for root from 61.177.173.39 port 51975 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 16:02:37,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335357.592986, 'message': 'Dec 6 16:02:35 hqnl0246134 sshd[231231]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 16:02:37,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335357.593257, 'message': 'Dec 6 16:02:35 hqnl0246134 sshd[231231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:02:37,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335357.5933914, 'message': 'Dec 6 16:02:37 hqnl0246134 sshd[231231]: Failed password for root from 61.177.173.39 port 18819 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:02:39,624] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335359.5944262, 'message': 'Dec 6 16:02:38 hqnl0246134 sshd[231231]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 16:02:39,625] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335359.5947163, 'message': 'Dec 6 16:02:38 hqnl0246134 sshd[231233]: Invalid user gui from 112.133.228.250 port 37482', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 16:02:39,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335359.594884, 'message': 'Dec 6 16:02:38 hqnl0246134 sshd[231233]: pam_imunify(sshd:auth): [IM360_RBL] The IP 112.133.228.250 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:02:39,660] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335359.5950112, 'message': 'Dec 6 16:02:38 hqnl0246134 sshd[231233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.133.228.250 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 16:02:41,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335361.5968797, 'message': 'Dec 6 16:02:40 hqnl0246134 sshd[231231]: Failed password for root from 61.177.173.39 port 18819 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0900 seconds
INFO [2022-12-06 16:02:41,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335361.5971034, 'message': 'Dec 6 16:02:40 hqnl0246134 sshd[231233]: Failed password for invalid user gui from 112.133.228.250 port 37482 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1069 seconds
INFO [2022-12-06 16:02:41,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335361.5972438, 'message': 'Dec 6 16:02:40 hqnl0246134 sshd[231231]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0957 seconds
INFO [2022-12-06 16:02:41,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335361.5973997, 'message': 'Dec 6 16:02:41 hqnl0246134 sshd[231233]: Disconnected from invalid user gui 112.133.228.250 port 37482 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0956 seconds
INFO [2022-12-06 16:02:43,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335363.599861, 'message': 'Dec 6 16:02:42 hqnl0246134 sshd[231236]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 16:02:43,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335363.6003091, 'message': 'Dec 6 16:02:43 hqnl0246134 sshd[231231]: Failed password for root from 61.177.173.39 port 18819 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 16:02:43,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335363.6001198, 'message': 'Dec 6 16:02:42 hqnl0246134 sshd[231236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 16:02:45,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335365.6066768, 'message': 'Dec 6 16:02:44 hqnl0246134 sshd[231236]: Failed password for root from 61.177.173.18 port 62354 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 16:02:45,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335365.607059, 'message': 'Dec 6 16:02:44 hqnl0246134 sshd[231236]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0278 seconds
WARNING [2022-12-06 16:02:47,159] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:02:47,160] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:02:47,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335367.6088486, 'message': 'Dec 6 16:02:46 hqnl0246134 sshd[231236]: Failed password for root from 61.177.173.18 port 62354 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 16:02:47,644] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335367.6091921, 'message': 'Dec 6 16:02:46 hqnl0246134 sshd[231245]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 16:02:47,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335367.6093214, 'message': 'Dec 6 16:02:46 hqnl0246134 sshd[231245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 16:02:49,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335369.610551, 'message': 'Dec 6 16:02:48 hqnl0246134 sshd[231236]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 16:02:49,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335369.6108832, 'message': 'Dec 6 16:02:49 hqnl0246134 sshd[231245]: Failed password for root from 61.177.173.39 port 58392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 16:02:51,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335371.6129124, 'message': 'Dec 6 16:02:50 hqnl0246134 sshd[231236]: Failed password for root from 61.177.173.18 port 62354 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0579 seconds
INFO [2022-12-06 16:02:51,672] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335371.6131945, 'message': 'Dec 6 16:02:51 hqnl0246134 sshd[231245]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0582 seconds
INFO [2022-12-06 16:02:52,869] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 16:02:52,870] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 16:02:52,871] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 16:02:53,644] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335373.6157339, 'message': 'Dec 6 16:02:53 hqnl0246134 sshd[231245]: Failed password for root from 61.177.173.39 port 58392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 16:02:55,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335375.6211336, 'message': 'Dec 6 16:02:55 hqnl0246134 sshd[231245]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0472 seconds
INFO [2022-12-06 16:02:57,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670335377.623771, 'message': 'Dec 6 16:02:57 hqnl0246134 sshd[231245]: Failed password for root from 61.177.173.39 port 58392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0344 seconds
WARNING [2022-12-06 16:03:08,700] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:03:08,734] defence360agent.internals.the_sink: SensorIncidentList(<21 item(s)>) processed in 0.0419 seconds
INFO [2022-12-06 16:03:11,677] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '58.17.200.197', 'timestamp': 1670335391.651035, 'message': 'Dec 6 16:03:10 hqnl0246134 sshd[231269]: pam_imunify(sshd:auth): [IM360_RBL] The IP 58.17.200.197 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 16:03:11,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '58.17.200.197', 'timestamp': 1670335391.6512725, 'message': 'Dec 6 16:03:10 hqnl0246134 sshd[231269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.17.200.197 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 16:03:13,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '58.17.200.197', 'timestamp': 1670335393.6532824, 'message': 'Dec 6 16:03:13 hqnl0246134 sshd[231269]: Failed password for root from 58.17.200.197 port 50572 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 16:03:20,609] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:03:20,610] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:03:20,617] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:03:20,645] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0340 seconds
INFO [2022-12-06 16:03:21,800] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:03:21,801] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:03:21,818] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:03:21,837] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0353 seconds
INFO [2022-12-06 16:03:24,746] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:03:24,747] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:03:24,754] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:03:24,764] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 16:03:35,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335415.6852152, 'message': 'Dec 6 16:03:34 hqnl0246134 sshd[231303]: Invalid user postgres from 95.86.165.90 port 41552', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 16:03:35,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335415.6856577, 'message': 'Dec 6 16:03:34 hqnl0246134 sshd[231303]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.86.165.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 16:03:35,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335415.6867821, 'message': 'Dec 6 16:03:34 hqnl0246134 sshd[231303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.86.165.90 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:03:37,714] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335417.6860807, 'message': 'Dec 6 16:03:37 hqnl0246134 sshd[231303]: Failed password for invalid user postgres from 95.86.165.90 port 41552 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 16:03:37,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335417.6863496, 'message': 'Dec 6 16:03:37 hqnl0246134 sshd[231305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 16:03:37,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335417.686504, 'message': 'Dec 6 16:03:37 hqnl0246134 sshd[231305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 16:03:39,722] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335419.6904733, 'message': 'Dec 6 16:03:38 hqnl0246134 sshd[231303]: Disconnected from invalid user postgres 95.86.165.90 port 41552 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 16:03:39,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335419.6908054, 'message': 'Dec 6 16:03:39 hqnl0246134 sshd[231305]: Failed password for root from 61.177.173.18 port 14845 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 16:03:41,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335421.693731, 'message': 'Dec 6 16:03:39 hqnl0246134 sshd[231305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 16:03:43,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335423.6973875, 'message': 'Dec 6 16:03:42 hqnl0246134 sshd[231305]: Failed password for root from 61.177.173.18 port 14845 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 16:03:45,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335425.7003543, 'message': 'Dec 6 16:03:44 hqnl0246134 sshd[231305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 16:03:47,164] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:03:47,165] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:03:47,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335427.705412, 'message': 'Dec 6 16:03:46 hqnl0246134 sshd[231305]: Failed password for root from 61.177.173.18 port 14845 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 16:03:53,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335433.7149966, 'message': 'Dec 6 16:03:52 hqnl0246134 sshd[231308]: Invalid user postgres from 112.133.228.250 port 37550', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 16:03:53,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335433.7152581, 'message': 'Dec 6 16:03:52 hqnl0246134 sshd[231308]: pam_imunify(sshd:auth): [IM360_RBL] The IP 112.133.228.250 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 16:03:53,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335433.7154088, 'message': 'Dec 6 16:03:52 hqnl0246134 sshd[231308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.133.228.250 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:03:55,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335435.7167163, 'message': 'Dec 6 16:03:55 hqnl0246134 sshd[231308]: Failed password for invalid user postgres from 112.133.228.250 port 37550 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 16:03:57,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335437.7204032, 'message': 'Dec 6 16:03:57 hqnl0246134 sshd[231308]: Disconnected from invalid user postgres 112.133.228.250 port 37550 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
WARNING [2022-12-06 16:04:08,708] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:04:08,735] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0360 seconds
INFO [2022-12-06 16:04:11,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335451.7498212, 'message': 'Dec 6 16:04:10 hqnl0246134 sshd[231330]: Invalid user postgres from 52.170.31.174 port 43972', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:04:11,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335451.7500076, 'message': 'Dec 6 16:04:10 hqnl0246134 sshd[231330]: pam_imunify(sshd:auth): [IM360_RBL] The IP 52.170.31.174 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:04:11,806] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335451.7501488, 'message': 'Dec 6 16:04:10 hqnl0246134 sshd[231330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.170.31.174 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:04:13,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335453.7512233, 'message': 'Dec 6 16:04:12 hqnl0246134 sshd[231330]: Failed password for invalid user postgres from 52.170.31.174 port 43972 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 16:04:15,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335455.7536547, 'message': 'Dec 6 16:04:14 hqnl0246134 sshd[231330]: Disconnected from invalid user postgres 52.170.31.174 port 43972 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:04:17,832] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:04:17,833] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:04:17,842] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:04:17,864] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0295 seconds
INFO [2022-12-06 16:04:20,497] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:04:20,497] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:04:20,505] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:04:20,517] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 16:04:31,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.12.193.109', 'timestamp': 1670335471.793599, 'message': 'Dec 6 16:04:30 hqnl0246134 sshd[231356]: Invalid user tommy from 59.12.193.109 port 39291', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0402 seconds
INFO [2022-12-06 16:04:31,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335471.7946641, 'message': 'Dec 6 16:04:31 hqnl0246134 sshd[231358]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0395 seconds
INFO [2022-12-06 16:04:31,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.12.193.109', 'timestamp': 1670335471.7941406, 'message': 'Dec 6 16:04:30 hqnl0246134 sshd[231356]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.12.193.109 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 16:04:31,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335471.7948709, 'message': 'Dec 6 16:04:31 hqnl0246134 sshd[231358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 16:04:31,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.12.193.109', 'timestamp': 1670335471.7944086, 'message': 'Dec 6 16:04:30 hqnl0246134 sshd[231356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.12.193.109 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 16:04:33,814] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.12.193.109', 'timestamp': 1670335473.7955592, 'message': 'Dec 6 16:04:32 hqnl0246134 sshd[231356]: Failed password for invalid user tommy from 59.12.193.109 port 39291 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:04:33,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.12.193.109', 'timestamp': 1670335473.795756, 'message': 'Dec 6 16:04:33 hqnl0246134 sshd[231356]: Disconnected from invalid user tommy 59.12.193.109 port 39291 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:04:35,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335475.7992177, 'message': 'Dec 6 16:04:33 hqnl0246134 sshd[231358]: Failed password for root from 61.177.173.18 port 21479 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:04:35,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335475.7995207, 'message': 'Dec 6 16:04:35 hqnl0246134 sshd[231358]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:04:37,827] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335477.8034625, 'message': 'Dec 6 16:04:37 hqnl0246134 sshd[231358]: Failed password for root from 61.177.173.18 port 21479 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 16:04:39,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335479.8062062, 'message': 'Dec 6 16:04:38 hqnl0246134 sshd[231358]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 16:04:39,854] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335479.806523, 'message': 'Dec 6 16:04:39 hqnl0246134 sshd[231358]: Failed password for root from 61.177.173.18 port 21479 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 16:04:43,350] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:04:43,351] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:04:43,364] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:04:43,378] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0263 seconds
WARNING [2022-12-06 16:04:47,168] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:04:47,169] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:04:47,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.79.42.236', 'timestamp': 1670335487.819744, 'message': 'Dec 6 16:04:45 hqnl0246134 sshd[231398]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.79.42.236 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 16:04:47,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.79.42.236', 'timestamp': 1670335487.8200834, 'message': 'Dec 6 16:04:45 hqnl0246134 sshd[231398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.79.42.236 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 16:04:49,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '217.79.42.236', 'timestamp': 1670335489.8244185, 'message': 'Dec 6 16:04:48 hqnl0246134 sshd[231398]: Failed password for root from 217.79.42.236 port 42266 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 16:04:55,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335495.8383641, 'message': 'Dec 6 16:04:54 hqnl0246134 sshd[231400]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0733 seconds
INFO [2022-12-06 16:04:55,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335495.8388438, 'message': 'Dec 6 16:04:54 hqnl0246134 sshd[231400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0653 seconds
INFO [2022-12-06 16:04:57,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335497.8401878, 'message': 'Dec 6 16:04:55 hqnl0246134 sshd[231400]: Failed password for root from 61.177.173.51 port 17294 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 16:04:59,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335499.8422387, 'message': 'Dec 6 16:04:58 hqnl0246134 sshd[231400]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:05:01,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335501.8464863, 'message': 'Dec 6 16:05:00 hqnl0246134 sshd[231400]: Failed password for root from 61.177.173.51 port 17294 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0744 seconds
INFO [2022-12-06 16:05:01,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335501.8467617, 'message': 'Dec 6 16:05:00 hqnl0246134 sshd[231400]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0555 seconds
INFO [2022-12-06 16:05:03,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335503.8542447, 'message': 'Dec 6 16:05:01 hqnl0246134 sshd[231400]: Failed password for root from 61.177.173.51 port 17294 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 16:05:05,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335505.8548455, 'message': 'Dec 6 16:05:04 hqnl0246134 sshd[231439]: pam_imunify(sshd:auth): [IM360_RBL] The IP 112.133.228.250 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 16:05:05,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335505.8551548, 'message': 'Dec 6 16:05:04 hqnl0246134 sshd[231439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.133.228.250 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 16:05:07,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335507.8582218, 'message': 'Dec 6 16:05:05 hqnl0246134 sshd[231437]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 16:05:07,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '112.133.228.250', 'timestamp': 1670335507.8585844, 'message': 'Dec 6 16:05:07 hqnl0246134 sshd[231439]: Failed password for root from 112.133.228.250 port 37616 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 16:05:07,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335507.8584154, 'message': 'Dec 6 16:05:05 hqnl0246134 sshd[231437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 16:05:07,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335507.8587646, 'message': 'Dec 6 16:05:07 hqnl0246134 sshd[231437]: Failed password for root from 61.177.173.51 port 42023 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 16:05:08,714] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:05:08,749] defence360agent.internals.the_sink: SensorIncidentList(<19 item(s)>) processed in 0.0456 seconds
INFO [2022-12-06 16:05:09,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335509.8615963, 'message': 'Dec 6 16:05:08 hqnl0246134 sshd[231437]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:05:11,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335511.8637104, 'message': 'Dec 6 16:05:11 hqnl0246134 sshd[231437]: Failed password for root from 61.177.173.51 port 42023 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:05:13,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335513.8657155, 'message': 'Dec 6 16:05:13 hqnl0246134 sshd[231437]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:05:15,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670335515.8679905, 'message': 'Dec 6 16:05:15 hqnl0246134 sshd[231437]: Failed password for root from 61.177.173.51 port 42023 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 16:05:18,049] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:05:18,049] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:05:18,058] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:05:18,069] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 16:05:21,592] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:05:21,593] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:05:21,602] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:05:21,615] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 16:05:27,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335527.885956, 'message': 'Dec 6 16:05:26 hqnl0246134 sshd[231469]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 16:05:27,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335527.8863525, 'message': 'Dec 6 16:05:26 hqnl0246134 sshd[231469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:05:29,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335529.8861916, 'message': 'Dec 6 16:05:28 hqnl0246134 sshd[231469]: Failed password for root from 61.177.173.18 port 32143 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:05:31,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335531.8896267, 'message': 'Dec 6 16:05:30 hqnl0246134 sshd[231469]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 16:05:33,919] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335533.896722, 'message': 'Dec 6 16:05:33 hqnl0246134 sshd[231469]: Failed password for root from 61.177.173.18 port 32143 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 16:05:35,920] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335535.9019763, 'message': 'Dec 6 16:05:35 hqnl0246134 sshd[231469]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:05:37,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335537.9074643, 'message': 'Dec 6 16:05:36 hqnl0246134 sshd[231469]: Failed password for root from 61.177.173.18 port 32143 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 16:05:47,174] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:05:47,176] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:06:08,718] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:06:08,744] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0366 seconds
INFO [2022-12-06 16:06:11,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335571.946577, 'message': 'Dec 6 16:06:11 hqnl0246134 sshd[231520]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.86.165.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 16:06:11,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335571.9468472, 'message': 'Dec 6 16:06:11 hqnl0246134 sshd[231520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.86.165.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 16:06:13,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '95.86.165.90', 'timestamp': 1670335573.946201, 'message': 'Dec 6 16:06:12 hqnl0246134 sshd[231520]: Failed password for root from 95.86.165.90 port 41092 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:06:15,918] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:06:15,918] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:06:15,929] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:06:15,943] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 16:06:15,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335575.9465694, 'message': 'Dec 6 16:06:14 hqnl0246134 sshd[231525]: pam_imunify(sshd:auth): [IM360_RBL] The IP 52.170.31.174 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 16:06:15,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335575.9467335, 'message': 'Dec 6 16:06:14 hqnl0246134 sshd[231525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.170.31.174 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:06:17,812] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:06:17,812] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:06:17,820] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:06:17,832] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 16:06:18,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '52.170.31.174', 'timestamp': 1670335577.9492218, 'message': 'Dec 6 16:06:17 hqnl0246134 sshd[231525]: Failed password for root from 52.170.31.174 port 45340 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1318 seconds
INFO [2022-12-06 16:06:20,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335579.9514291, 'message': 'Dec 6 16:06:18 hqnl0246134 sshd[231534]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0534 seconds
INFO [2022-12-06 16:06:20,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.58.20.99', 'timestamp': 1670335579.9520113, 'message': 'Dec 6 16:06:19 hqnl0246134 sshd[231532]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.58.20.99 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0529 seconds
INFO [2022-12-06 16:06:20,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335579.951798, 'message': 'Dec 6 16:06:18 hqnl0246134 sshd[231534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0383 seconds
INFO [2022-12-06 16:06:20,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.58.20.99', 'timestamp': 1670335579.9522402, 'message': 'Dec 6 16:06:19 hqnl0246134 sshd[231532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.58.20.99 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-06 16:06:21,988] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335581.9533882, 'message': 'Dec 6 16:06:20 hqnl0246134 sshd[231534]: Failed password for root from 61.177.173.18 port 22259 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 16:06:21,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.58.20.99', 'timestamp': 1670335581.9538069, 'message': 'Dec 6 16:06:21 hqnl0246134 sshd[231532]: Failed password for root from 20.58.20.99 port 59826 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 16:06:22,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335581.9536757, 'message': 'Dec 6 16:06:20 hqnl0246134 sshd[231534]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:06:22,215] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:06:22,215] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:06:22,222] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:06:22,234] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 16:06:23,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335583.9542768, 'message': 'Dec 6 16:06:22 hqnl0246134 sshd[231534]: Failed password for root from 61.177.173.18 port 22259 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 16:06:23,993] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335583.9545126, 'message': 'Dec 6 16:06:23 hqnl0246134 sshd[231534]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 16:06:25,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335585.9569728, 'message': 'Dec 6 16:06:24 hqnl0246134 sshd[231534]: Failed password for root from 61.177.173.18 port 22259 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0257 seconds
WARNING [2022-12-06 16:06:47,182] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:06:47,184] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:07:08,725] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:07:08,758] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0440 seconds
INFO [2022-12-06 16:07:14,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335634.0174472, 'message': 'Dec 6 16:07:13 hqnl0246134 sshd[231590]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 16:07:14,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335634.0177777, 'message': 'Dec 6 16:07:13 hqnl0246134 sshd[231590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:07:16,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335636.0178468, 'message': 'Dec 6 16:07:15 hqnl0246134 sshd[231590]: Failed password for root from 61.177.173.18 port 33495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:07:16,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335636.0180376, 'message': 'Dec 6 16:07:15 hqnl0246134 sshd[231590]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 16:07:17,810] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:07:17,810] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:07:17,819] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:07:17,831] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 16:07:18,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335638.0205097, 'message': 'Dec 6 16:07:17 hqnl0246134 sshd[231590]: Failed password for root from 61.177.173.18 port 33495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 16:07:18,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335638.02071, 'message': 'Dec 6 16:07:17 hqnl0246134 sshd[231590]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 16:07:20,090] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335640.022918, 'message': 'Dec 6 16:07:19 hqnl0246134 sshd[231590]: Failed password for root from 61.177.173.18 port 33495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0672 seconds
INFO [2022-12-06 16:07:20,550] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:07:20,551] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:07:20,563] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:07:20,585] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0327 seconds
INFO [2022-12-06 16:07:24,505] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:07:24,505] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:07:24,512] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:07:24,524] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 16:07:38,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335658.0475318, 'message': 'Dec 6 16:07:37 hqnl0246134 sshd[231618]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.79.146.239 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 16:07:38,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335658.0481184, 'message': 'Dec 6 16:07:37 hqnl0246134 sshd[231618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.146.239 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 16:07:40,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335660.0504365, 'message': 'Dec 6 16:07:40 hqnl0246134 sshd[231618]: Failed password for root from 51.79.146.239 port 54584 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 16:07:47,189] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:07:47,190] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:07:54,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670335674.0812237, 'message': 'Dec 6 16:07:52 hqnl0246134 sshd[231625]: Invalid user admin from 152.89.196.220 port 31972', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 16:07:54,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670335674.0816104, 'message': 'Dec 6 16:07:52 hqnl0246134 sshd[231625]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:07:54,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670335674.0825367, 'message': 'Dec 6 16:07:52 hqnl0246134 sshd[231625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 16:07:56,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670335676.0861113, 'message': 'Dec 6 16:07:54 hqnl0246134 sshd[231625]: Failed password for invalid user admin from 152.89.196.220 port 31972 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 16:07:58,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670335678.0910752, 'message': 'Dec 6 16:07:56 hqnl0246134 sshd[231625]: Disconnected from invalid user admin 152.89.196.220 port 31972 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 16:08:08,146] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335688.1148157, 'message': 'Dec 6 16:08:06 hqnl0246134 sshd[231643]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 16:08:08,172] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335688.1153965, 'message': 'Dec 6 16:08:06 hqnl0246134 sshd[231643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0247 seconds
WARNING [2022-12-06 16:08:08,726] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:08:08,752] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0340 seconds
INFO [2022-12-06 16:08:10,142] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335690.1198003, 'message': 'Dec 6 16:08:08 hqnl0246134 sshd[231643]: Failed password for root from 61.177.173.18 port 37259 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 16:08:10,161] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335690.11998, 'message': 'Dec 6 16:08:08 hqnl0246134 sshd[231643]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 16:08:12,146] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335692.125472, 'message': 'Dec 6 16:08:11 hqnl0246134 sshd[231643]: Failed password for root from 61.177.173.18 port 37259 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 16:08:12,669] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 16:08:12,737] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 16:08:12,737] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 16:08:12,737] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 16:08:12,738] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 16:08:12,738] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 16:08:12,746] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 16:08:12,762] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0235 seconds
WARNING [2022-12-06 16:08:12,769] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 16:08:12,771] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:08:12,790] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0341 seconds
INFO [2022-12-06 16:08:12,792] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0322 seconds
INFO [2022-12-06 16:08:14,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335694.1259098, 'message': 'Dec 6 16:08:13 hqnl0246134 sshd[231643]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:08:16,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335696.1290722, 'message': 'Dec 6 16:08:14 hqnl0246134 sshd[231643]: Failed password for root from 61.177.173.18 port 37259 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:08:17,984] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:08:17,984] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:08:17,992] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:08:18,010] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0244 seconds
INFO [2022-12-06 16:08:20,818] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:08:20,819] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:08:20,826] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:08:20,836] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 16:08:42,863] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 16:08:42,865] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 16:08:42,866] im360.plugins.client360: Waiting 3 minutes before retry...
WARNING [2022-12-06 16:08:47,193] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:08:47,194] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:09:02,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335742.1972802, 'message': 'Dec 6 16:09:00 hqnl0246134 sshd[231676]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0387 seconds
INFO [2022-12-06 16:09:02,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335742.1979146, 'message': 'Dec 6 16:09:00 hqnl0246134 sshd[231676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 16:09:02,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335742.1981366, 'message': 'Dec 6 16:09:01 hqnl0246134 sshd[231676]: Failed password for root from 61.177.173.18 port 37141 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 16:09:04,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335744.209792, 'message': 'Dec 6 16:09:02 hqnl0246134 sshd[231676]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 16:09:06,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335746.2240138, 'message': 'Dec 6 16:09:05 hqnl0246134 sshd[231676]: Failed password for root from 61.177.173.18 port 37141 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0543 seconds
INFO [2022-12-06 16:09:08,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335748.2259712, 'message': 'Dec 6 16:09:07 hqnl0246134 sshd[231676]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
WARNING [2022-12-06 16:09:08,731] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:09:08,755] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0327 seconds
INFO [2022-12-06 16:09:10,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335750.2281919, 'message': 'Dec 6 16:09:09 hqnl0246134 sshd[231676]: Failed password for root from 61.177.173.18 port 37141 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 16:09:13,059] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:09:13,060] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:09:13,068] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:09:13,079] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 16:09:17,795] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:09:17,796] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:09:17,803] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:09:17,814] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 16:09:20,548] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:09:20,548] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:09:20,556] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:09:20,568] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 16:09:44,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.144.246.33', 'timestamp': 1670335784.288082, 'message': 'Dec 6 16:09:43 hqnl0246134 sshd[231865]: Invalid user ding from 141.144.246.33 port 38572', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 16:09:44,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '141.144.246.33', 'timestamp': 1670335784.289038, 'message': 'Dec 6 16:09:43 hqnl0246134 sshd[231865]: pam_imunify(sshd:auth): [IM360_RBL] The IP 141.144.246.33 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:09:44,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '141.144.246.33', 'timestamp': 1670335784.2892034, 'message': 'Dec 6 16:09:43 hqnl0246134 sshd[231865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.144.246.33 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:09:46,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.144.246.33', 'timestamp': 1670335786.2924497, 'message': 'Dec 6 16:09:45 hqnl0246134 sshd[231865]: Failed password for invalid user ding from 141.144.246.33 port 38572 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 16:09:47,204] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:09:47,205] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:09:48,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.144.246.33', 'timestamp': 1670335788.2997904, 'message': 'Dec 6 16:09:47 hqnl0246134 sshd[231865]: Disconnected from invalid user ding 141.144.246.33 port 38572 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 16:09:56,359] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335796.3254135, 'message': 'Dec 6 16:09:56 hqnl0246134 sshd[231867]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 16:09:56,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335796.3260193, 'message': 'Dec 6 16:09:56 hqnl0246134 sshd[231867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 16:10:00,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335800.3305693, 'message': 'Dec 6 16:09:58 hqnl0246134 sshd[231867]: Failed password for root from 61.177.173.18 port 42959 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 16:10:02,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335802.337377, 'message': 'Dec 6 16:10:00 hqnl0246134 sshd[231867]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0796 seconds
INFO [2022-12-06 16:10:04,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335804.3427894, 'message': 'Dec 6 16:10:02 hqnl0246134 sshd[231867]: Failed password for root from 61.177.173.18 port 42959 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 16:10:04,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335804.3430383, 'message': 'Dec 6 16:10:02 hqnl0246134 sshd[231867]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 16:10:06,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335806.3445673, 'message': 'Dec 6 16:10:05 hqnl0246134 sshd[231867]: Failed password for root from 61.177.173.18 port 42959 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
WARNING [2022-12-06 16:10:08,759] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:10:08,780] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0331 seconds
INFO [2022-12-06 16:10:19,914] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:10:19,915] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:10:19,922] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:10:19,933] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 16:10:24,259] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:10:24,259] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:10:24,266] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:10:24,278] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
WARNING [2022-12-06 16:10:47,208] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:10:47,211] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:10:50,448] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335850.418111, 'message': 'Dec 6 16:10:49 hqnl0246134 sshd[231932]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 16:10:50,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335850.4188046, 'message': 'Dec 6 16:10:49 hqnl0246134 sshd[231932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:10:52,448] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335852.4184282, 'message': 'Dec 6 16:10:51 hqnl0246134 sshd[231932]: Failed password for root from 61.177.173.18 port 41223 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 16:10:52,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335852.4187884, 'message': 'Dec 6 16:10:51 hqnl0246134 sshd[231932]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:10:54,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335854.4258456, 'message': 'Dec 6 16:10:53 hqnl0246134 sshd[231932]: Failed password for root from 61.177.173.18 port 41223 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 16:10:54,462] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335854.4260483, 'message': 'Dec 6 16:10:53 hqnl0246134 sshd[231932]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 16:10:56,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335856.4281316, 'message': 'Dec 6 16:10:56 hqnl0246134 sshd[231932]: Failed password for root from 61.177.173.18 port 41223 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-06 16:11:00,937] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:11:00,938] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:11:00,947] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:11:00,959] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
WARNING [2022-12-06 16:11:08,758] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:11:08,786] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0354 seconds
INFO [2022-12-06 16:11:12,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335872.45791, 'message': 'Dec 6 16:11:11 hqnl0246134 sshd[231958]: Invalid user csserver from 51.79.146.239 port 44958', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 16:11:12,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335872.4589987, 'message': 'Dec 6 16:11:11 hqnl0246134 sshd[231958]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.79.146.239 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:11:12,514] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335872.4591072, 'message': 'Dec 6 16:11:11 hqnl0246134 sshd[231958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.146.239 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:11:14,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335874.4604619, 'message': 'Dec 6 16:11:13 hqnl0246134 sshd[231958]: Failed password for invalid user csserver from 51.79.146.239 port 44958 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:11:14,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.79.146.239', 'timestamp': 1670335874.460688, 'message': 'Dec 6 16:11:14 hqnl0246134 sshd[231958]: Disconnected from invalid user csserver 51.79.146.239 port 44958 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:11:17,808] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:11:17,809] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:11:17,817] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:11:17,828] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 16:11:20,462] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:11:20,462] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:11:20,471] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:11:20,484] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 16:11:46,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335906.5420108, 'message': 'Dec 6 16:11:46 hqnl0246134 sshd[231985]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 16:11:46,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335906.5427165, 'message': 'Dec 6 16:11:46 hqnl0246134 sshd[231985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0239 seconds
WARNING [2022-12-06 16:11:47,215] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:11:47,216] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:11:48,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335908.542522, 'message': 'Dec 6 16:11:48 hqnl0246134 sshd[231985]: Failed password for root from 61.177.173.18 port 41381 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 16:11:52,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335912.5463135, 'message': 'Dec 6 16:11:50 hqnl0246134 sshd[231985]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 16:11:52,585] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335912.5466328, 'message': 'Dec 6 16:11:52 hqnl0246134 sshd[231985]: Failed password for root from 61.177.173.18 port 41381 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 16:11:53,335] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 16:11:54,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335914.5501738, 'message': 'Dec 6 16:11:52 hqnl0246134 sshd[231985]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 16:11:56,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335916.5497575, 'message': 'Dec 6 16:11:55 hqnl0246134 sshd[231985]: Failed password for root from 61.177.173.18 port 41381 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
WARNING [2022-12-06 16:12:08,768] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:12:08,793] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0370 seconds
INFO [2022-12-06 16:12:17,819] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:12:17,820] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:12:17,827] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:12:17,838] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 16:12:20,815] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:12:20,816] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:12:20,830] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:12:20,842] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0258 seconds
INFO [2022-12-06 16:12:40,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335960.6402655, 'message': 'Dec 6 16:12:39 hqnl0246134 sshd[232053]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 16:12:40,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335960.6409588, 'message': 'Dec 6 16:12:39 hqnl0246134 sshd[232053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:12:42,309] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 16:12:42,376] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 16:12:42,376] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 16:12:42,376] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 16:12:42,377] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 16:12:42,377] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 16:12:42,386] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 16:12:42,403] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0259 seconds
WARNING [2022-12-06 16:12:42,411] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 16:12:42,414] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:12:42,432] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0355 seconds
INFO [2022-12-06 16:12:42,434] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0330 seconds
INFO [2022-12-06 16:12:42,673] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335962.6377788, 'message': 'Dec 6 16:12:41 hqnl0246134 sshd[232053]: Failed password for root from 61.177.173.18 port 46169 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 16:12:44,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335964.640758, 'message': 'Dec 6 16:12:43 hqnl0246134 sshd[232053]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 16:12:46,676] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335966.6567419, 'message': 'Dec 6 16:12:45 hqnl0246134 sshd[232053]: Failed password for root from 61.177.173.18 port 46169 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:12:46,693] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335966.6570005, 'message': 'Dec 6 16:12:45 hqnl0246134 sshd[232053]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
WARNING [2022-12-06 16:12:47,220] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:12:47,221] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:12:48,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670335968.6596074, 'message': 'Dec 6 16:12:47 hqnl0246134 sshd[232053]: Failed password for root from 61.177.173.18 port 46169 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 16:12:50,796] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:12:50,796] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:12:50,804] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:12:50,821] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0242 seconds
INFO [2022-12-06 16:13:02,668] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 16:13:02,683] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:13:02,704] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0345 seconds
WARNING [2022-12-06 16:13:08,770] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:13:08,792] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0303 seconds
INFO [2022-12-06 16:13:17,920] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:13:17,921] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:13:17,928] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:13:17,944] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0228 seconds
INFO [2022-12-06 16:13:17,999] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 16:13:17,999] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 16:13:18,000] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 16:13:20,783] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:13:20,784] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:13:20,792] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:13:20,804] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 16:13:34,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336014.725655, 'message': 'Dec 6 16:13:34 hqnl0246134 sshd[232140]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 16:13:34,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336014.7263756, 'message': 'Dec 6 16:13:34 hqnl0246134 sshd[232140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 16:13:36,764] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336016.7307875, 'message': 'Dec 6 16:13:36 hqnl0246134 sshd[232140]: Failed password for root from 61.177.173.18 port 42317 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 16:13:36,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336016.7310815, 'message': 'Dec 6 16:13:36 hqnl0246134 sshd[232140]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 16:13:38,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336018.7343922, 'message': 'Dec 6 16:13:38 hqnl0246134 sshd[232140]: Failed password for root from 61.177.173.18 port 42317 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 16:13:40,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336020.7355604, 'message': 'Dec 6 16:13:38 hqnl0246134 sshd[232140]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 16:13:42,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336022.7405589, 'message': 'Dec 6 16:13:41 hqnl0246134 sshd[232140]: Failed password for root from 61.177.173.18 port 42317 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-06 16:13:47,225] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:13:47,227] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:14:08,780] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:14:08,813] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0473 seconds
INFO [2022-12-06 16:14:17,875] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:14:17,876] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:14:17,883] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:14:17,895] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 16:14:20,497] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:14:20,498] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:14:20,506] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:14:20,519] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0211 seconds
INFO [2022-12-06 16:14:26,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336066.818342, 'message': 'Dec 6 16:14:26 hqnl0246134 sshd[232174]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 16:14:26,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336066.8186724, 'message': 'Dec 6 16:14:26 hqnl0246134 sshd[232174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:14:28,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336068.8202918, 'message': 'Dec 6 16:14:28 hqnl0246134 sshd[232174]: Failed password for root from 61.177.173.18 port 28021 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 16:14:30,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336070.8223286, 'message': 'Dec 6 16:14:30 hqnl0246134 sshd[232174]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 16:14:32,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.144.246.33', 'timestamp': 1670336072.8269248, 'message': 'Dec 6 16:14:30 hqnl0246134 sshd[232189]: Invalid user docker from 141.144.246.33 port 58118', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0494 seconds
INFO [2022-12-06 16:14:32,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336072.8277087, 'message': 'Dec 6 16:14:31 hqnl0246134 sshd[232179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0499 seconds
INFO [2022-12-06 16:14:32,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '141.144.246.33', 'timestamp': 1670336072.827227, 'message': 'Dec 6 16:14:30 hqnl0246134 sshd[232189]: pam_imunify(sshd:auth): [IM360_RBL] The IP 141.144.246.33 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0549 seconds
INFO [2022-12-06 16:14:32,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336072.8281734, 'message': 'Dec 6 16:14:32 hqnl0246134 sshd[232174]: Failed password for root from 61.177.173.18 port 28021 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0555 seconds
INFO [2022-12-06 16:14:32,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336072.8279662, 'message': 'Dec 6 16:14:31 hqnl0246134 sshd[232179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0546 seconds
INFO [2022-12-06 16:14:32,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '141.144.246.33', 'timestamp': 1670336072.8274777, 'message': 'Dec 6 16:14:30 hqnl0246134 sshd[232189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.144.246.33 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 16:14:32,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.144.246.33', 'timestamp': 1670336072.8284163, 'message': 'Dec 6 16:14:32 hqnl0246134 sshd[232189]: Failed password for invalid user docker from 141.144.246.33 port 58118 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:14:34,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336074.835937, 'message': 'Dec 6 16:14:32 hqnl0246134 sshd[232179]: Failed password for root from 61.177.172.108 port 21686 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0477 seconds
INFO [2022-12-06 16:14:34,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336074.8361533, 'message': 'Dec 6 16:14:32 hqnl0246134 sshd[232174]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0482 seconds
INFO [2022-12-06 16:14:34,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.144.246.33', 'timestamp': 1670336074.8363218, 'message': 'Dec 6 16:14:33 hqnl0246134 sshd[232189]: Disconnected from invalid user docker 141.144.246.33 port 58118 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0483 seconds
INFO [2022-12-06 16:14:34,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336074.8364432, 'message': 'Dec 6 16:14:33 hqnl0246134 sshd[232179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:14:35,679] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:14:35,680] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:14:35,687] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:14:35,700] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 16:14:36,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336076.8379307, 'message': 'Dec 6 16:14:35 hqnl0246134 sshd[232179]: Failed password for root from 61.177.172.108 port 21686 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 16:14:36,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336076.8381333, 'message': 'Dec 6 16:14:35 hqnl0246134 sshd[232174]: Failed password for root from 61.177.173.18 port 28021 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 16:14:36,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336076.838246, 'message': 'Dec 6 16:14:36 hqnl0246134 sshd[232179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:14:38,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336078.841007, 'message': 'Dec 6 16:14:38 hqnl0246134 sshd[232179]: Failed password for root from 61.177.172.108 port 21686 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 16:14:40,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.79.146.239', 'timestamp': 1670336080.843791, 'message': 'Dec 6 16:14:40 hqnl0246134 sshd[232199]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.79.146.239 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 16:14:40,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.79.146.239', 'timestamp': 1670336080.8441288, 'message': 'Dec 6 16:14:40 hqnl0246134 sshd[232199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.146.239 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 16:14:42,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.79.146.239', 'timestamp': 1670336082.8452535, 'message': 'Dec 6 16:14:42 hqnl0246134 sshd[232199]: Failed password for root from 51.79.146.239 port 34418 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 16:14:44,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336084.84974, 'message': 'Dec 6 16:14:43 hqnl0246134 sshd[232201]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 16:14:44,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336084.850131, 'message': 'Dec 6 16:14:43 hqnl0246134 sshd[232201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 16:14:46,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336086.853303, 'message': 'Dec 6 16:14:45 hqnl0246134 sshd[232201]: Failed password for root from 61.177.172.108 port 49883 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 16:14:47,234] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:14:47,234] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:14:48,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336088.8537588, 'message': 'Dec 6 16:14:48 hqnl0246134 sshd[232201]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 16:14:50,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336090.8558922, 'message': 'Dec 6 16:14:50 hqnl0246134 sshd[232201]: Failed password for root from 61.177.172.108 port 49883 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0391 seconds
INFO [2022-12-06 16:14:54,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336094.8641818, 'message': 'Dec 6 16:14:52 hqnl0246134 sshd[232201]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 16:14:54,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336094.8645842, 'message': 'Dec 6 16:14:54 hqnl0246134 sshd[232201]: Failed password for root from 61.177.172.108 port 49883 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 16:14:56,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336096.8664281, 'message': 'Dec 6 16:14:56 hqnl0246134 sshd[232212]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 16:14:56,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336096.8668385, 'message': 'Dec 6 16:14:56 hqnl0246134 sshd[232212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 16:15:00,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336100.8726494, 'message': 'Dec 6 16:14:59 hqnl0246134 sshd[232212]: Failed password for root from 61.177.172.108 port 45871 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 16:15:00,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336100.8729548, 'message': 'Dec 6 16:15:00 hqnl0246134 sshd[232215]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 16:15:00,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336100.8730938, 'message': 'Dec 6 16:15:00 hqnl0246134 sshd[232215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.47 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:15:02,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336102.877683, 'message': 'Dec 6 16:15:01 hqnl0246134 sshd[232212]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0525 seconds
INFO [2022-12-06 16:15:02,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336102.8812816, 'message': 'Dec 6 16:15:02 hqnl0246134 sshd[232215]: Failed password for root from 61.177.173.47 port 20468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0520 seconds
INFO [2022-12-06 16:15:04,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336104.8779876, 'message': 'Dec 6 16:15:03 hqnl0246134 sshd[232212]: Failed password for root from 61.177.172.108 port 45871 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0587 seconds
INFO [2022-12-06 16:15:04,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336104.8789017, 'message': 'Dec 6 16:15:04 hqnl0246134 sshd[232215]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0592 seconds
INFO [2022-12-06 16:15:04,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336104.8787317, 'message': 'Dec 6 16:15:03 hqnl0246134 sshd[232212]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 16:15:06,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336106.885386, 'message': 'Dec 6 16:15:05 hqnl0246134 sshd[232212]: Failed password for root from 61.177.172.108 port 45871 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0473 seconds
INFO [2022-12-06 16:15:06,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336106.8857217, 'message': 'Dec 6 16:15:06 hqnl0246134 sshd[232215]: Failed password for root from 61.177.173.47 port 20468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0466 seconds
WARNING [2022-12-06 16:15:08,779] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:15:08,804] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0322 seconds
INFO [2022-12-06 16:15:08,927] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336108.8855882, 'message': 'Dec 6 16:15:07 hqnl0246134 sshd[232215]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0414 seconds
INFO [2022-12-06 16:15:08,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336108.8858395, 'message': 'Dec 6 16:15:07 hqnl0246134 sshd[232245]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0416 seconds
INFO [2022-12-06 16:15:08,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336108.8860168, 'message': 'Dec 6 16:15:07 hqnl0246134 sshd[232245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 16:15:10,919] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336110.887739, 'message': 'Dec 6 16:15:09 hqnl0246134 sshd[232215]: Failed password for root from 61.177.173.47 port 20468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 16:15:10,920] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336110.8879306, 'message': 'Dec 6 16:15:09 hqnl0246134 sshd[232245]: Failed password for root from 61.177.172.108 port 16181 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 16:15:12,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336112.891842, 'message': 'Dec 6 16:15:11 hqnl0246134 sshd[232245]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:15:14,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336114.9001224, 'message': 'Dec 6 16:15:13 hqnl0246134 sshd[232253]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 16:15:14,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336114.9004931, 'message': 'Dec 6 16:15:13 hqnl0246134 sshd[232245]: Failed password for root from 61.177.172.108 port 16181 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 16:15:14,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336114.9003808, 'message': 'Dec 6 16:15:13 hqnl0246134 sshd[232253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.47 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 16:15:14,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336114.9006133, 'message': 'Dec 6 16:15:14 hqnl0246134 sshd[232245]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 16:15:16,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336116.9018497, 'message': 'Dec 6 16:15:15 hqnl0246134 sshd[232253]: Failed password for root from 61.177.173.47 port 56899 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 16:15:16,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336116.9021702, 'message': 'Dec 6 16:15:16 hqnl0246134 sshd[232245]: Failed password for root from 61.177.172.108 port 16181 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 16:15:16,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336116.9020596, 'message': 'Dec 6 16:15:16 hqnl0246134 sshd[232253]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 16:15:18,444] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:15:18,445] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:15:18,454] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:15:18,467] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-06 16:15:18,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336118.90426, 'message': 'Dec 6 16:15:17 hqnl0246134 sshd[232253]: Failed password for root from 61.177.173.47 port 56899 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:15:20,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336120.9057057, 'message': 'Dec 6 16:15:18 hqnl0246134 sshd[232253]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0514 seconds
INFO [2022-12-06 16:15:20,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336120.9132109, 'message': 'Dec 6 16:15:19 hqnl0246134 sshd[232269]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0477 seconds
INFO [2022-12-06 16:15:20,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336120.91344, 'message': 'Dec 6 16:15:19 hqnl0246134 sshd[232269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 16:15:21,383] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:15:21,383] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:15:21,390] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:15:21,401] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-06 16:15:22,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336122.9146097, 'message': 'Dec 6 16:15:21 hqnl0246134 sshd[232253]: Failed password for root from 61.177.173.47 port 56899 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0463 seconds
INFO [2022-12-06 16:15:22,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336122.9148345, 'message': 'Dec 6 16:15:21 hqnl0246134 sshd[232269]: Failed password for root from 61.177.173.18 port 29217 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0475 seconds
INFO [2022-12-06 16:15:24,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336124.9166257, 'message': 'Dec 6 16:15:24 hqnl0246134 sshd[232269]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0618 seconds
INFO [2022-12-06 16:15:24,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336124.916822, 'message': 'Dec 6 16:15:24 hqnl0246134 sshd[232277]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0620 seconds
INFO [2022-12-06 16:15:25,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336124.917387, 'message': 'Dec 6 16:15:24 hqnl0246134 sshd[232277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.47 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0483 seconds
INFO [2022-12-06 16:15:26,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336126.9192064, 'message': 'Dec 6 16:15:25 hqnl0246134 sshd[232269]: Failed password for root from 61.177.173.18 port 29217 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0523 seconds
INFO [2022-12-06 16:15:26,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336126.91987, 'message': 'Dec 6 16:15:26 hqnl0246134 sshd[232277]: Failed password for root from 61.177.173.47 port 42329 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-06 16:15:27,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336126.9196725, 'message': 'Dec 6 16:15:26 hqnl0246134 sshd[232269]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 16:15:28,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336128.9211078, 'message': 'Dec 6 16:15:27 hqnl0246134 sshd[232277]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 16:15:28,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336128.9213731, 'message': 'Dec 6 16:15:28 hqnl0246134 sshd[232269]: Failed password for root from 61.177.173.18 port 29217 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 16:15:30,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336130.9247723, 'message': 'Dec 6 16:15:28 hqnl0246134 sshd[232277]: Failed password for root from 61.177.173.47 port 42329 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 16:15:30,967] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336130.925143, 'message': 'Dec 6 16:15:29 hqnl0246134 sshd[232277]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 16:15:32,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670336132.9275842, 'message': 'Dec 6 16:15:31 hqnl0246134 sshd[232277]: Failed password for root from 61.177.173.47 port 42329 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 16:15:36,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336136.9343767, 'message': 'Dec 6 16:15:35 hqnl0246134 sshd[232291]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 16:15:36,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336136.9347398, 'message': 'Dec 6 16:15:35 hqnl0246134 sshd[232291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 16:15:38,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336138.9391499, 'message': 'Dec 6 16:15:37 hqnl0246134 sshd[232291]: Failed password for root from 61.177.173.50 port 15547 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 16:15:38,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336138.9394336, 'message': 'Dec 6 16:15:38 hqnl0246134 sshd[232291]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 16:15:40,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336140.9471326, 'message': 'Dec 6 16:15:40 hqnl0246134 sshd[232291]: Failed password for root from 61.177.173.50 port 15547 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 16:15:42,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336142.9548173, 'message': 'Dec 6 16:15:42 hqnl0246134 sshd[232291]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 16:15:46,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336146.9590678, 'message': 'Dec 6 16:15:45 hqnl0246134 sshd[232291]: Failed password for root from 61.177.173.50 port 15547 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
WARNING [2022-12-06 16:15:47,237] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:15:47,238] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:15:51,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336150.9662807, 'message': 'Dec 6 16:15:49 hqnl0246134 sshd[232299]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 16:15:51,037] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336150.966792, 'message': 'Dec 6 16:15:49 hqnl0246134 sshd[232299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 16:15:51,153] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:15:51,153] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:15:51,161] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:15:51,172] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 16:15:52,995] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336152.9744177, 'message': 'Dec 6 16:15:51 hqnl0246134 sshd[232299]: Failed password for root from 61.177.173.50 port 14077 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 16:15:54,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336154.9824312, 'message': 'Dec 6 16:15:53 hqnl0246134 sshd[232299]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:15:57,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336156.990501, 'message': 'Dec 6 16:15:55 hqnl0246134 sshd[232299]: Failed password for root from 61.177.173.50 port 14077 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 16:15:59,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336159.0050178, 'message': 'Dec 6 16:15:58 hqnl0246134 sshd[232299]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 16:16:01,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336161.0173514, 'message': 'Dec 6 16:15:59 hqnl0246134 sshd[232299]: Failed password for root from 61.177.173.50 port 14077 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0257 seconds
WARNING [2022-12-06 16:16:08,783] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:16:08,807] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0314 seconds
INFO [2022-12-06 16:16:13,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336173.057442, 'message': 'Dec 6 16:16:12 hqnl0246134 sshd[232334]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:16:13,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336173.0611417, 'message': 'Dec 6 16:16:12 hqnl0246134 sshd[232334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:16:17,101] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336177.0663896, 'message': 'Dec 6 16:16:15 hqnl0246134 sshd[232334]: Failed password for root from 61.177.173.18 port 22955 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 16:16:18,938] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:16:18,939] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:16:18,966] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:16:18,995] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0463 seconds
INFO [2022-12-06 16:16:19,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336179.0682378, 'message': 'Dec 6 16:16:17 hqnl0246134 sshd[232334]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 16:16:21,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336181.0761526, 'message': 'Dec 6 16:16:19 hqnl0246134 sshd[232334]: Failed password for root from 61.177.173.18 port 22955 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:16:21,775] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:16:21,775] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:16:21,782] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:16:21,810] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0347 seconds
INFO [2022-12-06 16:16:23,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336183.082942, 'message': 'Dec 6 16:16:21 hqnl0246134 sshd[232334]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 16:16:25,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336185.087972, 'message': 'Dec 6 16:16:23 hqnl0246134 sshd[232334]: Failed password for root from 61.177.173.18 port 22955 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-06 16:16:47,243] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:16:47,245] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:17:08,796] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:17:08,829] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0486 seconds
INFO [2022-12-06 16:17:09,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336229.1979053, 'message': 'Dec 6 16:17:08 hqnl0246134 sshd[232420]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 16:17:09,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336229.1982353, 'message': 'Dec 6 16:17:08 hqnl0246134 sshd[232420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 16:17:13,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336233.2001846, 'message': 'Dec 6 16:17:11 hqnl0246134 sshd[232420]: Failed password for root from 61.177.173.18 port 29453 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 16:17:13,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336233.200438, 'message': 'Dec 6 16:17:13 hqnl0246134 sshd[232420]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:17:17,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336237.2056484, 'message': 'Dec 6 16:17:15 hqnl0246134 sshd[232420]: Failed password for root from 61.177.173.18 port 29453 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 16:17:17,908] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:17:17,908] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:17:17,915] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:17:17,927] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 16:17:19,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336239.2058973, 'message': 'Dec 6 16:17:17 hqnl0246134 sshd[232420]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 16:17:20,755] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:17:20,755] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:17:20,763] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:17:20,775] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 16:17:21,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336241.2093985, 'message': 'Dec 6 16:17:19 hqnl0246134 sshd[232420]: Failed password for root from 61.177.173.18 port 29453 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 16:17:22,526] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:17:22,526] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:17:22,533] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:17:22,544] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 16:17:23,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.144.246.33', 'timestamp': 1670336243.2101302, 'message': 'Dec 6 16:17:21 hqnl0246134 sshd[232456]: Invalid user woju from 141.144.246.33 port 44572', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 16:17:23,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '141.144.246.33', 'timestamp': 1670336243.2133188, 'message': 'Dec 6 16:17:21 hqnl0246134 sshd[232456]: pam_imunify(sshd:auth): [IM360_RBL] The IP 141.144.246.33 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 16:17:23,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '141.144.246.33', 'timestamp': 1670336243.2135823, 'message': 'Dec 6 16:17:21 hqnl0246134 sshd[232456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.144.246.33 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 16:17:25,231] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.144.246.33', 'timestamp': 1670336245.2131236, 'message': 'Dec 6 16:17:23 hqnl0246134 sshd[232456]: Failed password for invalid user woju from 141.144.246.33 port 44572 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:17:27,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.144.246.33', 'timestamp': 1670336247.2172322, 'message': 'Dec 6 16:17:25 hqnl0246134 sshd[232456]: Disconnected from invalid user woju 141.144.246.33 port 44572 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 16:17:43,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336263.2390587, 'message': 'Dec 6 16:17:42 hqnl0246134 sshd[232476]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 16:17:43,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336263.2397525, 'message': 'Dec 6 16:17:42 hqnl0246134 sshd[232476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 16:17:45,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336265.2412841, 'message': 'Dec 6 16:17:44 hqnl0246134 sshd[232476]: Failed password for root from 61.177.172.104 port 63212 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
WARNING [2022-12-06 16:17:47,247] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:17:47,247] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:17:47,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336267.2440164, 'message': 'Dec 6 16:17:46 hqnl0246134 sshd[232476]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 16:17:49,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336269.2482953, 'message': 'Dec 6 16:17:48 hqnl0246134 sshd[232476]: Failed password for root from 61.177.172.104 port 63212 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 16:17:49,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336269.248831, 'message': 'Dec 6 16:17:49 hqnl0246134 sshd[232476]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 16:17:53,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336273.2547252, 'message': 'Dec 6 16:17:51 hqnl0246134 sshd[232476]: Failed password for root from 61.177.172.104 port 63212 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:17:57,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336277.2580986, 'message': 'Dec 6 16:17:56 hqnl0246134 sshd[232487]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:17:57,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336277.2582881, 'message': 'Dec 6 16:17:56 hqnl0246134 sshd[232487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 16:17:59,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336279.2627177, 'message': 'Dec 6 16:17:58 hqnl0246134 sshd[232487]: Failed password for root from 61.177.172.104 port 46024 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:18:01,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336281.2658725, 'message': 'Dec 6 16:18:00 hqnl0246134 sshd[232487]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 16:18:03,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336283.270716, 'message': 'Dec 6 16:18:01 hqnl0246134 sshd[232489]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 16:18:03,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336283.2710714, 'message': 'Dec 6 16:18:02 hqnl0246134 sshd[232487]: Failed password for root from 61.177.172.104 port 46024 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 16:18:03,324] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336283.2709343, 'message': 'Dec 6 16:18:01 hqnl0246134 sshd[232489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 16:18:03,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336283.2712123, 'message': 'Dec 6 16:18:02 hqnl0246134 sshd[232489]: Failed password for root from 61.177.173.18 port 23775 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 16:18:05,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336285.2767735, 'message': 'Dec 6 16:18:03 hqnl0246134 sshd[232489]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 16:18:05,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336285.2769694, 'message': 'Dec 6 16:18:04 hqnl0246134 sshd[232487]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 16:18:05,324] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336285.2771058, 'message': 'Dec 6 16:18:05 hqnl0246134 sshd[232489]: Failed password for root from 61.177.173.18 port 23775 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:18:07,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336287.2782056, 'message': 'Dec 6 16:18:05 hqnl0246134 sshd[232489]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 16:18:07,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336287.2783785, 'message': 'Dec 6 16:18:06 hqnl0246134 sshd[232487]: Failed password for root from 61.177.172.104 port 46024 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
WARNING [2022-12-06 16:18:08,793] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:18:08,818] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0324 seconds
INFO [2022-12-06 16:18:09,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336289.2815335, 'message': 'Dec 6 16:18:07 hqnl0246134 sshd[232489]: Failed password for root from 61.177.173.18 port 23775 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:18:17,788] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:18:17,788] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:18:17,796] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:18:17,808] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 16:18:20,729] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:18:20,730] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:18:20,747] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:18:20,761] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0298 seconds
INFO [2022-12-06 16:18:21,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336301.2957678, 'message': 'Dec 6 16:18:19 hqnl0246134 sshd[232516]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 16:18:21,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336301.295955, 'message': 'Dec 6 16:18:19 hqnl0246134 sshd[232516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 16:18:23,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336303.3089032, 'message': 'Dec 6 16:18:21 hqnl0246134 sshd[232516]: Failed password for root from 61.177.172.104 port 53199 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:18:25,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336305.3138373, 'message': 'Dec 6 16:18:23 hqnl0246134 sshd[232516]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 16:18:27,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336307.3170373, 'message': 'Dec 6 16:18:25 hqnl0246134 sshd[232516]: Failed password for root from 61.177.172.104 port 53199 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:18:27,357] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336307.3173578, 'message': 'Dec 6 16:18:26 hqnl0246134 sshd[232516]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 16:18:29,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336309.3197148, 'message': 'Dec 6 16:18:28 hqnl0246134 sshd[232516]: Failed password for root from 61.177.172.104 port 53199 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:18:32,808] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:18:32,809] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:18:32,818] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:18:32,831] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
INFO [2022-12-06 16:18:37,190] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 16:18:37,259] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 16:18:37,259] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 16:18:37,260] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 16:18:37,260] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 16:18:37,261] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 16:18:37,276] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 16:18:37,292] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0307 seconds
WARNING [2022-12-06 16:18:37,299] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 16:18:37,301] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:18:37,317] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0309 seconds
INFO [2022-12-06 16:18:37,319] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0290 seconds
WARNING [2022-12-06 16:18:47,250] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:18:47,250] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:18:55,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336335.3550441, 'message': 'Dec 6 16:18:54 hqnl0246134 sshd[232545]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-06 16:18:55,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336335.3556714, 'message': 'Dec 6 16:18:54 hqnl0246134 sshd[232544]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0418 seconds
INFO [2022-12-06 16:18:55,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336335.3554342, 'message': 'Dec 6 16:18:54 hqnl0246134 sshd[232545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 16:18:55,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336335.355837, 'message': 'Dec 6 16:18:54 hqnl0246134 sshd[232544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 16:18:57,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336337.356086, 'message': 'Dec 6 16:18:56 hqnl0246134 sshd[232545]: Failed password for root from 61.177.173.18 port 25309 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 16:18:57,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336337.3563027, 'message': 'Dec 6 16:18:57 hqnl0246134 sshd[232544]: Failed password for root from 61.177.172.104 port 30539 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 16:18:59,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336339.3594742, 'message': 'Dec 6 16:18:58 hqnl0246134 sshd[232545]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 16:18:59,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336339.3597074, 'message': 'Dec 6 16:18:59 hqnl0246134 sshd[232544]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 16:19:01,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336341.3620636, 'message': 'Dec 6 16:19:00 hqnl0246134 sshd[232545]: Failed password for root from 61.177.173.18 port 25309 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 16:19:01,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336341.362414, 'message': 'Dec 6 16:19:00 hqnl0246134 sshd[232544]: Failed password for root from 61.177.172.104 port 30539 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 16:19:01,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336341.3625462, 'message': 'Dec 6 16:19:01 hqnl0246134 sshd[232545]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 16:19:03,392] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336343.3626788, 'message': 'Dec 6 16:19:01 hqnl0246134 sshd[232544]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 16:19:03,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336343.362869, 'message': 'Dec 6 16:19:03 hqnl0246134 sshd[232545]: Failed password for root from 61.177.173.18 port 25309 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 16:19:05,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336345.363516, 'message': 'Dec 6 16:19:03 hqnl0246134 sshd[232544]: Failed password for root from 61.177.172.104 port 30539 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 16:19:07,390] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 16:19:07,391] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 16:19:07,391] im360.plugins.client360: Waiting 5 minutes before retry...
WARNING [2022-12-06 16:19:08,796] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:19:08,817] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0282 seconds
INFO [2022-12-06 16:19:18,328] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:19:18,328] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:19:18,347] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:19:18,359] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0300 seconds
INFO [2022-12-06 16:19:19,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336359.377263, 'message': 'Dec 6 16:19:18 hqnl0246134 sshd[232572]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 16:19:19,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336359.3856313, 'message': 'Dec 6 16:19:18 hqnl0246134 sshd[232572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:19:21,245] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:19:21,246] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:19:21,252] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:19:21,265] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 16:19:21,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336361.3834088, 'message': 'Dec 6 16:19:20 hqnl0246134 sshd[232572]: Failed password for root from 61.177.172.104 port 61773 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 16:19:21,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336361.383634, 'message': 'Dec 6 16:19:20 hqnl0246134 sshd[232572]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:19:23,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336363.388637, 'message': 'Dec 6 16:19:23 hqnl0246134 sshd[232572]: Failed password for root from 61.177.172.104 port 61773 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 16:19:25,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336365.393622, 'message': 'Dec 6 16:19:25 hqnl0246134 sshd[232572]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 16:19:27,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670336367.396184, 'message': 'Dec 6 16:19:27 hqnl0246134 sshd[232572]: Failed password for root from 61.177.172.104 port 61773 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 16:19:45,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336385.4420907, 'message': 'Dec 6 16:19:44 hqnl0246134 sshd[232622]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 16:19:45,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336385.4430175, 'message': 'Dec 6 16:19:44 hqnl0246134 sshd[232622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 16:19:47,253] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:19:47,254] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:19:47,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336387.4499154, 'message': 'Dec 6 16:19:46 hqnl0246134 sshd[232622]: Failed password for root from 61.177.173.18 port 13527 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:19:49,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336389.459094, 'message': 'Dec 6 16:19:49 hqnl0246134 sshd[232622]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:19:51,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336391.4622376, 'message': 'Dec 6 16:19:50 hqnl0246134 sshd[232622]: Failed password for root from 61.177.173.18 port 13527 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 16:19:51,502] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336391.4624827, 'message': 'Dec 6 16:19:51 hqnl0246134 sshd[232622]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 16:19:53,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336393.468072, 'message': 'Dec 6 16:19:53 hqnl0246134 sshd[232622]: Failed password for root from 61.177.173.18 port 13527 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 16:19:56,234] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:19:56,234] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:19:56,242] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:19:56,262] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0267 seconds
WARNING [2022-12-06 16:20:08,806] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:20:08,836] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0409 seconds
INFO [2022-12-06 16:20:17,766] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:20:17,767] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:20:17,776] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:20:17,788] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 16:20:20,513] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:20:20,513] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:20:20,520] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:20:20,531] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 16:20:37,583] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336437.5432353, 'message': 'Dec 6 16:20:36 hqnl0246134 sshd[232695]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-06 16:20:37,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336437.543996, 'message': 'Dec 6 16:20:36 hqnl0246134 sshd[232695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 16:20:39,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336439.546127, 'message': 'Dec 6 16:20:38 hqnl0246134 sshd[232695]: Failed password for root from 61.177.173.18 port 13321 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:20:41,569] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336441.5493658, 'message': 'Dec 6 16:20:40 hqnl0246134 sshd[232695]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 16:20:43,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336443.5557008, 'message': 'Dec 6 16:20:42 hqnl0246134 sshd[232695]: Failed password for root from 61.177.173.18 port 13321 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 16:20:43,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336443.5563354, 'message': 'Dec 6 16:20:42 hqnl0246134 sshd[232695]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 16:20:45,583] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336445.5559294, 'message': 'Dec 6 16:20:44 hqnl0246134 sshd[232695]: Failed password for root from 61.177.173.18 port 13321 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0264 seconds
WARNING [2022-12-06 16:20:47,257] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:20:47,257] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:21:08,833] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:21:08,928] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.1265 seconds
INFO [2022-12-06 16:21:17,865] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:21:17,866] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:21:17,875] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:21:17,887] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 16:21:20,519] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:21:20,520] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:21:20,527] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:21:20,538] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 16:21:31,664] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336491.6421092, 'message': 'Dec 6 16:21:30 hqnl0246134 sshd[232740]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 16:21:31,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336491.6426542, 'message': 'Dec 6 16:21:30 hqnl0246134 sshd[232740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:21:33,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336493.6465547, 'message': 'Dec 6 16:21:32 hqnl0246134 sshd[232740]: Failed password for root from 61.177.173.18 port 15025 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 16:21:35,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336495.6521451, 'message': 'Dec 6 16:21:35 hqnl0246134 sshd[232740]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 16:21:37,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336497.6577597, 'message': 'Dec 6 16:21:37 hqnl0246134 sshd[232740]: Failed password for root from 61.177.173.18 port 15025 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 16:21:39,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336499.6628685, 'message': 'Dec 6 16:21:39 hqnl0246134 sshd[232740]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 16:21:41,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336501.6652036, 'message': 'Dec 6 16:21:41 hqnl0246134 sshd[232740]: Failed password for root from 61.177.173.18 port 15025 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 16:21:44,590] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:21:44,590] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:21:44,598] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:21:44,610] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
WARNING [2022-12-06 16:21:47,260] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:21:47,260] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:21:53,339] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 16:22:08,817] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:22:08,840] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0330 seconds
INFO [2022-12-06 16:22:17,943] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:22:17,943] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:22:17,953] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:22:17,969] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0248 seconds
INFO [2022-12-06 16:22:20,551] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:22:20,552] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:22:20,559] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:22:20,571] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 16:22:23,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336543.7489805, 'message': 'Dec 6 16:22:23 hqnl0246134 sshd[232797]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 16:22:23,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336543.7492576, 'message': 'Dec 6 16:22:23 hqnl0246134 sshd[232797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 16:22:25,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336545.7526147, 'message': 'Dec 6 16:22:24 hqnl0246134 sshd[232797]: Failed password for root from 61.177.173.18 port 64876 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 16:22:25,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336545.7530372, 'message': 'Dec 6 16:22:25 hqnl0246134 sshd[232797]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 16:22:27,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336547.7557225, 'message': 'Dec 6 16:22:27 hqnl0246134 sshd[232797]: Failed password for root from 61.177.173.18 port 64876 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 16:22:31,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336551.762855, 'message': 'Dec 6 16:22:29 hqnl0246134 sshd[232797]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 16:22:33,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336553.7657952, 'message': 'Dec 6 16:22:31 hqnl0246134 sshd[232797]: Failed password for root from 61.177.173.18 port 64876 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0344 seconds
WARNING [2022-12-06 16:22:47,263] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:22:47,265] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:23:08,822] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:23:08,843] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0304 seconds
INFO [2022-12-06 16:23:17,863] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:23:17,864] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:23:17,876] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:23:17,895] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0306 seconds
INFO [2022-12-06 16:23:17,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336597.865626, 'message': 'Dec 6 16:23:16 hqnl0246134 sshd[232840]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 16:23:17,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336597.8658328, 'message': 'Dec 6 16:23:16 hqnl0246134 sshd[232840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:23:19,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336599.8457794, 'message': 'Dec 6 16:23:18 hqnl0246134 sshd[232840]: Failed password for root from 61.177.173.18 port 55946 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 16:23:19,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336599.8461304, 'message': 'Dec 6 16:23:18 hqnl0246134 sshd[232840]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 16:23:20,562] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:23:20,562] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:23:20,570] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:23:20,582] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 16:23:21,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336601.8485422, 'message': 'Dec 6 16:23:20 hqnl0246134 sshd[232840]: Failed password for root from 61.177.173.18 port 55946 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0509 seconds
INFO [2022-12-06 16:23:23,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336603.8497143, 'message': 'Dec 6 16:23:22 hqnl0246134 sshd[232840]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 16:23:25,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336605.8510566, 'message': 'Dec 6 16:23:25 hqnl0246134 sshd[232840]: Failed password for root from 61.177.173.18 port 55946 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 16:23:29,802] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:23:29,803] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:23:29,811] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:23:29,823] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
WARNING [2022-12-06 16:23:47,269] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:23:47,270] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:24:08,827] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:24:08,854] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0369 seconds
INFO [2022-12-06 16:24:09,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336649.891951, 'message': 'Dec 6 16:24:09 hqnl0246134 sshd[232917]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 16:24:09,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336649.8922458, 'message': 'Dec 6 16:24:09 hqnl0246134 sshd[232917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 16:24:13,919] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336653.89735, 'message': 'Dec 6 16:24:12 hqnl0246134 sshd[232917]: Failed password for root from 61.177.173.18 port 51396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 16:24:15,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336655.8989453, 'message': 'Dec 6 16:24:14 hqnl0246134 sshd[232917]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 16:24:17,707] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:24:17,708] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:24:17,720] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:24:17,737] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0283 seconds
INFO [2022-12-06 16:24:17,920] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336657.9015136, 'message': 'Dec 6 16:24:16 hqnl0246134 sshd[232917]: Failed password for root from 61.177.173.18 port 51396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:24:19,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336659.9035234, 'message': 'Dec 6 16:24:18 hqnl0246134 sshd[232917]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 16:24:20,488] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:24:20,489] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:24:20,497] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:24:20,509] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 16:24:21,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336661.907797, 'message': 'Dec 6 16:24:19 hqnl0246134 sshd[232917]: Failed password for root from 61.177.173.18 port 51396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 16:24:44,885] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 16:24:44,957] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 16:24:44,958] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 16:24:44,958] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 16:24:44,959] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 16:24:44,959] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 16:24:44,974] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 16:24:44,994] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0336 seconds
WARNING [2022-12-06 16:24:45,002] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 16:24:45,004] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:24:45,021] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0325 seconds
INFO [2022-12-06 16:24:45,022] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0304 seconds
WARNING [2022-12-06 16:24:47,273] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:24:47,274] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:25:04,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336704.0022218, 'message': 'Dec 6 16:25:02 hqnl0246134 sshd[232947]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 16:25:04,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336704.00264, 'message': 'Dec 6 16:25:02 hqnl0246134 sshd[232947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 16:25:06,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336706.0045276, 'message': 'Dec 6 16:25:04 hqnl0246134 sshd[232947]: Failed password for root from 61.177.173.18 port 45144 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 16:25:08,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336708.0100958, 'message': 'Dec 6 16:25:06 hqnl0246134 sshd[232947]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
WARNING [2022-12-06 16:25:08,829] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:25:08,847] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0254 seconds
INFO [2022-12-06 16:25:10,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336710.0139842, 'message': 'Dec 6 16:25:08 hqnl0246134 sshd[232947]: Failed password for root from 61.177.173.18 port 45144 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:25:10,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336710.0141585, 'message': 'Dec 6 16:25:08 hqnl0246134 sshd[232947]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 16:25:12,035] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336712.0162096, 'message': 'Dec 6 16:25:11 hqnl0246134 sshd[232947]: Failed password for root from 61.177.173.18 port 45144 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:25:15,085] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 16:25:15,085] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 16:25:15,086] im360.plugins.client360: Waiting 7 minutes before retry...
INFO [2022-12-06 16:25:16,179] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:25:16,180] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:25:16,187] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:25:16,198] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 16:25:17,951] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:25:17,952] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:25:17,962] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:25:17,974] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 16:25:20,416] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:25:20,417] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:25:20,423] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:25:20,434] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0164 seconds
WARNING [2022-12-06 16:25:47,278] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:25:47,279] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:25:54,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336754.1098278, 'message': 'Dec 6 16:25:53 hqnl0246134 sshd[233019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 16:25:54,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336754.1106071, 'message': 'Dec 6 16:25:53 hqnl0246134 sshd[233019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:25:56,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336756.1135478, 'message': 'Dec 6 16:25:54 hqnl0246134 sshd[233019]: Failed password for root from 61.177.173.18 port 36192 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:25:56,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336756.113767, 'message': 'Dec 6 16:25:55 hqnl0246134 sshd[233019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 16:25:58,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336758.1191535, 'message': 'Dec 6 16:25:57 hqnl0246134 sshd[233019]: Failed password for root from 61.177.173.18 port 36192 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:25:58,157] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336758.119362, 'message': 'Dec 6 16:25:57 hqnl0246134 sshd[233019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:26:00,158] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336760.1241164, 'message': 'Dec 6 16:25:59 hqnl0246134 sshd[233019]: Failed password for root from 61.177.173.18 port 36192 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0340 seconds
WARNING [2022-12-06 16:26:08,837] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:26:08,859] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0319 seconds
INFO [2022-12-06 16:26:17,984] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:26:17,984] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:26:17,991] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:26:18,003] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 16:26:20,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336780.156933, 'message': 'Dec 6 16:26:19 hqnl0246134 sshd[233051]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 16:26:20,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336780.1571689, 'message': 'Dec 6 16:26:19 hqnl0246134 sshd[233051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 16:26:20,739] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:26:20,739] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:26:20,746] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:26:20,757] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 16:26:22,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336782.1581059, 'message': 'Dec 6 16:26:21 hqnl0246134 sshd[233051]: Failed password for root from 61.177.173.50 port 20202 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 16:26:22,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336782.1583474, 'message': 'Dec 6 16:26:21 hqnl0246134 sshd[233051]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:26:24,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336784.160258, 'message': 'Dec 6 16:26:23 hqnl0246134 sshd[233051]: Failed password for root from 61.177.173.50 port 20202 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 16:26:24,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336784.1605115, 'message': 'Dec 6 16:26:24 hqnl0246134 sshd[233051]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 16:26:26,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336786.1650884, 'message': 'Dec 6 16:26:25 hqnl0246134 sshd[233051]: Failed password for root from 61.177.173.50 port 20202 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 16:26:28,951] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:26:28,952] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:26:28,959] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:26:28,971] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 16:26:34,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336794.170426, 'message': 'Dec 6 16:26:32 hqnl0246134 sshd[233064]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 16:26:34,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336794.1711097, 'message': 'Dec 6 16:26:32 hqnl0246134 sshd[233064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:26:36,189] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336796.1696553, 'message': 'Dec 6 16:26:35 hqnl0246134 sshd[233064]: Failed password for root from 61.177.173.50 port 16782 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:26:38,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336798.1712306, 'message': 'Dec 6 16:26:37 hqnl0246134 sshd[233064]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 16:26:40,208] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336800.1739078, 'message': 'Dec 6 16:26:39 hqnl0246134 sshd[233064]: Failed password for root from 61.177.173.50 port 16782 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 16:26:42,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336802.1746242, 'message': 'Dec 6 16:26:41 hqnl0246134 sshd[233064]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 16:26:44,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670336804.1752121, 'message': 'Dec 6 16:26:43 hqnl0246134 sshd[233064]: Failed password for root from 61.177.173.50 port 16782 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0621 seconds
INFO [2022-12-06 16:26:46,202] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336806.1779013, 'message': 'Dec 6 16:26:45 hqnl0246134 sshd[233079]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 16:26:46,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336806.1782155, 'message': 'Dec 6 16:26:45 hqnl0246134 sshd[233079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 16:26:47,283] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:26:47,284] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:26:48,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336808.1812658, 'message': 'Dec 6 16:26:47 hqnl0246134 sshd[233079]: Failed password for root from 61.177.173.18 port 33014 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 16:26:48,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336808.1815593, 'message': 'Dec 6 16:26:47 hqnl0246134 sshd[233079]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 16:26:50,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336810.183866, 'message': 'Dec 6 16:26:49 hqnl0246134 sshd[233079]: Failed password for root from 61.177.173.18 port 33014 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 16:26:50,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336810.1841688, 'message': 'Dec 6 16:26:49 hqnl0246134 sshd[233079]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:26:52,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336812.185618, 'message': 'Dec 6 16:26:51 hqnl0246134 sshd[233079]: Failed password for root from 61.177.173.18 port 33014 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 16:26:56,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '64.62.197.164', 'timestamp': 1670336816.195254, 'message': 'Dec 6 16:26:56 hqnl0246134 sshd[233091]: Invalid user from 64.62.197.164 port 20089', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
WARNING [2022-12-06 16:27:08,841] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:27:08,862] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0312 seconds
INFO [2022-12-06 16:27:17,847] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:27:17,848] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:27:17,857] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:27:17,869] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 16:27:20,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336840.2233324, 'message': 'Dec 6 16:27:18 hqnl0246134 sshd[233112]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:27:20,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336840.2237053, 'message': 'Dec 6 16:27:18 hqnl0246134 sshd[233112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 16:27:20,659] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:27:20,659] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:27:20,671] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:27:20,690] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0293 seconds
INFO [2022-12-06 16:27:22,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336842.224814, 'message': 'Dec 6 16:27:20 hqnl0246134 sshd[233112]: Failed password for root from 61.177.173.48 port 25579 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:27:22,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336842.2250268, 'message': 'Dec 6 16:27:20 hqnl0246134 sshd[233112]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:27:24,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336844.2269578, 'message': 'Dec 6 16:27:22 hqnl0246134 sshd[233112]: Failed password for root from 61.177.173.48 port 25579 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0489 seconds
INFO [2022-12-06 16:27:24,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.122.7.237', 'timestamp': 1670336844.2274342, 'message': 'Dec 6 16:27:23 hqnl0246134 sshd[233126]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.122.7.237 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0493 seconds
INFO [2022-12-06 16:27:24,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336844.2272618, 'message': 'Dec 6 16:27:22 hqnl0246134 sshd[233112]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0485 seconds
INFO [2022-12-06 16:27:24,328] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.122.7.237', 'timestamp': 1670336844.2275956, 'message': 'Dec 6 16:27:23 hqnl0246134 sshd[233126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.122.7.237 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0490 seconds
INFO [2022-12-06 16:27:24,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336844.2277493, 'message': 'Dec 6 16:27:24 hqnl0246134 sshd[233112]: Failed password for root from 61.177.173.48 port 25579 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 16:27:26,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.122.7.237', 'timestamp': 1670336846.228079, 'message': 'Dec 6 16:27:25 hqnl0246134 sshd[233126]: Failed password for root from 20.122.7.237 port 39550 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 16:27:28,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336848.2304146, 'message': 'Dec 6 16:27:27 hqnl0246134 sshd[233128]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 16:27:28,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336848.2306101, 'message': 'Dec 6 16:27:27 hqnl0246134 sshd[233128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 16:27:30,260] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:27:30,260] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:27:30,278] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:27:30,309] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0470 seconds
INFO [2022-12-06 16:27:30,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336850.2629216, 'message': 'Dec 6 16:27:29 hqnl0246134 sshd[233128]: Failed password for root from 61.177.173.48 port 29054 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0462 seconds
INFO [2022-12-06 16:27:30,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336850.2631397, 'message': 'Dec 6 16:27:29 hqnl0246134 sshd[233128]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 16:27:32,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336852.2338915, 'message': 'Dec 6 16:27:31 hqnl0246134 sshd[233128]: Failed password for root from 61.177.173.48 port 29054 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 16:27:32,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336852.2340896, 'message': 'Dec 6 16:27:32 hqnl0246134 sshd[233128]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:27:34,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336854.2374861, 'message': 'Dec 6 16:27:33 hqnl0246134 sshd[233128]: Failed password for root from 61.177.173.48 port 29054 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 16:27:36,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336856.2379074, 'message': 'Dec 6 16:27:35 hqnl0246134 sshd[233144]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:27:36,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336856.2381456, 'message': 'Dec 6 16:27:35 hqnl0246134 sshd[233144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:27:38,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336858.2418551, 'message': 'Dec 6 16:27:37 hqnl0246134 sshd[233146]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 16:27:38,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336858.2425141, 'message': 'Dec 6 16:27:37 hqnl0246134 sshd[233144]: Failed password for root from 61.177.173.18 port 14130 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 16:27:38,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336858.2420645, 'message': 'Dec 6 16:27:37 hqnl0246134 sshd[233146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:27:40,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336860.2453213, 'message': 'Dec 6 16:27:39 hqnl0246134 sshd[233146]: Failed password for root from 61.177.173.48 port 36239 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-06 16:27:40,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336860.2455087, 'message': 'Dec 6 16:27:40 hqnl0246134 sshd[233144]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0423 seconds
INFO [2022-12-06 16:27:42,295] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336862.2481568, 'message': 'Dec 6 16:27:41 hqnl0246134 sshd[233146]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0466 seconds
INFO [2022-12-06 16:27:42,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336862.2483845, 'message': 'Dec 6 16:27:41 hqnl0246134 sshd[233144]: Failed password for root from 61.177.173.18 port 14130 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0473 seconds
INFO [2022-12-06 16:27:44,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336864.251295, 'message': 'Dec 6 16:27:42 hqnl0246134 sshd[233144]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 16:27:44,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336864.2515423, 'message': 'Dec 6 16:27:43 hqnl0246134 sshd[233146]: Failed password for root from 61.177.173.48 port 36239 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 16:27:44,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336864.2518344, 'message': 'Dec 6 16:27:44 hqnl0246134 sshd[233144]: Failed password for root from 61.177.173.18 port 14130 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 16:27:44,314] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336864.251723, 'message': 'Dec 6 16:27:44 hqnl0246134 sshd[233146]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 16:27:46,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670336866.2533076, 'message': 'Dec 6 16:27:46 hqnl0246134 sshd[233146]: Failed password for root from 61.177.173.48 port 36239 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0653 seconds
WARNING [2022-12-06 16:27:47,286] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:27:47,287] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:28:08,863] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:28:08,898] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0572 seconds
INFO [2022-12-06 16:28:18,334] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:28:18,335] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:28:18,342] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:28:18,358] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0226 seconds
INFO [2022-12-06 16:28:19,196] defence360agent.files: Updating all files
INFO [2022-12-06 16:28:19,532] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 16:28:19,533] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 16:28:19,825] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 16:28:19,826] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 16:28:20,152] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 16:28:20,153] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 16:28:20,517] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 16:28:20,517] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 16:28:20,518] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 16:28:20,777] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 14:28:20 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E3A8FB8234D36'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 16:28:20,779] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 16:28:20,779] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 16:28:21,280] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:28:21,280] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:28:21,292] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:28:21,303] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 16:28:21,352] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 16:28:21,352] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 16:28:21,680] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 16:28:21,680] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 16:28:22,000] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 16:28:22,001] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 16:28:22,396] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 16:28:22,397] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 16:28:22,792] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 16:28:22,793] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 16:28:32,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336912.3179336, 'message': 'Dec 6 16:28:31 hqnl0246134 sshd[233218]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 16:28:32,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336912.3181381, 'message': 'Dec 6 16:28:31 hqnl0246134 sshd[233218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 16:28:34,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336914.3210928, 'message': 'Dec 6 16:28:34 hqnl0246134 sshd[233218]: Failed password for root from 61.177.173.18 port 64943 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 16:28:36,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336916.321784, 'message': 'Dec 6 16:28:36 hqnl0246134 sshd[233218]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0581 seconds
INFO [2022-12-06 16:28:38,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336918.323799, 'message': 'Dec 6 16:28:38 hqnl0246134 sshd[233218]: Failed password for root from 61.177.173.18 port 64943 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:28:40,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336920.3272002, 'message': 'Dec 6 16:28:39 hqnl0246134 sshd[233218]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 16:28:42,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336922.3298464, 'message': 'Dec 6 16:28:41 hqnl0246134 sshd[233218]: Failed password for root from 61.177.173.18 port 64943 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 16:28:45,989] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:28:45,990] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:28:45,998] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:28:46,009] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
WARNING [2022-12-06 16:28:47,290] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:28:47,291] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:29:02,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336942.3670704, 'message': 'Dec 6 16:29:02 hqnl0246134 sshd[233241]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 16:29:02,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336942.367636, 'message': 'Dec 6 16:29:02 hqnl0246134 sshd[233241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 16:29:04,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336944.3662934, 'message': 'Dec 6 16:29:04 hqnl0246134 sshd[233241]: Failed password for root from 61.177.172.108 port 14224 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 16:29:06,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336946.3687959, 'message': 'Dec 6 16:29:06 hqnl0246134 sshd[233241]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 16:29:08,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336948.369525, 'message': 'Dec 6 16:29:08 hqnl0246134 sshd[233241]: Failed password for root from 61.177.172.108 port 14224 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 16:29:08,857] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:29:08,891] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0458 seconds
INFO [2022-12-06 16:29:10,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336950.3719919, 'message': 'Dec 6 16:29:08 hqnl0246134 sshd[233241]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 16:29:12,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336952.3736546, 'message': 'Dec 6 16:29:11 hqnl0246134 sshd[233241]: Failed password for root from 61.177.172.108 port 14224 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 16:29:16,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336956.3789632, 'message': 'Dec 6 16:29:15 hqnl0246134 sshd[233261]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:29:16,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336956.3792298, 'message': 'Dec 6 16:29:15 hqnl0246134 sshd[233261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 16:29:17,971] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:29:17,972] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:29:17,981] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:29:17,995] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 16:29:18,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336958.3806448, 'message': 'Dec 6 16:29:18 hqnl0246134 sshd[233261]: Failed password for root from 61.177.172.108 port 63325 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:29:20,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336960.38383, 'message': 'Dec 6 16:29:19 hqnl0246134 sshd[233261]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 16:29:20,559] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:29:20,559] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:29:20,566] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:29:20,578] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 16:29:22,406] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336962.38735, 'message': 'Dec 6 16:29:22 hqnl0246134 sshd[233261]: Failed password for root from 61.177.172.108 port 63325 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:29:24,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336964.3901496, 'message': 'Dec 6 16:29:24 hqnl0246134 sshd[233274]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 16:29:24,425] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336964.390621, 'message': 'Dec 6 16:29:24 hqnl0246134 sshd[233261]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 16:29:24,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336964.390451, 'message': 'Dec 6 16:29:24 hqnl0246134 sshd[233274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:29:28,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336968.3935523, 'message': 'Dec 6 16:29:26 hqnl0246134 sshd[233274]: Failed password for root from 61.177.173.18 port 57731 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 16:29:28,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336968.3937237, 'message': 'Dec 6 16:29:26 hqnl0246134 sshd[233261]: Failed password for root from 61.177.172.108 port 63325 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 16:29:28,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336968.3938367, 'message': 'Dec 6 16:29:28 hqnl0246134 sshd[233274]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 16:29:30,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336970.3961575, 'message': 'Dec 6 16:29:30 hqnl0246134 sshd[233274]: Failed password for root from 61.177.173.18 port 57731 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:29:32,506] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336972.398005, 'message': 'Dec 6 16:29:31 hqnl0246134 sshd[233274]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1077 seconds
INFO [2022-12-06 16:29:32,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336972.398208, 'message': 'Dec 6 16:29:31 hqnl0246134 sshd[233278]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1078 seconds
INFO [2022-12-06 16:29:32,560] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336972.398322, 'message': 'Dec 6 16:29:31 hqnl0246134 sshd[233278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0524 seconds
INFO [2022-12-06 16:29:34,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670336974.4206705, 'message': 'Dec 6 16:29:33 hqnl0246134 sshd[233274]: Failed password for root from 61.177.173.18 port 57731 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.2264 seconds
INFO [2022-12-06 16:29:36,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336976.4021268, 'message': 'Dec 6 16:29:34 hqnl0246134 sshd[233278]: Failed password for root from 61.177.172.108 port 61561 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 16:29:38,472] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336978.4047482, 'message': 'Dec 6 16:29:36 hqnl0246134 sshd[233278]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0671 seconds
INFO [2022-12-06 16:29:40,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336980.4055457, 'message': 'Dec 6 16:29:39 hqnl0246134 sshd[233278]: Failed password for root from 61.177.172.108 port 61561 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0913 seconds
INFO [2022-12-06 16:29:42,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336982.4079993, 'message': 'Dec 6 16:29:41 hqnl0246134 sshd[233278]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 16:29:44,428] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336984.4105814, 'message': 'Dec 6 16:29:43 hqnl0246134 sshd[233278]: Failed password for root from 61.177.172.108 port 61561 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 16:29:46,468] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:29:46,469] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:29:46,490] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:29:46,510] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0393 seconds
INFO [2022-12-06 16:29:46,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336986.4716337, 'message': 'Dec 6 16:29:45 hqnl0246134 sshd[233302]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 16:29:46,533] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336986.4725077, 'message': 'Dec 6 16:29:45 hqnl0246134 sshd[233302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0223 seconds
WARNING [2022-12-06 16:29:47,294] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:29:47,295] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:29:48,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336988.4153154, 'message': 'Dec 6 16:29:47 hqnl0246134 sshd[233302]: Failed password for root from 61.177.172.108 port 50615 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 16:29:50,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336990.4179142, 'message': 'Dec 6 16:29:49 hqnl0246134 sshd[233302]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 16:29:52,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336992.4207397, 'message': 'Dec 6 16:29:51 hqnl0246134 sshd[233302]: Failed password for root from 61.177.172.108 port 50615 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:29:54,444] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336994.423682, 'message': 'Dec 6 16:29:53 hqnl0246134 sshd[233302]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 16:29:56,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670336996.4261363, 'message': 'Dec 6 16:29:55 hqnl0246134 sshd[233302]: Failed password for root from 61.177.172.108 port 50615 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0248 seconds
WARNING [2022-12-06 16:30:08,864] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:30:08,891] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0388 seconds
INFO [2022-12-06 16:30:17,929] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:30:17,929] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:30:17,936] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:30:17,950] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 16:30:20,490] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337020.4688485, 'message': 'Dec 6 16:30:18 hqnl0246134 sshd[233353]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 16:30:20,509] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337020.469151, 'message': 'Dec 6 16:30:18 hqnl0246134 sshd[233353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:30:20,659] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:30:20,660] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:30:20,667] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:30:20,678] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-06 16:30:22,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337022.4706805, 'message': 'Dec 6 16:30:20 hqnl0246134 sshd[233353]: Failed password for root from 61.177.173.18 port 59651 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 16:30:24,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337024.4730854, 'message': 'Dec 6 16:30:22 hqnl0246134 sshd[233353]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 16:30:24,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337024.4733822, 'message': 'Dec 6 16:30:24 hqnl0246134 sshd[233353]: Failed password for root from 61.177.173.18 port 59651 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 16:30:26,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337026.4759898, 'message': 'Dec 6 16:30:25 hqnl0246134 sshd[233353]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:30:28,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337028.4764843, 'message': 'Dec 6 16:30:27 hqnl0246134 sshd[233353]: Failed password for root from 61.177.173.18 port 59651 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-06 16:30:47,298] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:30:47,301] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:30:50,533] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337050.5040805, 'message': 'Dec 6 16:30:48 hqnl0246134 sshd[233386]: Invalid user william from 46.127.176.19 port 59862', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 16:30:50,552] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337050.5048232, 'message': 'Dec 6 16:30:49 hqnl0246134 sshd[233386]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.127.176.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:30:50,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337050.5050364, 'message': 'Dec 6 16:30:49 hqnl0246134 sshd[233386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.127.176.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 16:30:52,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337052.5051184, 'message': 'Dec 6 16:30:51 hqnl0246134 sshd[233386]: Failed password for invalid user william from 46.127.176.19 port 59862 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 16:30:54,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337054.506408, 'message': 'Dec 6 16:30:52 hqnl0246134 sshd[233386]: Disconnected from invalid user william 46.127.176.19 port 59862 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 16:30:55,593] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:30:55,593] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:30:55,601] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:30:55,612] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
WARNING [2022-12-06 16:31:08,865] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:31:08,894] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0379 seconds
INFO [2022-12-06 16:31:12,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337072.5271823, 'message': 'Dec 6 16:31:11 hqnl0246134 sshd[233413]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 16:31:12,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337072.5274744, 'message': 'Dec 6 16:31:11 hqnl0246134 sshd[233413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:31:14,549] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337074.5293984, 'message': 'Dec 6 16:31:12 hqnl0246134 sshd[233413]: Failed password for root from 61.177.173.18 port 43557 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 16:31:14,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337074.5295944, 'message': 'Dec 6 16:31:13 hqnl0246134 sshd[233413]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:31:16,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337076.5300176, 'message': 'Dec 6 16:31:15 hqnl0246134 sshd[233413]: Failed password for root from 61.177.173.18 port 43557 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 16:31:18,052] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:31:18,053] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:31:18,060] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:31:18,071] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 16:31:18,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337078.5334756, 'message': 'Dec 6 16:31:17 hqnl0246134 sshd[233413]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:31:20,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337080.5365317, 'message': 'Dec 6 16:31:19 hqnl0246134 sshd[233413]: Failed password for root from 61.177.173.18 port 43557 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 16:31:20,926] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:31:20,927] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:31:20,933] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:31:20,944] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
WARNING [2022-12-06 16:31:47,305] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:31:47,307] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:31:48,637] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337108.6076033, 'message': 'Dec 6 16:31:47 hqnl0246134 sshd[233461]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.104.78 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 16:31:48,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337108.608399, 'message': 'Dec 6 16:31:47 hqnl0246134 sshd[233461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.78 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:31:50,629] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337110.6087785, 'message': 'Dec 6 16:31:49 hqnl0246134 sshd[233461]: Failed password for root from 68.183.104.78 port 60676 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 16:31:53,344] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 16:32:06,664] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337126.6368468, 'message': 'Dec 6 16:32:05 hqnl0246134 sshd[233483]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 16:32:06,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337126.6374352, 'message': 'Dec 6 16:32:05 hqnl0246134 sshd[233483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 16:32:08,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337128.638678, 'message': 'Dec 6 16:32:07 hqnl0246134 sshd[233483]: Failed password for root from 61.177.173.18 port 45119 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
WARNING [2022-12-06 16:32:08,868] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:32:08,905] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0469 seconds
INFO [2022-12-06 16:32:10,660] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337130.641222, 'message': 'Dec 6 16:32:09 hqnl0246134 sshd[233483]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 16:32:12,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337132.6414742, 'message': 'Dec 6 16:32:12 hqnl0246134 sshd[233483]: Failed password for root from 61.177.173.18 port 45119 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 16:32:14,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337134.6444638, 'message': 'Dec 6 16:32:14 hqnl0246134 sshd[233483]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:32:16,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337136.6459284, 'message': 'Dec 6 16:32:16 hqnl0246134 sshd[233483]: Failed password for root from 61.177.173.18 port 45119 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 16:32:19,898] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:32:19,899] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:32:19,907] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:32:19,919] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 16:32:22,552] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:32:22,553] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:32:22,559] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:32:22,570] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0164 seconds
INFO [2022-12-06 16:32:40,624] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 16:32:40,696] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 16:32:40,697] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 16:32:40,698] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 16:32:40,698] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 16:32:40,699] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 16:32:40,719] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 16:32:40,748] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0481 seconds
WARNING [2022-12-06 16:32:40,761] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 16:32:40,764] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:32:40,787] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0493 seconds
INFO [2022-12-06 16:32:40,789] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0451 seconds
WARNING [2022-12-06 16:32:47,310] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:32:47,312] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:32:58,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337178.727061, 'message': 'Dec 6 16:32:57 hqnl0246134 sshd[233518]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 16:32:58,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337178.727411, 'message': 'Dec 6 16:32:57 hqnl0246134 sshd[233518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:33:00,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337180.73014, 'message': 'Dec 6 16:32:59 hqnl0246134 sshd[233518]: Failed password for root from 61.177.173.18 port 39475 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:33:00,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337180.730342, 'message': 'Dec 6 16:32:59 hqnl0246134 sshd[233518]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 16:33:02,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337182.7332137, 'message': 'Dec 6 16:33:01 hqnl0246134 sshd[233518]: Failed password for root from 61.177.173.18 port 39475 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 16:33:02,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337182.7334166, 'message': 'Dec 6 16:33:02 hqnl0246134 sshd[233518]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 16:33:04,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337184.7340167, 'message': 'Dec 6 16:33:03 hqnl0246134 sshd[233518]: Failed password for root from 61.177.173.18 port 39475 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0613 seconds
INFO [2022-12-06 16:33:07,612] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:33:07,613] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:33:07,621] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:33:07,634] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
WARNING [2022-12-06 16:33:08,875] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:33:08,908] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0465 seconds
INFO [2022-12-06 16:33:11,934] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 16:33:11,934] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 16:33:11,935] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 16:33:17,882] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:33:17,883] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:33:17,891] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:33:17,902] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 16:33:21,046] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:33:21,047] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:33:21,057] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:33:21,070] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
WARNING [2022-12-06 16:33:47,317] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:33:47,319] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:33:50,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337230.830007, 'message': 'Dec 6 16:33:48 hqnl0246134 sshd[233569]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 16:33:50,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337230.8313522, 'message': 'Dec 6 16:33:49 hqnl0246134 sshd[233569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 16:33:52,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337232.833692, 'message': 'Dec 6 16:33:51 hqnl0246134 sshd[233569]: Failed password for root from 61.177.173.18 port 31057 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 16:33:52,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337232.834068, 'message': 'Dec 6 16:33:51 hqnl0246134 sshd[233569]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 16:33:54,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337234.8394344, 'message': 'Dec 6 16:33:53 hqnl0246134 sshd[233569]: Failed password for root from 61.177.173.18 port 31057 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 16:33:56,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337236.8455818, 'message': 'Dec 6 16:33:55 hqnl0246134 sshd[233569]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 16:33:58,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337238.8503158, 'message': 'Dec 6 16:33:57 hqnl0246134 sshd[233569]: Failed password for root from 61.177.173.18 port 31057 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 16:33:58,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337238.8505502, 'message': 'Dec 6 16:33:58 hqnl0246134 sshd[233571]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 16:33:58,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337238.850677, 'message': 'Dec 6 16:33:58 hqnl0246134 sshd[233571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:34:00,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337240.854336, 'message': 'Dec 6 16:34:00 hqnl0246134 sshd[233571]: Failed password for root from 61.177.173.52 port 60183 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:34:00,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337240.8545055, 'message': 'Dec 6 16:34:00 hqnl0246134 sshd[233571]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 16:34:04,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337244.8593552, 'message': 'Dec 6 16:34:03 hqnl0246134 sshd[233571]: Failed password for root from 61.177.173.52 port 60183 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 16:34:06,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337246.8666146, 'message': 'Dec 6 16:34:05 hqnl0246134 sshd[233571]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 16:34:06,927] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337246.8670535, 'message': 'Dec 6 16:34:06 hqnl0246134 sshd[233571]: Failed password for root from 61.177.173.52 port 60183 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
WARNING [2022-12-06 16:34:08,876] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:34:08,897] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0297 seconds
INFO [2022-12-06 16:34:09,869] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:34:09,869] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:34:09,878] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:34:09,890] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 16:34:10,894] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337250.8731666, 'message': 'Dec 6 16:34:09 hqnl0246134 sshd[233590]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 16:34:10,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337250.8733766, 'message': 'Dec 6 16:34:09 hqnl0246134 sshd[233590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 16:34:12,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337252.877965, 'message': 'Dec 6 16:34:11 hqnl0246134 sshd[233590]: Failed password for root from 61.177.173.52 port 35263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 16:34:14,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337254.8865228, 'message': 'Dec 6 16:34:13 hqnl0246134 sshd[233590]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 16:34:16,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337256.8890584, 'message': 'Dec 6 16:34:15 hqnl0246134 sshd[233590]: Failed password for root from 61.177.173.52 port 35263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 16:34:17,695] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:34:17,695] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:34:17,704] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:34:17,717] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-06 16:34:18,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337258.889962, 'message': 'Dec 6 16:34:17 hqnl0246134 sshd[233590]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:34:20,265] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:34:20,265] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:34:20,272] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:34:20,284] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 16:34:20,919] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337260.8925362, 'message': 'Dec 6 16:34:19 hqnl0246134 sshd[233590]: Failed password for root from 61.177.173.52 port 35263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 16:34:22,922] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337262.902377, 'message': 'Dec 6 16:34:22 hqnl0246134 sshd[233607]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 16:34:22,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337262.9025667, 'message': 'Dec 6 16:34:22 hqnl0246134 sshd[233607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 16:34:24,924] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337264.9060695, 'message': 'Dec 6 16:34:24 hqnl0246134 sshd[233607]: Failed password for root from 61.177.173.52 port 20507 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:34:24,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337264.9062986, 'message': 'Dec 6 16:34:24 hqnl0246134 sshd[233607]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 16:34:26,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337266.9089067, 'message': 'Dec 6 16:34:26 hqnl0246134 sshd[233607]: Failed password for root from 61.177.173.52 port 20507 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 16:34:28,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337268.9115412, 'message': 'Dec 6 16:34:27 hqnl0246134 sshd[233607]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 16:34:30,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670337270.9131198, 'message': 'Dec 6 16:34:29 hqnl0246134 sshd[233607]: Failed password for root from 61.177.173.52 port 20507 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:34:40,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337280.9493754, 'message': 'Dec 6 16:34:40 hqnl0246134 sshd[233622]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 16:34:40,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337280.9499743, 'message': 'Dec 6 16:34:40 hqnl0246134 sshd[233622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:34:42,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337282.959495, 'message': 'Dec 6 16:34:42 hqnl0246134 sshd[233622]: Failed password for root from 61.177.173.18 port 26411 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:34:44,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337284.9706602, 'message': 'Dec 6 16:34:43 hqnl0246134 sshd[233622]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 16:34:47,005] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337286.974398, 'message': 'Dec 6 16:34:45 hqnl0246134 sshd[233622]: Failed password for root from 61.177.173.18 port 26411 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 16:34:47,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337286.9746668, 'message': 'Dec 6 16:34:45 hqnl0246134 sshd[233622]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
WARNING [2022-12-06 16:34:47,323] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:34:47,324] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:34:48,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337288.9784975, 'message': 'Dec 6 16:34:47 hqnl0246134 sshd[233622]: Failed password for root from 61.177.173.18 port 26411 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 16:35:08,886] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:35:08,915] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0434 seconds
INFO [2022-12-06 16:35:18,135] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:35:18,136] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:35:18,143] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:35:18,155] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 16:35:20,876] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:35:20,877] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:35:20,884] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:35:20,896] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 16:35:33,090] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337333.067788, 'message': 'Dec 6 16:35:32 hqnl0246134 sshd[233682]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 16:35:33,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337333.0684643, 'message': 'Dec 6 16:35:32 hqnl0246134 sshd[233682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:35:35,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337335.0702808, 'message': 'Dec 6 16:35:35 hqnl0246134 sshd[233682]: Failed password for root from 61.177.173.18 port 10665 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 16:35:37,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337337.073815, 'message': 'Dec 6 16:35:36 hqnl0246134 sshd[233682]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 16:35:39,101] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337339.0779016, 'message': 'Dec 6 16:35:38 hqnl0246134 sshd[233682]: Failed password for root from 61.177.173.18 port 10665 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 16:35:41,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337341.0822325, 'message': 'Dec 6 16:35:41 hqnl0246134 sshd[233682]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 16:35:45,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337345.0890853, 'message': 'Dec 6 16:35:43 hqnl0246134 sshd[233682]: Failed password for root from 61.177.173.18 port 10665 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-06 16:35:47,327] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:35:47,328] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:35:48,352] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:35:48,353] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:35:48,364] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:35:48,381] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0275 seconds
WARNING [2022-12-06 16:36:08,885] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:36:08,906] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0290 seconds
INFO [2022-12-06 16:36:18,278] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:36:18,278] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:36:18,287] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:36:18,299] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 16:36:21,033] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:36:21,034] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:36:21,042] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:36:21,054] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 16:36:27,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337387.1732516, 'message': 'Dec 6 16:36:27 hqnl0246134 sshd[233755]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 16:36:27,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337387.1735263, 'message': 'Dec 6 16:36:27 hqnl0246134 sshd[233755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:36:31,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337391.1820536, 'message': 'Dec 6 16:36:29 hqnl0246134 sshd[233755]: Failed password for root from 61.177.173.18 port 11795 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 16:36:33,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337393.1818836, 'message': 'Dec 6 16:36:31 hqnl0246134 sshd[233755]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0531 seconds
INFO [2022-12-06 16:36:35,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337395.1824956, 'message': 'Dec 6 16:36:33 hqnl0246134 sshd[233755]: Failed password for root from 61.177.173.18 port 11795 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 16:36:37,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337397.1839392, 'message': 'Dec 6 16:36:35 hqnl0246134 sshd[233755]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 16:36:39,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337399.1861591, 'message': 'Dec 6 16:36:37 hqnl0246134 sshd[233755]: Failed password for root from 61.177.173.18 port 11795 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
WARNING [2022-12-06 16:36:47,333] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:36:47,334] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:37:08,898] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:37:08,920] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0315 seconds
INFO [2022-12-06 16:37:18,219] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:37:18,219] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:37:18,229] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:37:18,247] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0271 seconds
INFO [2022-12-06 16:37:19,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337439.2423196, 'message': 'Dec 6 16:37:17 hqnl0246134 sshd[233804]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:37:19,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337439.2426343, 'message': 'Dec 6 16:37:17 hqnl0246134 sshd[233804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 16:37:21,077] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:37:21,078] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:37:21,085] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:37:21,098] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 16:37:21,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337441.2453415, 'message': 'Dec 6 16:37:19 hqnl0246134 sshd[233804]: Failed password for root from 61.177.173.18 port 50102 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:37:21,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337441.2455125, 'message': 'Dec 6 16:37:19 hqnl0246134 sshd[233804]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:37:23,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337443.249903, 'message': 'Dec 6 16:37:21 hqnl0246134 sshd[233804]: Failed password for root from 61.177.173.18 port 50102 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 16:37:23,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337443.2501311, 'message': 'Dec 6 16:37:22 hqnl0246134 sshd[233804]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 16:37:25,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337445.2958686, 'message': 'Dec 6 16:37:23 hqnl0246134 sshd[233804]: Failed password for root from 61.177.173.18 port 50102 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 16:37:27,055] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:37:27,055] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:37:27,084] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:37:27,128] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0632 seconds
INFO [2022-12-06 16:37:29,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337449.2542417, 'message': 'Dec 6 16:37:27 hqnl0246134 sshd[233815]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:37:29,290] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337449.2545006, 'message': 'Dec 6 16:37:27 hqnl0246134 sshd[233815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:37:31,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337451.2586849, 'message': 'Dec 6 16:37:30 hqnl0246134 sshd[233815]: Failed password for root from 61.177.173.51 port 58968 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:37:33,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337453.2614436, 'message': 'Dec 6 16:37:31 hqnl0246134 sshd[233815]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 16:37:35,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337455.2622225, 'message': 'Dec 6 16:37:33 hqnl0246134 sshd[233815]: Failed password for root from 61.177.173.51 port 58968 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 16:37:35,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337455.2626176, 'message': 'Dec 6 16:37:34 hqnl0246134 sshd[233815]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:37:37,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337457.2669127, 'message': 'Dec 6 16:37:35 hqnl0246134 sshd[233815]: Failed password for root from 61.177.173.51 port 58968 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0492 seconds
INFO [2022-12-06 16:37:39,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337459.2655864, 'message': 'Dec 6 16:37:38 hqnl0246134 sshd[233832]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 16:37:39,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337459.265859, 'message': 'Dec 6 16:37:38 hqnl0246134 sshd[233832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 16:37:41,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337461.2676373, 'message': 'Dec 6 16:37:40 hqnl0246134 sshd[233832]: Failed password for root from 61.177.173.51 port 44934 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 16:37:43,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337463.27052, 'message': 'Dec 6 16:37:42 hqnl0246134 sshd[233832]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 16:37:45,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337465.274573, 'message': 'Dec 6 16:37:44 hqnl0246134 sshd[233832]: Failed password for root from 61.177.173.51 port 44934 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 16:37:45,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337465.2748926, 'message': 'Dec 6 16:37:44 hqnl0246134 sshd[233832]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 16:37:47,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670337467.2771919, 'message': 'Dec 6 16:37:46 hqnl0246134 sshd[233832]: Failed password for root from 61.177.173.51 port 44934 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
WARNING [2022-12-06 16:37:47,337] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:37:47,338] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:37:51,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337471.2821012, 'message': 'Dec 6 16:37:50 hqnl0246134 sshd[233835]: Invalid user test from 20.122.7.237 port 54410', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:37:51,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337471.2828562, 'message': 'Dec 6 16:37:50 hqnl0246134 sshd[233835]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.122.7.237 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:37:51,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337471.282965, 'message': 'Dec 6 16:37:50 hqnl0246134 sshd[233835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.122.7.237 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 16:37:55,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337475.4133635, 'message': 'Dec 6 16:37:53 hqnl0246134 sshd[233835]: Failed password for invalid user test from 20.122.7.237 port 54410 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:37:57,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337477.2906575, 'message': 'Dec 6 16:37:55 hqnl0246134 sshd[233835]: Disconnected from invalid user test 20.122.7.237 port 54410 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0377 seconds
WARNING [2022-12-06 16:38:08,908] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:38:08,935] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0404 seconds
INFO [2022-12-06 16:38:11,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337491.3007927, 'message': 'Dec 6 16:38:09 hqnl0246134 sshd[233856]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 16:38:11,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337491.301187, 'message': 'Dec 6 16:38:09 hqnl0246134 sshd[233856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:38:13,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337493.300812, 'message': 'Dec 6 16:38:11 hqnl0246134 sshd[233856]: Failed password for root from 61.177.173.18 port 40112 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 16:38:15,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337495.3016691, 'message': 'Dec 6 16:38:13 hqnl0246134 sshd[233856]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 16:38:17,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337497.3023255, 'message': 'Dec 6 16:38:15 hqnl0246134 sshd[233856]: Failed password for root from 61.177.173.18 port 40112 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 16:38:17,982] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:38:17,983] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:38:17,993] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:38:18,006] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 16:38:19,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337499.3038678, 'message': 'Dec 6 16:38:18 hqnl0246134 sshd[233856]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 16:38:20,703] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:38:20,704] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:38:20,712] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:38:20,728] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0232 seconds
INFO [2022-12-06 16:38:21,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337501.3047035, 'message': 'Dec 6 16:38:20 hqnl0246134 sshd[233856]: Failed password for root from 61.177.173.18 port 40112 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 16:38:47,342] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:38:47,343] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:39:01,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337541.3420167, 'message': 'Dec 6 16:39:00 hqnl0246134 sshd[233882]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 16:39:01,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337541.3427, 'message': 'Dec 6 16:39:00 hqnl0246134 sshd[233882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 16:39:03,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337543.3421316, 'message': 'Dec 6 16:39:02 hqnl0246134 sshd[233882]: Failed password for root from 61.177.173.18 port 25482 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 16:39:03,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337543.3424592, 'message': 'Dec 6 16:39:03 hqnl0246134 sshd[233882]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 16:39:07,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337547.3452933, 'message': 'Dec 6 16:39:05 hqnl0246134 sshd[233882]: Failed password for root from 61.177.173.18 port 25482 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0252 seconds
WARNING [2022-12-06 16:39:08,906] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:39:08,924] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0253 seconds
INFO [2022-12-06 16:39:09,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337549.3471453, 'message': 'Dec 6 16:39:07 hqnl0246134 sshd[233882]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 16:39:11,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337551.3497734, 'message': 'Dec 6 16:39:09 hqnl0246134 sshd[233882]: Failed password for root from 61.177.173.18 port 25482 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1157 seconds
INFO [2022-12-06 16:39:12,557] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:39:12,558] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:39:12,575] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:39:12,590] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0300 seconds
INFO [2022-12-06 16:39:17,845] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:39:17,846] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:39:17,853] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:39:17,865] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 16:39:22,491] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:39:22,492] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:39:22,502] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:39:22,516] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0234 seconds
INFO [2022-12-06 16:39:39,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337579.3827834, 'message': 'Dec 6 16:39:38 hqnl0246134 sshd[234058]: Invalid user elastic from 46.127.176.19 port 46700', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 16:39:39,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337579.3834672, 'message': 'Dec 6 16:39:38 hqnl0246134 sshd[234058]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.127.176.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:39:39,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337579.3836815, 'message': 'Dec 6 16:39:38 hqnl0246134 sshd[234058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.127.176.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 16:39:41,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337581.3847868, 'message': 'Dec 6 16:39:40 hqnl0246134 sshd[234058]: Failed password for invalid user elastic from 46.127.176.19 port 46700 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:39:41,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337581.3849971, 'message': 'Dec 6 16:39:41 hqnl0246134 sshd[234058]: Disconnected from invalid user elastic 46.127.176.19 port 46700 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:39:45,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337585.38946, 'message': 'Dec 6 16:39:43 hqnl0246134 sshd[234061]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 16:39:45,428] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337585.3897676, 'message': 'Dec 6 16:39:43 hqnl0246134 sshd[234061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 16:39:47,345] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:39:47,346] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:39:47,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337587.3895886, 'message': 'Dec 6 16:39:45 hqnl0246134 sshd[234061]: Failed password for root from 61.177.173.35 port 35255 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:39:49,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337589.392434, 'message': 'Dec 6 16:39:48 hqnl0246134 sshd[234061]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 16:39:51,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337591.3940847, 'message': 'Dec 6 16:39:49 hqnl0246134 sshd[234061]: Failed password for root from 61.177.173.35 port 35255 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 16:39:51,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337591.3942933, 'message': 'Dec 6 16:39:50 hqnl0246134 sshd[234065]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 16:39:51,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337591.3946178, 'message': 'Dec 6 16:39:50 hqnl0246134 sshd[234061]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 16:39:51,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337591.3944604, 'message': 'Dec 6 16:39:50 hqnl0246134 sshd[234065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 16:39:53,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337593.3976328, 'message': 'Dec 6 16:39:52 hqnl0246134 sshd[234065]: Failed password for root from 61.177.173.18 port 14514 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-06 16:39:53,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337593.397979, 'message': 'Dec 6 16:39:52 hqnl0246134 sshd[234061]: Failed password for root from 61.177.173.35 port 35255 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 16:39:53,458] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337593.3995802, 'message': 'Dec 6 16:39:52 hqnl0246134 sshd[234065]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:39:55,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337595.3978565, 'message': 'Dec 6 16:39:54 hqnl0246134 sshd[234065]: Failed password for root from 61.177.173.18 port 14514 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0531 seconds
INFO [2022-12-06 16:39:55,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337595.398188, 'message': 'Dec 6 16:39:55 hqnl0246134 sshd[234069]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0533 seconds
INFO [2022-12-06 16:39:55,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337595.3980744, 'message': 'Dec 6 16:39:54 hqnl0246134 sshd[234065]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 16:39:55,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337595.3983066, 'message': 'Dec 6 16:39:55 hqnl0246134 sshd[234069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 16:39:57,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337597.4004743, 'message': 'Dec 6 16:39:56 hqnl0246134 sshd[234065]: Failed password for root from 61.177.173.18 port 14514 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 16:39:59,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337599.4013066, 'message': 'Dec 6 16:39:57 hqnl0246134 sshd[234069]: Failed password for root from 61.177.173.35 port 64838 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:40:01,502] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337601.4048116, 'message': 'Dec 6 16:39:59 hqnl0246134 sshd[234069]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0974 seconds
INFO [2022-12-06 16:40:01,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337601.405059, 'message': 'Dec 6 16:40:01 hqnl0246134 sshd[234069]: Failed password for root from 61.177.173.35 port 64838 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 16:40:03,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337603.4088075, 'message': 'Dec 6 16:40:02 hqnl0246134 sshd[234069]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 16:40:05,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337605.4083157, 'message': 'Dec 6 16:40:04 hqnl0246134 sshd[234069]: Failed password for root from 61.177.173.35 port 64838 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 16:40:07,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337607.4111333, 'message': 'Dec 6 16:40:05 hqnl0246134 sshd[234116]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 16:40:07,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337607.4114919, 'message': 'Dec 6 16:40:05 hqnl0246134 sshd[234116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 16:40:08,916] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:40:08,944] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0360 seconds
INFO [2022-12-06 16:40:09,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337609.413711, 'message': 'Dec 6 16:40:07 hqnl0246134 sshd[234116]: Failed password for root from 61.177.173.35 port 37638 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 16:40:11,448] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337611.4177363, 'message': 'Dec 6 16:40:10 hqnl0246134 sshd[234116]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 16:40:11,907] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 16:40:11,974] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 16:40:11,975] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 16:40:11,975] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 16:40:11,975] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 16:40:11,975] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 16:40:11,984] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 16:40:11,999] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0238 seconds
WARNING [2022-12-06 16:40:12,006] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 16:40:12,009] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:40:12,026] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0327 seconds
INFO [2022-12-06 16:40:12,028] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0309 seconds
INFO [2022-12-06 16:40:13,455] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337613.4182773, 'message': 'Dec 6 16:40:12 hqnl0246134 sshd[234116]: Failed password for root from 61.177.173.35 port 37638 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 16:40:15,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337615.4206223, 'message': 'Dec 6 16:40:14 hqnl0246134 sshd[234116]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 16:40:17,444] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670337617.422427, 'message': 'Dec 6 16:40:16 hqnl0246134 sshd[234116]: Failed password for root from 61.177.173.35 port 37638 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 16:40:17,969] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:40:17,970] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:40:17,977] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:40:17,988] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 16:40:19,417] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:40:19,417] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:40:19,426] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:40:19,437] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 16:40:20,578] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:40:20,578] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:40:20,595] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:40:20,618] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0382 seconds
INFO [2022-12-06 16:40:25,455] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337625.4339993, 'message': 'Dec 6 16:40:24 hqnl0246134 sshd[234153]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.122.7.237 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 16:40:25,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337625.4343555, 'message': 'Dec 6 16:40:24 hqnl0246134 sshd[234153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.122.7.237 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 16:40:27,468] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337627.4372816, 'message': 'Dec 6 16:40:26 hqnl0246134 sshd[234153]: Failed password for root from 20.122.7.237 port 57754 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 16:40:37,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337637.4744132, 'message': 'Dec 6 16:40:36 hqnl0246134 sshd[234166]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.104.78 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1258 seconds
INFO [2022-12-06 16:40:37,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337637.4748163, 'message': 'Dec 6 16:40:36 hqnl0246134 sshd[234166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.78 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0497 seconds
INFO [2022-12-06 16:40:39,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337639.4500418, 'message': 'Dec 6 16:40:38 hqnl0246134 sshd[234166]: Failed password for root from 68.183.104.78 port 35150 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 16:40:42,102] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 16:40:42,103] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 16:40:42,104] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 16:40:43,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337643.45393, 'message': 'Dec 6 16:40:43 hqnl0246134 sshd[234177]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-06 16:40:43,513] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337643.4541984, 'message': 'Dec 6 16:40:43 hqnl0246134 sshd[234177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:40:45,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337645.4567704, 'message': 'Dec 6 16:40:45 hqnl0246134 sshd[234177]: Failed password for root from 61.177.173.18 port 13748 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 16:40:47,349] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:40:47,350] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:40:47,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337647.4595478, 'message': 'Dec 6 16:40:45 hqnl0246134 sshd[234177]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:40:49,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337649.4615629, 'message': 'Dec 6 16:40:47 hqnl0246134 sshd[234177]: Failed password for root from 61.177.173.18 port 13748 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 16:40:51,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337651.4638815, 'message': 'Dec 6 16:40:50 hqnl0246134 sshd[234177]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 16:40:53,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337653.4659438, 'message': 'Dec 6 16:40:52 hqnl0246134 sshd[234177]: Failed password for root from 61.177.173.18 port 13748 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
WARNING [2022-12-06 16:41:08,929] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:41:08,957] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0444 seconds
INFO [2022-12-06 16:41:17,917] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:41:17,918] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:41:17,926] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:41:17,939] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 16:41:20,543] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:41:20,543] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:41:20,550] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:41:20,560] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0166 seconds
INFO [2022-12-06 16:41:37,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337697.5205498, 'message': 'Dec 6 16:41:35 hqnl0246134 sshd[234215]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 16:41:37,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337697.520899, 'message': 'Dec 6 16:41:35 hqnl0246134 sshd[234215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:41:37,588] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337697.5210702, 'message': 'Dec 6 16:41:37 hqnl0246134 sshd[234215]: Failed password for root from 61.177.173.18 port 54463 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 16:41:39,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337699.521528, 'message': 'Dec 6 16:41:37 hqnl0246134 sshd[234215]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 16:41:41,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337701.5215406, 'message': 'Dec 6 16:41:40 hqnl0246134 sshd[234215]: Failed password for root from 61.177.173.18 port 54463 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 16:41:43,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337703.5219042, 'message': 'Dec 6 16:41:42 hqnl0246134 sshd[234215]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 16:41:45,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337705.5244443, 'message': 'Dec 6 16:41:44 hqnl0246134 sshd[234215]: Failed password for root from 61.177.173.18 port 54463 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
WARNING [2022-12-06 16:41:47,352] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:41:47,353] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:41:48,984] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:41:48,984] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:41:48,996] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:41:49,018] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0336 seconds
WARNING [2022-12-06 16:41:53,346] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 16:42:08,925] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:42:08,946] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0293 seconds
INFO [2022-12-06 16:42:17,850] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:42:17,851] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:42:17,859] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:42:17,871] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 16:42:20,367] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:42:20,368] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:42:20,375] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:42:20,386] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 16:42:29,607] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337749.584881, 'message': 'Dec 6 16:42:29 hqnl0246134 sshd[234275]: Invalid user ircd from 46.127.176.19 port 35916', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 16:42:31,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337751.586801, 'message': 'Dec 6 16:42:29 hqnl0246134 sshd[234275]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.127.176.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 16:42:31,625] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337751.5872483, 'message': 'Dec 6 16:42:30 hqnl0246134 sshd[234273]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 16:42:31,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337751.587026, 'message': 'Dec 6 16:42:29 hqnl0246134 sshd[234275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.127.176.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 16:42:31,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337751.5874035, 'message': 'Dec 6 16:42:30 hqnl0246134 sshd[234273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 16:42:31,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337751.5875366, 'message': 'Dec 6 16:42:31 hqnl0246134 sshd[234275]: Failed password for invalid user ircd from 46.127.176.19 port 35916 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 16:42:33,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337753.5903602, 'message': 'Dec 6 16:42:32 hqnl0246134 sshd[234275]: Disconnected from invalid user ircd 46.127.176.19 port 35916 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 16:42:33,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337753.590604, 'message': 'Dec 6 16:42:32 hqnl0246134 sshd[234273]: Failed password for root from 61.177.173.18 port 48929 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 16:42:35,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337755.5926836, 'message': 'Dec 6 16:42:34 hqnl0246134 sshd[234273]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 16:42:37,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337757.5935335, 'message': 'Dec 6 16:42:36 hqnl0246134 sshd[234273]: Failed password for root from 61.177.173.18 port 48929 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 16:42:39,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337759.5963056, 'message': 'Dec 6 16:42:39 hqnl0246134 sshd[234273]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 16:42:41,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337761.5980413, 'message': 'Dec 6 16:42:40 hqnl0246134 sshd[234273]: Failed password for root from 61.177.173.18 port 48929 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
WARNING [2022-12-06 16:42:47,357] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:42:47,358] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:43:08,930] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:43:08,953] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0332 seconds
INFO [2022-12-06 16:43:18,114] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:43:18,115] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:43:18,127] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:43:18,141] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0254 seconds
INFO [2022-12-06 16:43:20,970] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:43:20,970] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:43:20,983] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:43:21,003] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0313 seconds
INFO [2022-12-06 16:43:23,676] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337803.647851, 'message': 'Dec 6 16:43:21 hqnl0246134 sshd[234332]: Invalid user vivek from 20.122.7.237 port 42594', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 16:43:23,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337803.6483927, 'message': 'Dec 6 16:43:21 hqnl0246134 sshd[234332]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.122.7.237 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 16:43:23,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337803.6486063, 'message': 'Dec 6 16:43:21 hqnl0246134 sshd[234332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.122.7.237 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 16:43:25,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337805.6488235, 'message': 'Dec 6 16:43:23 hqnl0246134 sshd[234332]: Failed password for invalid user vivek from 20.122.7.237 port 42594 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0426 seconds
INFO [2022-12-06 16:43:25,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337805.6491406, 'message': 'Dec 6 16:43:24 hqnl0246134 sshd[234334]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0434 seconds
INFO [2022-12-06 16:43:25,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.122.7.237', 'timestamp': 1670337805.6490195, 'message': 'Dec 6 16:43:24 hqnl0246134 sshd[234332]: Disconnected from invalid user vivek 20.122.7.237 port 42594 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0524 seconds
INFO [2022-12-06 16:43:25,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337805.6492488, 'message': 'Dec 6 16:43:24 hqnl0246134 sshd[234334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-06 16:43:26,714] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:43:26,714] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:43:26,722] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:43:26,736] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 16:43:27,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337807.6508622, 'message': 'Dec 6 16:43:25 hqnl0246134 sshd[234334]: Failed password for root from 61.177.173.18 port 37829 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 16:43:27,685] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337807.6526682, 'message': 'Dec 6 16:43:27 hqnl0246134 sshd[234340]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 16:43:27,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337807.6510408, 'message': 'Dec 6 16:43:26 hqnl0246134 sshd[234334]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 16:43:27,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337807.6529064, 'message': 'Dec 6 16:43:27 hqnl0246134 sshd[234340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 16:43:29,672] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337809.652889, 'message': 'Dec 6 16:43:28 hqnl0246134 sshd[234334]: Failed password for root from 61.177.173.18 port 37829 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 16:43:29,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337809.657432, 'message': 'Dec 6 16:43:28 hqnl0246134 sshd[234334]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:43:31,688] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337811.6581986, 'message': 'Dec 6 16:43:29 hqnl0246134 sshd[234340]: Failed password for root from 61.177.172.114 port 48648 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 16:43:31,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337811.658518, 'message': 'Dec 6 16:43:31 hqnl0246134 sshd[234334]: Failed password for root from 61.177.173.18 port 37829 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 16:43:31,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337811.6587224, 'message': 'Dec 6 16:43:31 hqnl0246134 sshd[234340]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 16:43:33,677] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337813.6605017, 'message': 'Dec 6 16:43:33 hqnl0246134 sshd[234340]: Failed password for root from 61.177.172.114 port 48648 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 16:43:35,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337815.6627753, 'message': 'Dec 6 16:43:33 hqnl0246134 sshd[234340]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:43:35,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337815.6629796, 'message': 'Dec 6 16:43:35 hqnl0246134 sshd[234340]: Failed password for root from 61.177.172.114 port 48648 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:43:37,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337817.6658483, 'message': 'Dec 6 16:43:36 hqnl0246134 sshd[234368]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.104.78 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 16:43:37,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337817.6660612, 'message': 'Dec 6 16:43:36 hqnl0246134 sshd[234368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.78 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:43:39,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337819.6691198, 'message': 'Dec 6 16:43:38 hqnl0246134 sshd[234370]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 16:43:39,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337819.6696172, 'message': 'Dec 6 16:43:38 hqnl0246134 sshd[234368]: Failed password for root from 68.183.104.78 port 48526 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 16:43:39,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337819.6694546, 'message': 'Dec 6 16:43:38 hqnl0246134 sshd[234370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 16:43:41,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337821.6718428, 'message': 'Dec 6 16:43:40 hqnl0246134 sshd[234370]: Failed password for root from 61.177.172.114 port 14588 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:43:43,693] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337823.6756072, 'message': 'Dec 6 16:43:42 hqnl0246134 sshd[234370]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 16:43:45,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337825.678219, 'message': 'Dec 6 16:43:44 hqnl0246134 sshd[234370]: Failed password for root from 61.177.172.114 port 14588 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 16:43:45,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337825.6784072, 'message': 'Dec 6 16:43:44 hqnl0246134 sshd[234370]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
WARNING [2022-12-06 16:43:47,362] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:43:47,363] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:43:47,702] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337827.6833925, 'message': 'Dec 6 16:43:46 hqnl0246134 sshd[234370]: Failed password for root from 61.177.172.114 port 14588 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:43:51,714] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337831.6945407, 'message': 'Dec 6 16:43:50 hqnl0246134 sshd[234382]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 16:43:51,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337831.6947398, 'message': 'Dec 6 16:43:50 hqnl0246134 sshd[234382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:43:53,714] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337833.6967607, 'message': 'Dec 6 16:43:52 hqnl0246134 sshd[234382]: Failed password for root from 61.177.172.114 port 49005 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 16:43:55,724] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337835.704993, 'message': 'Dec 6 16:43:54 hqnl0246134 sshd[234382]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 16:43:57,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337837.711561, 'message': 'Dec 6 16:43:56 hqnl0246134 sshd[234382]: Failed password for root from 61.177.172.114 port 49005 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 16:43:57,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337837.7117507, 'message': 'Dec 6 16:43:57 hqnl0246134 sshd[234382]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 16:43:59,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337839.714544, 'message': 'Dec 6 16:43:59 hqnl0246134 sshd[234382]: Failed password for root from 61.177.172.114 port 49005 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 16:44:01,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337841.7189326, 'message': 'Dec 6 16:44:01 hqnl0246134 sshd[234387]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 16:44:01,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337841.719227, 'message': 'Dec 6 16:44:01 hqnl0246134 sshd[234387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0453 seconds
INFO [2022-12-06 16:44:03,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337843.7221353, 'message': 'Dec 6 16:44:02 hqnl0246134 sshd[234387]: Failed password for root from 61.177.172.114 port 16235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:44:03,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337843.7225246, 'message': 'Dec 6 16:44:03 hqnl0246134 sshd[234387]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:44:07,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337847.7340786, 'message': 'Dec 6 16:44:06 hqnl0246134 sshd[234387]: Failed password for root from 61.177.172.114 port 16235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
WARNING [2022-12-06 16:44:08,936] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:44:08,964] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0376 seconds
INFO [2022-12-06 16:44:09,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337849.734592, 'message': 'Dec 6 16:44:07 hqnl0246134 sshd[234387]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 16:44:11,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670337851.7367656, 'message': 'Dec 6 16:44:09 hqnl0246134 sshd[234387]: Failed password for root from 61.177.172.114 port 16235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 16:44:17,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337857.7448077, 'message': 'Dec 6 16:44:15 hqnl0246134 sshd[234410]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 16:44:17,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337857.7451243, 'message': 'Dec 6 16:44:15 hqnl0246134 sshd[234410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:44:17,955] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:44:17,955] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:44:17,964] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:44:17,976] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 16:44:19,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337859.7483609, 'message': 'Dec 6 16:44:18 hqnl0246134 sshd[234410]: Failed password for root from 61.177.173.18 port 34591 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 16:44:20,912] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:44:20,913] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:44:20,920] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:44:20,932] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 16:44:21,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337861.7488534, 'message': 'Dec 6 16:44:20 hqnl0246134 sshd[234410]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 16:44:23,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337863.7496786, 'message': 'Dec 6 16:44:21 hqnl0246134 sshd[234410]: Failed password for root from 61.177.173.18 port 34591 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0516 seconds
INFO [2022-12-06 16:44:23,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337863.7499034, 'message': 'Dec 6 16:44:22 hqnl0246134 sshd[234410]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 16:44:25,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337865.7536056, 'message': 'Dec 6 16:44:24 hqnl0246134 sshd[234410]: Failed password for root from 61.177.173.18 port 34591 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
WARNING [2022-12-06 16:44:47,367] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:44:47,368] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:45:08,940] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:45:08,964] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0342 seconds
INFO [2022-12-06 16:45:09,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337909.8216145, 'message': 'Dec 6 16:45:08 hqnl0246134 sshd[234468]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 16:45:09,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337909.8219612, 'message': 'Dec 6 16:45:08 hqnl0246134 sshd[234468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:45:11,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337911.8222084, 'message': 'Dec 6 16:45:10 hqnl0246134 sshd[234468]: Failed password for root from 61.177.173.18 port 27815 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 16:45:11,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337911.8322926, 'message': 'Dec 6 16:45:11 hqnl0246134 sshd[234468]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 16:45:13,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337913.8280184, 'message': 'Dec 6 16:45:12 hqnl0246134 sshd[234468]: Failed password for root from 61.177.173.18 port 27815 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 16:45:13,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337913.829746, 'message': 'Dec 6 16:45:13 hqnl0246134 sshd[234468]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 16:45:15,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337915.8295648, 'message': 'Dec 6 16:45:15 hqnl0246134 sshd[234468]: Failed password for root from 61.177.173.18 port 27815 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 16:45:17,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337917.8303783, 'message': 'Dec 6 16:45:17 hqnl0246134 sshd[234491]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.127.176.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 16:45:17,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337917.8306742, 'message': 'Dec 6 16:45:17 hqnl0246134 sshd[234491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.127.176.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:45:18,246] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:45:18,247] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:45:18,259] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:45:18,280] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0316 seconds
INFO [2022-12-06 16:45:19,852] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '46.127.176.19', 'timestamp': 1670337919.8328161, 'message': 'Dec 6 16:45:18 hqnl0246134 sshd[234491]: Failed password for root from 46.127.176.19 port 53372 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 16:45:20,363] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:45:20,364] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:45:20,371] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:45:20,382] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-06 16:45:20,864] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:45:20,864] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:45:20,871] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:45:20,881] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0165 seconds
WARNING [2022-12-06 16:45:47,371] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:45:47,372] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:46:00,541] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 16:46:00,606] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 16:46:00,606] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 16:46:00,607] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 16:46:00,607] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 16:46:00,607] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 16:46:00,618] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 16:46:00,645] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0369 seconds
WARNING [2022-12-06 16:46:00,651] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 16:46:00,654] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:46:00,673] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0359 seconds
INFO [2022-12-06 16:46:00,675] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0322 seconds
INFO [2022-12-06 16:46:01,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337961.8895843, 'message': 'Dec 6 16:46:01 hqnl0246134 sshd[234522]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 16:46:01,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337961.8898208, 'message': 'Dec 6 16:46:01 hqnl0246134 sshd[234522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 16:46:03,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337963.889744, 'message': 'Dec 6 16:46:02 hqnl0246134 sshd[234522]: Failed password for root from 61.177.173.18 port 62582 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 16:46:03,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337963.8899615, 'message': 'Dec 6 16:46:03 hqnl0246134 sshd[234522]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 16:46:05,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337965.8922575, 'message': 'Dec 6 16:46:05 hqnl0246134 sshd[234522]: Failed password for root from 61.177.173.18 port 62582 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:46:07,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337967.8938344, 'message': 'Dec 6 16:46:07 hqnl0246134 sshd[234522]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
WARNING [2022-12-06 16:46:08,952] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:46:08,989] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0549 seconds
INFO [2022-12-06 16:46:09,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670337969.8960676, 'message': 'Dec 6 16:46:09 hqnl0246134 sshd[234522]: Failed password for root from 61.177.173.18 port 62582 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0476 seconds
INFO [2022-12-06 16:46:18,021] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:46:18,022] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:46:18,030] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:46:18,043] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 16:46:20,749] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:46:20,749] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:46:20,757] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:46:20,769] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 16:46:30,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.216.40.170', 'timestamp': 1670337989.9225807, 'message': 'Dec 6 16:46:29 hqnl0246134 sshd[234566]: Invalid user rsync from 189.216.40.170 port 42852', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1452 seconds
INFO [2022-12-06 16:46:30,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337989.922811, 'message': 'Dec 6 16:46:29 hqnl0246134 sshd[234570]: Invalid user pubsftp from 68.183.104.78 port 55510', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1461 seconds
INFO [2022-12-06 16:46:30,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.216.40.170', 'timestamp': 1670337989.9231668, 'message': 'Dec 6 16:46:29 hqnl0246134 sshd[234566]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.216.40.170 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1532 seconds
INFO [2022-12-06 16:46:30,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337989.9229565, 'message': 'Dec 6 16:46:29 hqnl0246134 sshd[234570]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.104.78 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1534 seconds
INFO [2022-12-06 16:46:30,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.216.40.170', 'timestamp': 1670337989.923304, 'message': 'Dec 6 16:46:29 hqnl0246134 sshd[234566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.216.40.170 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1119 seconds
INFO [2022-12-06 16:46:30,337] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337989.9230642, 'message': 'Dec 6 16:46:29 hqnl0246134 sshd[234570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.78 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1118 seconds
INFO [2022-12-06 16:46:30,748] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 16:46:30,749] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 16:46:30,751] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 16:46:32,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337991.9247282, 'message': 'Dec 6 16:46:31 hqnl0246134 sshd[234570]: Failed password for invalid user pubsftp from 68.183.104.78 port 55510 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1148 seconds
INFO [2022-12-06 16:46:32,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.216.40.170', 'timestamp': 1670337991.925296, 'message': 'Dec 6 16:46:31 hqnl0246134 sshd[234566]: Failed password for invalid user rsync from 189.216.40.170 port 42852 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1149 seconds
INFO [2022-12-06 16:46:32,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.104.78', 'timestamp': 1670337991.9251168, 'message': 'Dec 6 16:46:31 hqnl0246134 sshd[234570]: Disconnected from invalid user pubsftp 68.183.104.78 port 55510 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0528 seconds
INFO [2022-12-06 16:46:32,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.216.40.170', 'timestamp': 1670337991.9255, 'message': 'Dec 6 16:46:31 hqnl0246134 sshd[234566]: Disconnected from invalid user rsync 189.216.40.170 port 42852 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0525 seconds
INFO [2022-12-06 16:46:34,903] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:46:34,903] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:46:34,910] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:46:34,922] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
WARNING [2022-12-06 16:46:47,377] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:46:47,378] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:46:47,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670338007.9429872, 'message': 'Dec 6 16:46:47 hqnl0246134 sshd[234589]: Invalid user admin from 152.89.196.220 port 49540', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 16:46:49,967] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670338009.9440963, 'message': 'Dec 6 16:46:48 hqnl0246134 sshd[234589]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 16:46:49,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670338009.944341, 'message': 'Dec 6 16:46:48 hqnl0246134 sshd[234589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 16:46:50,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670338009.9445002, 'message': 'Dec 6 16:46:49 hqnl0246134 sshd[234589]: Failed password for invalid user admin from 152.89.196.220 port 49540 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 16:46:50,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670338009.944618, 'message': 'Dec 6 16:46:49 hqnl0246134 sshd[234589]: Disconnected from invalid user admin 152.89.196.220 port 49540 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 16:46:52,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338011.9465506, 'message': 'Dec 6 16:46:51 hqnl0246134 sshd[234592]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0585 seconds
INFO [2022-12-06 16:46:52,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.152.105', 'timestamp': 1670338011.9470472, 'message': 'Dec 6 16:46:51 hqnl0246134 sshd[234591]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.152.105 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0590 seconds
INFO [2022-12-06 16:46:52,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338011.9468362, 'message': 'Dec 6 16:46:51 hqnl0246134 sshd[234592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 16:46:52,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.152.105', 'timestamp': 1670338011.9472206, 'message': 'Dec 6 16:46:51 hqnl0246134 sshd[234591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.152.105 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-06 16:46:53,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338013.9495168, 'message': 'Dec 6 16:46:53 hqnl0246134 sshd[234592]: Failed password for root from 61.177.173.18 port 60490 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-06 16:46:53,990] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '128.199.152.105', 'timestamp': 1670338013.949873, 'message': 'Dec 6 16:46:53 hqnl0246134 sshd[234591]: Failed password for root from 128.199.152.105 port 59184 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-06 16:46:54,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338013.9500327, 'message': 'Dec 6 16:46:53 hqnl0246134 sshd[234592]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 16:46:55,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338015.9502938, 'message': 'Dec 6 16:46:55 hqnl0246134 sshd[234592]: Failed password for root from 61.177.173.18 port 60490 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 16:46:59,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338019.9544613, 'message': 'Dec 6 16:46:58 hqnl0246134 sshd[234592]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 16:47:01,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338021.9572163, 'message': 'Dec 6 16:47:00 hqnl0246134 sshd[234592]: Failed password for root from 61.177.173.18 port 60490 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0339 seconds
WARNING [2022-12-06 16:47:09,041] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:47:09,073] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.1217 seconds
INFO [2022-12-06 16:47:14,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.31.17.98', 'timestamp': 1670338033.9721699, 'message': 'Dec 6 16:47:13 hqnl0246134 sshd[234628]: Invalid user admin from 123.31.17.98 port 60228', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 16:47:14,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '123.31.17.98', 'timestamp': 1670338033.9729931, 'message': 'Dec 6 16:47:13 hqnl0246134 sshd[234628]: pam_imunify(sshd:auth): [IM360_RBL] The IP 123.31.17.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 16:47:14,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '123.31.17.98', 'timestamp': 1670338033.974714, 'message': 'Dec 6 16:47:13 hqnl0246134 sshd[234628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.17.98 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 16:47:15,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.31.17.98', 'timestamp': 1670338035.9728599, 'message': 'Dec 6 16:47:15 hqnl0246134 sshd[234628]: Failed password for invalid user admin from 123.31.17.98 port 60228 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:47:17,990] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:47:17,991] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:47:18,008] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:47:18,035] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0430 seconds
INFO [2022-12-06 16:47:18,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.31.17.98', 'timestamp': 1670338037.9930751, 'message': 'Dec 6 16:47:17 hqnl0246134 sshd[234628]: Disconnected from invalid user admin 123.31.17.98 port 60228 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 16:47:20,741] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:47:20,741] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:47:20,749] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:47:20,761] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 16:47:30,005] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338049.9862175, 'message': 'Dec 6 16:47:28 hqnl0246134 sshd[234646]: Invalid user jimmy from 165.227.68.95 port 41810', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:47:30,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338049.9864457, 'message': 'Dec 6 16:47:28 hqnl0246134 sshd[234646]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.227.68.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:47:30,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338049.9865913, 'message': 'Dec 6 16:47:28 hqnl0246134 sshd[234646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.68.95 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:47:32,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338051.987608, 'message': 'Dec 6 16:47:31 hqnl0246134 sshd[234646]: Failed password for invalid user jimmy from 165.227.68.95 port 41810 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 16:47:34,019] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338053.9895883, 'message': 'Dec 6 16:47:32 hqnl0246134 sshd[234646]: Disconnected from invalid user jimmy 165.227.68.95 port 41810 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 16:47:35,322] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:47:35,322] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:47:35,332] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:47:35,355] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0319 seconds
INFO [2022-12-06 16:47:44,035] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338064.0127885, 'message': 'Dec 6 16:47:43 hqnl0246134 sshd[234663]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 16:47:44,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338064.01318, 'message': 'Dec 6 16:47:43 hqnl0246134 sshd[234663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 16:47:46,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338066.013899, 'message': 'Dec 6 16:47:45 hqnl0246134 sshd[234663]: Failed password for root from 61.177.173.18 port 49176 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 16:47:47,381] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:47:47,382] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:47:48,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338068.0160542, 'message': 'Dec 6 16:47:46 hqnl0246134 sshd[234663]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 16:47:50,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338070.0188966, 'message': 'Dec 6 16:47:48 hqnl0246134 sshd[234663]: Failed password for root from 61.177.173.18 port 49176 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 16:47:52,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338072.0205276, 'message': 'Dec 6 16:47:50 hqnl0246134 sshd[234663]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:47:54,047] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338074.0218027, 'message': 'Dec 6 16:47:52 hqnl0246134 sshd[234663]: Failed password for root from 61.177.173.18 port 49176 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 16:48:06,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '140.238.177.83', 'timestamp': 1670338086.050113, 'message': 'Dec 6 16:48:05 hqnl0246134 sshd[234699]: Invalid user isabella from 140.238.177.83 port 43754', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 16:48:08,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '140.238.177.83', 'timestamp': 1670338088.050681, 'message': 'Dec 6 16:48:06 hqnl0246134 sshd[234699]: pam_imunify(sshd:auth): [IM360_RBL] The IP 140.238.177.83 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:48:08,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '140.238.177.83', 'timestamp': 1670338088.050869, 'message': 'Dec 6 16:48:06 hqnl0246134 sshd[234699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.177.83 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 16:48:08,962] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:48:08,987] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0327 seconds
INFO [2022-12-06 16:48:10,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '140.238.177.83', 'timestamp': 1670338090.0514739, 'message': 'Dec 6 16:48:08 hqnl0246134 sshd[234699]: Failed password for invalid user isabella from 140.238.177.83 port 43754 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 16:48:10,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '140.238.177.83', 'timestamp': 1670338090.0519457, 'message': 'Dec 6 16:48:09 hqnl0246134 sshd[234699]: Disconnected from invalid user isabella 140.238.177.83 port 43754 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 16:48:19,098] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:48:19,099] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:48:19,110] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:48:19,132] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0309 seconds
INFO [2022-12-06 16:48:22,126] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:48:22,127] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:48:22,139] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:48:22,162] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0339 seconds
INFO [2022-12-06 16:48:26,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338106.0646656, 'message': 'Dec 6 16:48:26 hqnl0246134 sshd[234727]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 16:48:26,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338106.064943, 'message': 'Dec 6 16:48:26 hqnl0246134 sshd[234727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 16:48:28,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338108.0668368, 'message': 'Dec 6 16:48:27 hqnl0246134 sshd[234727]: Failed password for root from 61.177.173.46 port 60189 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:48:30,088] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338110.069433, 'message': 'Dec 6 16:48:28 hqnl0246134 sshd[234727]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 16:48:32,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338112.0729716, 'message': 'Dec 6 16:48:30 hqnl0246134 sshd[234727]: Failed password for root from 61.177.173.46 port 60189 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 16:48:34,098] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338114.0739658, 'message': 'Dec 6 16:48:32 hqnl0246134 sshd[234727]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 16:48:36,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338116.0795176, 'message': 'Dec 6 16:48:34 hqnl0246134 sshd[234727]: Failed password for root from 61.177.173.46 port 60189 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 16:48:38,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338118.0843084, 'message': 'Dec 6 16:48:36 hqnl0246134 sshd[234735]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0472 seconds
INFO [2022-12-06 16:48:38,134] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338118.0846868, 'message': 'Dec 6 16:48:36 hqnl0246134 sshd[234737]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0483 seconds
INFO [2022-12-06 16:48:38,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338118.0845392, 'message': 'Dec 6 16:48:36 hqnl0246134 sshd[234735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-06 16:48:38,172] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338118.0848289, 'message': 'Dec 6 16:48:36 hqnl0246134 sshd[234737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 16:48:40,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338120.087253, 'message': 'Dec 6 16:48:38 hqnl0246134 sshd[234735]: Failed password for root from 61.177.173.46 port 31831 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 16:48:40,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338120.0875914, 'message': 'Dec 6 16:48:39 hqnl0246134 sshd[234737]: Failed password for root from 61.177.173.18 port 41340 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 16:48:42,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338122.0918505, 'message': 'Dec 6 16:48:40 hqnl0246134 sshd[234735]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 16:48:42,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338122.092046, 'message': 'Dec 6 16:48:41 hqnl0246134 sshd[234737]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 16:48:44,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338124.0948436, 'message': 'Dec 6 16:48:43 hqnl0246134 sshd[234737]: Failed password for root from 61.177.173.18 port 41340 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 16:48:44,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338124.0950422, 'message': 'Dec 6 16:48:43 hqnl0246134 sshd[234735]: Failed password for root from 61.177.173.46 port 31831 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 16:48:46,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338126.0976226, 'message': 'Dec 6 16:48:44 hqnl0246134 sshd[234737]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 16:48:46,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338126.0978668, 'message': 'Dec 6 16:48:45 hqnl0246134 sshd[234735]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
WARNING [2022-12-06 16:48:47,385] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:48:47,386] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:48:48,134] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338128.0981717, 'message': 'Dec 6 16:48:46 hqnl0246134 sshd[234737]: Failed password for root from 61.177.173.18 port 41340 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 16:48:48,134] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670338128.0984247, 'message': 'Dec 6 16:48:47 hqnl0246134 sshd[234735]: Failed password for root from 61.177.173.46 port 31831 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0355 seconds
WARNING [2022-12-06 16:49:08,969] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:49:08,992] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0340 seconds
INFO [2022-12-06 16:49:12,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338152.1257179, 'message': 'Dec 6 16:49:10 hqnl0246134 sshd[234771]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.15.130.203 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 16:49:12,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338152.1264167, 'message': 'Dec 6 16:49:11 hqnl0246134 sshd[234773]: Invalid user impala from 103.250.11.181 port 38288', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 16:49:12,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338152.1262393, 'message': 'Dec 6 16:49:10 hqnl0246134 sshd[234771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.130.203 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 16:49:12,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338152.1265457, 'message': 'Dec 6 16:49:11 hqnl0246134 sshd[234773]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.250.11.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 16:49:12,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338152.1266947, 'message': 'Dec 6 16:49:11 hqnl0246134 sshd[234773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.11.181 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 16:49:14,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338154.1259313, 'message': 'Dec 6 16:49:12 hqnl0246134 sshd[234771]: Failed password for root from 51.15.130.203 port 57824 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0497 seconds
INFO [2022-12-06 16:49:14,177] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338154.126166, 'message': 'Dec 6 16:49:13 hqnl0246134 sshd[234773]: Failed password for invalid user impala from 103.250.11.181 port 38288 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0505 seconds
INFO [2022-12-06 16:49:16,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338156.1281934, 'message': 'Dec 6 16:49:14 hqnl0246134 sshd[234773]: Disconnected from invalid user impala 103.250.11.181 port 38288 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 16:49:16,870] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:49:16,871] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:49:16,878] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:49:16,890] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 16:49:17,752] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:49:17,753] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:49:17,759] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:49:17,771] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 16:49:20,399] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:49:20,399] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:49:20,407] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:49:20,418] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 16:49:30,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338170.14727, 'message': 'Dec 6 16:49:28 hqnl0246134 sshd[234799]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 16:49:30,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338170.1475246, 'message': 'Dec 6 16:49:28 hqnl0246134 sshd[234799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 16:49:30,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338170.1476603, 'message': 'Dec 6 16:49:30 hqnl0246134 sshd[234799]: Failed password for root from 61.177.173.18 port 20728 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:49:32,167] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338172.1484673, 'message': 'Dec 6 16:49:30 hqnl0246134 sshd[234799]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 16:49:34,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338174.1498258, 'message': 'Dec 6 16:49:32 hqnl0246134 sshd[234799]: Failed password for root from 61.177.173.18 port 20728 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 16:49:36,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338176.156286, 'message': 'Dec 6 16:49:35 hqnl0246134 sshd[234799]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 16:49:38,177] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338178.1594088, 'message': 'Dec 6 16:49:37 hqnl0246134 sshd[234799]: Failed password for root from 61.177.173.18 port 20728 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 16:49:42,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.226.2', 'timestamp': 1670338182.1624303, 'message': 'Dec 6 16:49:40 hqnl0246134 sshd[234813]: Invalid user lucas from 178.128.226.2 port 60499', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 16:49:42,208] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.226.2', 'timestamp': 1670338182.1627967, 'message': 'Dec 6 16:49:41 hqnl0246134 sshd[234813]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.226.2 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 16:49:42,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.226.2', 'timestamp': 1670338182.1629424, 'message': 'Dec 6 16:49:41 hqnl0246134 sshd[234813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 16:49:44,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.226.2', 'timestamp': 1670338184.1648428, 'message': 'Dec 6 16:49:42 hqnl0246134 sshd[234813]: Failed password for invalid user lucas from 178.128.226.2 port 60499 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0654 seconds
INFO [2022-12-06 16:49:46,216] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.226.2', 'timestamp': 1670338186.166242, 'message': 'Dec 6 16:49:44 hqnl0246134 sshd[234813]: Disconnected from invalid user lucas 178.128.226.2 port 60499 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0501 seconds
WARNING [2022-12-06 16:49:47,388] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:49:47,388] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:50:08,986] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:50:09,030] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0629 seconds
INFO [2022-12-06 16:50:17,825] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:50:17,825] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:50:17,835] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:50:17,848] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 16:50:20,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338220.212741, 'message': 'Dec 6 16:50:19 hqnl0246134 sshd[234869]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0414 seconds
INFO [2022-12-06 16:50:20,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338220.2130573, 'message': 'Dec 6 16:50:19 hqnl0246134 sshd[234869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 16:50:20,951] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:50:20,951] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:50:20,959] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:50:20,970] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 16:50:22,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338222.2139769, 'message': 'Dec 6 16:50:21 hqnl0246134 sshd[234874]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 16:50:22,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338222.2142859, 'message': 'Dec 6 16:50:21 hqnl0246134 sshd[234869]: Failed password for root from 61.177.173.18 port 57685 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0430 seconds
INFO [2022-12-06 16:50:22,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338222.2141519, 'message': 'Dec 6 16:50:21 hqnl0246134 sshd[234874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:50:24,088] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 16:50:24,161] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 16:50:24,162] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 16:50:24,162] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 16:50:24,162] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 16:50:24,163] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 16:50:24,173] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 16:50:24,190] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0266 seconds
WARNING [2022-12-06 16:50:24,197] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 16:50:24,199] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:50:24,220] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0358 seconds
INFO [2022-12-06 16:50:24,225] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0366 seconds
INFO [2022-12-06 16:50:24,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338224.2159991, 'message': 'Dec 6 16:50:23 hqnl0246134 sshd[234869]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 16:50:24,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338224.2161646, 'message': 'Dec 6 16:50:23 hqnl0246134 sshd[234874]: Failed password for root from 61.177.173.37 port 39395 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 16:50:26,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338226.2186332, 'message': 'Dec 6 16:50:24 hqnl0246134 sshd[234869]: Failed password for root from 61.177.173.18 port 57685 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 16:50:26,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338226.218887, 'message': 'Dec 6 16:50:25 hqnl0246134 sshd[234874]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 16:50:26,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338226.2190826, 'message': 'Dec 6 16:50:25 hqnl0246134 sshd[234869]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:50:28,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338228.4005744, 'message': 'Dec 6 16:50:26 hqnl0246134 sshd[234874]: Failed password for root from 61.177.173.37 port 39395 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 16:50:28,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338228.4008694, 'message': 'Dec 6 16:50:27 hqnl0246134 sshd[234869]: Failed password for root from 61.177.173.18 port 57685 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 16:50:28,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338228.4010282, 'message': 'Dec 6 16:50:27 hqnl0246134 sshd[234874]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:50:30,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338230.2223158, 'message': 'Dec 6 16:50:29 hqnl0246134 sshd[234874]: Failed password for root from 61.177.173.37 port 39395 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 16:50:30,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338230.2226148, 'message': 'Dec 6 16:50:29 hqnl0246134 sshd[234885]: Invalid user alfresco from 51.250.64.79 port 54038', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 16:50:30,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338230.2228098, 'message': 'Dec 6 16:50:30 hqnl0246134 sshd[234885]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.64.79 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:50:30,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338230.222995, 'message': 'Dec 6 16:50:30 hqnl0246134 sshd[234885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.64.79 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 16:50:30,625] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:50:30,626] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:50:30,634] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:50:30,646] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 16:50:32,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338232.2239776, 'message': 'Dec 6 16:50:32 hqnl0246134 sshd[234885]: Failed password for invalid user alfresco from 51.250.64.79 port 54038 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 16:50:34,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338234.225991, 'message': 'Dec 6 16:50:33 hqnl0246134 sshd[234885]: Disconnected from invalid user alfresco 51.250.64.79 port 54038 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 16:50:42,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.60.127', 'timestamp': 1670338242.2396224, 'message': 'Dec 6 16:50:41 hqnl0246134 sshd[234903]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.60.127 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 16:50:42,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.60.127', 'timestamp': 1670338242.2400186, 'message': 'Dec 6 16:50:41 hqnl0246134 sshd[234903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.60.127 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:50:44,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.60.127', 'timestamp': 1670338244.241996, 'message': 'Dec 6 16:50:43 hqnl0246134 sshd[234903]: Failed password for root from 43.153.60.127 port 58496 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0248 seconds
WARNING [2022-12-06 16:50:47,392] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:50:47,393] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:50:48,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338248.2463331, 'message': 'Dec 6 16:50:47 hqnl0246134 sshd[234906]: Invalid user git from 49.51.24.192 port 43856', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 16:50:48,290] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338248.2466445, 'message': 'Dec 6 16:50:47 hqnl0246134 sshd[234906]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.51.24.192 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:50:48,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338248.2468507, 'message': 'Dec 6 16:50:47 hqnl0246134 sshd[234906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.24.192 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 16:50:50,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338250.2482526, 'message': 'Dec 6 16:50:49 hqnl0246134 sshd[234906]: Failed password for invalid user git from 49.51.24.192 port 43856 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0481 seconds
INFO [2022-12-06 16:50:50,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338250.248591, 'message': 'Dec 6 16:50:49 hqnl0246134 sshd[234906]: Disconnected from invalid user git 49.51.24.192 port 43856 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0556 seconds
INFO [2022-12-06 16:50:54,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338254.253897, 'message': 'Dec 6 16:50:53 hqnl0246134 sshd[234911]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 16:50:54,293] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 16:50:54,293] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 16:50:54,294] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 16:50:54,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338254.2543807, 'message': 'Dec 6 16:50:53 hqnl0246134 sshd[234911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 16:50:56,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338256.257357, 'message': 'Dec 6 16:50:55 hqnl0246134 sshd[234911]: Failed password for root from 61.177.173.37 port 25869 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:50:58,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338258.2581296, 'message': 'Dec 6 16:50:56 hqnl0246134 sshd[234911]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 16:51:00,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338260.26273, 'message': 'Dec 6 16:50:58 hqnl0246134 sshd[234911]: Failed password for root from 61.177.173.37 port 25869 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 16:51:00,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338260.2629757, 'message': 'Dec 6 16:50:58 hqnl0246134 sshd[234911]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 16:51:02,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338262.2675185, 'message': 'Dec 6 16:51:00 hqnl0246134 sshd[234911]: Failed password for root from 61.177.173.37 port 25869 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 16:51:08,980] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:51:09,008] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0368 seconds
INFO [2022-12-06 16:51:14,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338274.2773094, 'message': 'Dec 6 16:51:12 hqnl0246134 sshd[234931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 16:51:14,321] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338274.277795, 'message': 'Dec 6 16:51:12 hqnl0246134 sshd[234931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:51:14,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338274.2780135, 'message': 'Dec 6 16:51:14 hqnl0246134 sshd[234931]: Failed password for root from 61.177.173.18 port 53771 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 16:51:16,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338276.2808356, 'message': 'Dec 6 16:51:15 hqnl0246134 sshd[234931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0411 seconds
INFO [2022-12-06 16:51:16,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338276.2810318, 'message': 'Dec 6 16:51:16 hqnl0246134 sshd[234934]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0413 seconds
INFO [2022-12-06 16:51:16,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338276.2812283, 'message': 'Dec 6 16:51:16 hqnl0246134 sshd[234934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 16:51:17,979] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:51:17,980] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:51:17,990] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:51:18,006] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0244 seconds
INFO [2022-12-06 16:51:18,337] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338278.2832277, 'message': 'Dec 6 16:51:17 hqnl0246134 sshd[234931]: Failed password for root from 61.177.173.18 port 53771 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0534 seconds
INFO [2022-12-06 16:51:18,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338278.283541, 'message': 'Dec 6 16:51:17 hqnl0246134 sshd[234934]: Failed password for root from 61.177.173.37 port 56349 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0535 seconds
INFO [2022-12-06 16:51:20,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338280.2860258, 'message': 'Dec 6 16:51:18 hqnl0246134 sshd[234934]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 16:51:20,314] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338280.286247, 'message': 'Dec 6 16:51:19 hqnl0246134 sshd[234931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 16:51:22,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338282.2890525, 'message': 'Dec 6 16:51:20 hqnl0246134 sshd[234934]: Failed password for root from 61.177.173.37 port 56349 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 16:51:22,328] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338282.2894192, 'message': 'Dec 6 16:51:21 hqnl0246134 sshd[234931]: Failed password for root from 61.177.173.18 port 53771 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-06 16:51:22,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338282.289251, 'message': 'Dec 6 16:51:21 hqnl0246134 sshd[234934]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 16:51:22,708] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:51:22,709] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:51:22,716] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:51:22,732] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0223 seconds
INFO [2022-12-06 16:51:24,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338284.2928925, 'message': 'Dec 6 16:51:23 hqnl0246134 sshd[234934]: Failed password for root from 61.177.173.37 port 56349 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 16:51:28,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338288.296476, 'message': 'Dec 6 16:51:27 hqnl0246134 sshd[234948]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 16:51:28,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338288.2967277, 'message': 'Dec 6 16:51:27 hqnl0246134 sshd[234948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 16:51:30,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338290.2980323, 'message': 'Dec 6 16:51:29 hqnl0246134 sshd[234948]: Failed password for root from 61.177.173.37 port 33205 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 16:51:32,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338292.30054, 'message': 'Dec 6 16:51:31 hqnl0246134 sshd[234948]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:51:34,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338294.3035448, 'message': 'Dec 6 16:51:33 hqnl0246134 sshd[234948]: Failed password for root from 61.177.173.37 port 33205 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:51:34,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338294.3037221, 'message': 'Dec 6 16:51:34 hqnl0246134 sshd[234948]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 16:51:36,328] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338296.3059878, 'message': 'Dec 6 16:51:36 hqnl0246134 sshd[234948]: Failed password for root from 61.177.173.37 port 33205 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 16:51:39,138] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:51:39,138] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:51:39,146] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:51:39,157] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-06 16:51:40,093] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 16:51:40,095] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 16:51:40,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338300.3149626, 'message': 'Dec 6 16:51:38 hqnl0246134 sshd[234954]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 16:51:40,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338300.315293, 'message': 'Dec 6 16:51:38 hqnl0246134 sshd[234954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 16:51:40,966] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-06 16:51:42,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338302.3174098, 'message': 'Dec 6 16:51:40 hqnl0246134 sshd[234954]: Failed password for root from 61.177.173.37 port 43642 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 16:51:42,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338302.3177588, 'message': 'Dec 6 16:51:41 hqnl0246134 sshd[234954]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 16:51:44,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338304.3213212, 'message': 'Dec 6 16:51:42 hqnl0246134 sshd[234954]: Failed password for root from 61.177.173.37 port 43642 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 16:51:44,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338304.3225324, 'message': 'Dec 6 16:51:43 hqnl0246134 sshd[234954]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:51:46,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670338306.3216798, 'message': 'Dec 6 16:51:45 hqnl0246134 sshd[234954]: Failed password for root from 61.177.173.37 port 43642 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
WARNING [2022-12-06 16:51:47,396] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:51:47,397] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:51:48,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338308.326243, 'message': 'Dec 6 16:51:47 hqnl0246134 sshd[235005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 16:51:48,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338308.3265502, 'message': 'Dec 6 16:51:47 hqnl0246134 sshd[235005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 16:51:50,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338310.3286884, 'message': 'Dec 6 16:51:48 hqnl0246134 sshd[235005]: Failed password for root from 61.177.173.48 port 58785 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 16:51:50,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338310.3289993, 'message': 'Dec 6 16:51:49 hqnl0246134 sshd[235005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 16:51:52,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338312.3302095, 'message': 'Dec 6 16:51:51 hqnl0246134 sshd[235005]: Failed password for root from 61.177.173.48 port 58785 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
WARNING [2022-12-06 16:51:53,349] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 16:51:54,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338314.3330421, 'message': 'Dec 6 16:51:54 hqnl0246134 sshd[235005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 16:51:56,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338316.3341246, 'message': 'Dec 6 16:51:55 hqnl0246134 sshd[235005]: Failed password for root from 61.177.173.48 port 58785 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:51:58,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338318.336185, 'message': 'Dec 6 16:51:56 hqnl0246134 sshd[235018]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.250.11.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0383 seconds
INFO [2022-12-06 16:51:58,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338318.3367503, 'message': 'Dec 6 16:51:57 hqnl0246134 sshd[235020]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 16:51:58,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338318.336583, 'message': 'Dec 6 16:51:56 hqnl0246134 sshd[235018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.11.181 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 16:51:58,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338318.3369179, 'message': 'Dec 6 16:51:57 hqnl0246134 sshd[235020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 16:52:00,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338320.3412626, 'message': 'Dec 6 16:51:58 hqnl0246134 sshd[235018]: Failed password for root from 103.250.11.181 port 38634 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 16:52:00,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338320.3415587, 'message': 'Dec 6 16:51:59 hqnl0246134 sshd[235020]: Failed password for root from 61.177.173.48 port 30127 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 16:52:00,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338320.3416882, 'message': 'Dec 6 16:52:00 hqnl0246134 sshd[235020]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 16:52:02,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338322.3419664, 'message': 'Dec 6 16:52:00 hqnl0246134 sshd[235022]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 16:52:02,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338322.343339, 'message': 'Dec 6 16:52:01 hqnl0246134 sshd[235020]: Failed password for root from 61.177.173.48 port 30127 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 16:52:02,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338322.3421934, 'message': 'Dec 6 16:52:00 hqnl0246134 sshd[235022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:52:02,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338322.3434575, 'message': 'Dec 6 16:52:02 hqnl0246134 sshd[235022]: Failed password for root from 61.177.173.18 port 37889 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 16:52:04,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338324.3476999, 'message': 'Dec 6 16:52:02 hqnl0246134 sshd[235024]: Invalid user jacky from 103.155.86.96 port 38874', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0583 seconds
INFO [2022-12-06 16:52:04,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338324.34792, 'message': 'Dec 6 16:52:02 hqnl0246134 sshd[235020]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0595 seconds
INFO [2022-12-06 16:52:04,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338324.3484185, 'message': 'Dec 6 16:52:02 hqnl0246134 sshd[235022]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0602 seconds
INFO [2022-12-06 16:52:04,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338324.3481064, 'message': 'Dec 6 16:52:02 hqnl0246134 sshd[235024]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.155.86.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 16:52:04,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338324.3482888, 'message': 'Dec 6 16:52:02 hqnl0246134 sshd[235024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.155.86.96 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 16:52:06,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338326.3502705, 'message': 'Dec 6 16:52:04 hqnl0246134 sshd[235020]: Failed password for root from 61.177.173.48 port 30127 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 16:52:06,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338326.3505394, 'message': 'Dec 6 16:52:04 hqnl0246134 sshd[235024]: Failed password for invalid user jacky from 103.155.86.96 port 38874 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0430 seconds
INFO [2022-12-06 16:52:06,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338326.3506625, 'message': 'Dec 6 16:52:04 hqnl0246134 sshd[235022]: Failed password for root from 61.177.173.18 port 37889 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0432 seconds
INFO [2022-12-06 16:52:06,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338326.3507962, 'message': 'Dec 6 16:52:04 hqnl0246134 sshd[235024]: Disconnected from invalid user jacky 103.155.86.96 port 38874 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 16:52:06,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338326.3508983, 'message': 'Dec 6 16:52:04 hqnl0246134 sshd[235022]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 16:52:08,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338328.3522258, 'message': 'Dec 6 16:52:06 hqnl0246134 sshd[235022]: Failed password for root from 61.177.173.18 port 37889 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 16:52:08,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338328.3524888, 'message': 'Dec 6 16:52:07 hqnl0246134 sshd[235035]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 16:52:08,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338328.3526053, 'message': 'Dec 6 16:52:07 hqnl0246134 sshd[235035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
WARNING [2022-12-06 16:52:08,990] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:52:09,032] defence360agent.internals.the_sink: SensorIncidentList(<16 item(s)>) processed in 0.0547 seconds
INFO [2022-12-06 16:52:10,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338330.3569458, 'message': 'Dec 6 16:52:08 hqnl0246134 sshd[235035]: Failed password for root from 61.177.173.48 port 40598 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 16:52:10,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338330.3572886, 'message': 'Dec 6 16:52:09 hqnl0246134 sshd[235035]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 16:52:12,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338332.3615558, 'message': 'Dec 6 16:52:11 hqnl0246134 sshd[235035]: Failed password for root from 61.177.173.48 port 40598 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 16:52:12,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338332.3617787, 'message': 'Dec 6 16:52:11 hqnl0246134 sshd[235035]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 16:52:14,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670338334.365435, 'message': 'Dec 6 16:52:13 hqnl0246134 sshd[235035]: Failed password for root from 61.177.173.48 port 40598 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 16:52:17,978] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:52:17,979] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:52:17,988] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:52:18,005] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0250 seconds
INFO [2022-12-06 16:52:20,584] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:52:20,584] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:52:20,591] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:52:20,602] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 16:52:36,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338356.4052324, 'message': 'Dec 6 16:52:35 hqnl0246134 sshd[235061]: Invalid user sysadmin from 112.30.163.77 port 58854', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 16:52:36,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338356.4054458, 'message': 'Dec 6 16:52:35 hqnl0246134 sshd[235061]: pam_imunify(sshd:auth): [IM360_RBL] The IP 112.30.163.77 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 16:52:36,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338356.4056437, 'message': 'Dec 6 16:52:35 hqnl0246134 sshd[235061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.163.77 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 16:52:38,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338358.408613, 'message': 'Dec 6 16:52:37 hqnl0246134 sshd[235061]: Failed password for invalid user sysadmin from 112.30.163.77 port 58854 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 16:52:40,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338360.411529, 'message': 'Dec 6 16:52:39 hqnl0246134 sshd[235061]: Disconnected from invalid user sysadmin 112.30.163.77 port 58854 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 16:52:41,763] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:52:41,763] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:52:41,771] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:52:41,784] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 16:52:44,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338364.4168024, 'message': 'Dec 6 16:52:43 hqnl0246134 sshd[235077]: Invalid user test from 103.250.11.181 port 48656', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 16:52:44,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338364.4169874, 'message': 'Dec 6 16:52:43 hqnl0246134 sshd[235077]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.250.11.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 16:52:44,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338364.4171264, 'message': 'Dec 6 16:52:43 hqnl0246134 sshd[235077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.11.181 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 16:52:46,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338366.4185185, 'message': 'Dec 6 16:52:45 hqnl0246134 sshd[235077]: Failed password for invalid user test from 103.250.11.181 port 48656 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 16:52:46,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338366.4189847, 'message': 'Dec 6 16:52:46 hqnl0246134 sshd[235077]: Disconnected from invalid user test 103.250.11.181 port 48656 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 16:52:47,400] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:52:47,401] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:52:54,448] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338374.428696, 'message': 'Dec 6 16:52:53 hqnl0246134 sshd[235081]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 16:52:54,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338374.4289694, 'message': 'Dec 6 16:52:53 hqnl0246134 sshd[235081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 16:52:56,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338376.431516, 'message': 'Dec 6 16:52:55 hqnl0246134 sshd[235081]: Failed password for root from 61.177.173.18 port 35781 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 16:52:58,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338378.4361408, 'message': 'Dec 6 16:52:58 hqnl0246134 sshd[235081]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 16:53:02,472] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338382.4496078, 'message': 'Dec 6 16:53:00 hqnl0246134 sshd[235081]: Failed password for root from 61.177.173.18 port 35781 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 16:53:02,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338382.449918, 'message': 'Dec 6 16:53:02 hqnl0246134 sshd[235081]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:53:06,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338386.4589899, 'message': 'Dec 6 16:53:04 hqnl0246134 sshd[235081]: Failed password for root from 61.177.173.18 port 35781 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 16:53:08,990] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:53:09,017] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0338 seconds
INFO [2022-12-06 16:53:18,106] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:53:18,107] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:53:18,117] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:53:18,131] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
INFO [2022-12-06 16:53:20,970] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:53:20,971] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:53:20,980] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:53:20,993] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 16:53:30,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338410.4956746, 'message': 'Dec 6 16:53:28 hqnl0246134 sshd[235117]: Invalid user leo from 103.250.11.181 port 58674', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 16:53:30,548] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338410.4960215, 'message': 'Dec 6 16:53:28 hqnl0246134 sshd[235117]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.250.11.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 16:53:30,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338410.4962993, 'message': 'Dec 6 16:53:28 hqnl0246134 sshd[235117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.11.181 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 16:53:32,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338412.4974873, 'message': 'Dec 6 16:53:30 hqnl0246134 sshd[235117]: Failed password for invalid user leo from 103.250.11.181 port 58674 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 16:53:34,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.250.11.181', 'timestamp': 1670338414.5011523, 'message': 'Dec 6 16:53:32 hqnl0246134 sshd[235117]: Disconnected from invalid user leo 103.250.11.181 port 58674 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:53:42,537] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338422.5137384, 'message': 'Dec 6 16:53:42 hqnl0246134 sshd[235129]: Invalid user icinga from 185.216.116.113 port 58660', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 16:53:42,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338422.516984, 'message': 'Dec 6 16:53:42 hqnl0246134 sshd[235129]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.216.116.113 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:53:42,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338422.5171373, 'message': 'Dec 6 16:53:42 hqnl0246134 sshd[235129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.116.113 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:53:44,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338424.5164616, 'message': 'Dec 6 16:53:44 hqnl0246134 sshd[235129]: Failed password for invalid user icinga from 185.216.116.113 port 58660 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 16:53:46,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338426.5176225, 'message': 'Dec 6 16:53:45 hqnl0246134 sshd[235132]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0559 seconds
INFO [2022-12-06 16:53:46,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338426.529328, 'message': 'Dec 6 16:53:46 hqnl0246134 sshd[235129]: Disconnected from invalid user icinga 185.216.116.113 port 58660 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0728 seconds
INFO [2022-12-06 16:53:46,632] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338426.5291207, 'message': 'Dec 6 16:53:45 hqnl0246134 sshd[235132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0583 seconds
WARNING [2022-12-06 16:53:47,403] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:53:47,403] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:53:48,540] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338428.5214968, 'message': 'Dec 6 16:53:47 hqnl0246134 sshd[235132]: Failed password for root from 61.177.173.18 port 21759 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 16:53:48,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338428.521711, 'message': 'Dec 6 16:53:47 hqnl0246134 sshd[235132]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 16:53:50,542] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338430.5245202, 'message': 'Dec 6 16:53:50 hqnl0246134 sshd[235132]: Failed password for root from 61.177.173.18 port 21759 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:53:52,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338432.5272949, 'message': 'Dec 6 16:53:52 hqnl0246134 sshd[235132]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 16:53:56,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338436.5335946, 'message': 'Dec 6 16:53:54 hqnl0246134 sshd[235132]: Failed password for root from 61.177.173.18 port 21759 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0447 seconds
INFO [2022-12-06 16:53:59,493] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:53:59,493] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:53:59,501] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:53:59,513] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
WARNING [2022-12-06 16:54:08,996] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:54:09,028] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0412 seconds
INFO [2022-12-06 16:54:12,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338452.54797, 'message': 'Dec 6 16:54:10 hqnl0246134 sshd[235155]: Invalid user fs from 187.243.248.114 port 38610', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 16:54:12,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338452.5486958, 'message': 'Dec 6 16:54:10 hqnl0246134 sshd[235155]: pam_imunify(sshd:auth): [IM360_RBL] The IP 187.243.248.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 16:54:12,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338452.5507808, 'message': 'Dec 6 16:54:10 hqnl0246134 sshd[235155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 16:54:14,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338454.5485542, 'message': 'Dec 6 16:54:13 hqnl0246134 sshd[235155]: Failed password for invalid user fs from 187.243.248.114 port 38610 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0615 seconds
INFO [2022-12-06 16:54:16,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338456.549672, 'message': 'Dec 6 16:54:15 hqnl0246134 sshd[235155]: Disconnected from invalid user fs 187.243.248.114 port 38610 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:54:18,511] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:54:18,511] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:54:18,519] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:54:18,531] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 16:54:21,156] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:54:21,157] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:54:21,166] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:54:21,181] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0233 seconds
INFO [2022-12-06 16:54:24,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338464.559405, 'message': 'Dec 6 16:54:23 hqnl0246134 sshd[235177]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.64.79 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 16:54:24,597] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338464.5596304, 'message': 'Dec 6 16:54:23 hqnl0246134 sshd[235177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.64.79 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 16:54:26,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338466.5617657, 'message': 'Dec 6 16:54:26 hqnl0246134 sshd[235177]: Failed password for root from 51.250.64.79 port 47918 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 16:54:36,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338476.5780294, 'message': 'Dec 6 16:54:36 hqnl0246134 sshd[235181]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 16:54:36,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338476.578312, 'message': 'Dec 6 16:54:36 hqnl0246134 sshd[235181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 16:54:38,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338478.5832012, 'message': 'Dec 6 16:54:38 hqnl0246134 sshd[235181]: Failed password for root from 61.177.173.18 port 61572 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 16:54:40,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338480.5862985, 'message': 'Dec 6 16:54:38 hqnl0246134 sshd[235181]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 16:54:42,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338482.5894282, 'message': 'Dec 6 16:54:40 hqnl0246134 sshd[235181]: Failed password for root from 61.177.173.18 port 61572 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 16:54:44,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338484.5943482, 'message': 'Dec 6 16:54:43 hqnl0246134 sshd[235181]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:54:46,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338486.598153, 'message': 'Dec 6 16:54:44 hqnl0246134 sshd[235181]: Failed password for root from 61.177.173.18 port 61572 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0235 seconds
WARNING [2022-12-06 16:54:47,411] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:54:47,412] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:54:52,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338492.6025786, 'message': 'Dec 6 16:54:51 hqnl0246134 sshd[235199]: Invalid user ubuntu from 138.2.152.212 port 58276', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 16:54:52,654] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338492.6027875, 'message': 'Dec 6 16:54:52 hqnl0246134 sshd[235199]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.2.152.212 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 16:54:52,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338492.6029606, 'message': 'Dec 6 16:54:52 hqnl0246134 sshd[235199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.152.212 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 16:54:54,629] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338494.6047027, 'message': 'Dec 6 16:54:54 hqnl0246134 sshd[235199]: Failed password for invalid user ubuntu from 138.2.152.212 port 58276 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 16:54:56,632] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338496.6109343, 'message': 'Dec 6 16:54:56 hqnl0246134 sshd[235199]: Disconnected from invalid user ubuntu 138.2.152.212 port 58276 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 16:55:02,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.170.55.217', 'timestamp': 1670338502.6222737, 'message': 'Dec 6 16:55:02 hqnl0246134 sshd[235201]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.170.55.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 16:55:02,677] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.170.55.217', 'timestamp': 1670338502.6229846, 'message': 'Dec 6 16:55:02 hqnl0246134 sshd[235201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.170.55.217 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 16:55:04,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.170.55.217', 'timestamp': 1670338504.6246812, 'message': 'Dec 6 16:55:04 hqnl0246134 sshd[235201]: Failed password for root from 103.170.55.217 port 1492 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 16:55:08,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338508.6284761, 'message': 'Dec 6 16:55:07 hqnl0246134 sshd[235225]: Invalid user user3 from 51.250.86.95 port 44690', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:55:08,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338508.6287546, 'message': 'Dec 6 16:55:07 hqnl0246134 sshd[235225]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.86.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:55:08,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338508.6288998, 'message': 'Dec 6 16:55:07 hqnl0246134 sshd[235225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.86.95 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 16:55:08,948] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:55:08,949] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:55:08,956] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:55:08,967] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
WARNING [2022-12-06 16:55:08,998] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:55:09,030] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0405 seconds
INFO [2022-12-06 16:55:10,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338510.6706944, 'message': 'Dec 6 16:55:08 hqnl0246134 sshd[235225]: Failed password for invalid user user3 from 51.250.86.95 port 44690 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0929 seconds
INFO [2022-12-06 16:55:10,785] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338510.671391, 'message': 'Dec 6 16:55:09 hqnl0246134 sshd[235225]: Disconnected from invalid user user3 51.250.86.95 port 44690 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:55:17,906] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:55:17,907] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:55:17,914] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:55:17,926] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 16:55:18,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338518.6421564, 'message': 'Dec 6 16:55:18 hqnl0246134 sshd[235256]: Invalid user jboss from 51.250.64.79 port 59784', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:55:18,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338518.642376, 'message': 'Dec 6 16:55:18 hqnl0246134 sshd[235256]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.64.79 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 16:55:18,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338518.6425042, 'message': 'Dec 6 16:55:18 hqnl0246134 sshd[235256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.64.79 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 16:55:20,456] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:55:20,457] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:55:20,468] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:55:20,485] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0277 seconds
INFO [2022-12-06 16:55:20,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338520.645149, 'message': 'Dec 6 16:55:19 hqnl0246134 sshd[235249]: Invalid user ju from 112.30.163.77 port 59612', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 16:55:20,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338520.6455941, 'message': 'Dec 6 16:55:19 hqnl0246134 sshd[235256]: Failed password for invalid user jboss from 51.250.64.79 port 59784 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 16:55:20,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338520.645374, 'message': 'Dec 6 16:55:19 hqnl0246134 sshd[235249]: pam_imunify(sshd:auth): [IM360_RBL] The IP 112.30.163.77 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 16:55:20,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338520.6456964, 'message': 'Dec 6 16:55:20 hqnl0246134 sshd[235256]: Disconnected from invalid user jboss 51.250.64.79 port 59784 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 16:55:20,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338520.6454897, 'message': 'Dec 6 16:55:19 hqnl0246134 sshd[235249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.163.77 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:55:20,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338520.646072, 'message': 'Dec 6 16:55:20 hqnl0246134 sshd[235249]: Failed password for invalid user ju from 112.30.163.77 port 59612 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 16:55:22,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338522.6486392, 'message': 'Dec 6 16:55:21 hqnl0246134 sshd[235249]: Disconnected from invalid user ju 112.30.163.77 port 59612 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 16:55:32,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338532.6716936, 'message': 'Dec 6 16:55:32 hqnl0246134 sshd[235265]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:55:32,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338532.671999, 'message': 'Dec 6 16:55:32 hqnl0246134 sshd[235265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:55:34,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338534.6751785, 'message': 'Dec 6 16:55:34 hqnl0246134 sshd[235265]: Failed password for root from 61.177.173.18 port 58796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 16:55:36,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338536.6788633, 'message': 'Dec 6 16:55:36 hqnl0246134 sshd[235265]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 16:55:38,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338538.6838202, 'message': 'Dec 6 16:55:38 hqnl0246134 sshd[235265]: Failed password for root from 61.177.173.18 port 58796 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 16:55:40,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338540.6866486, 'message': 'Dec 6 16:55:39 hqnl0246134 sshd[235265]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 16:55:42,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338542.691595, 'message': 'Dec 6 16:55:41 hqnl0246134 sshd[235265]: Failed password for root from 61.177.173.18 port 58796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
WARNING [2022-12-06 16:55:47,416] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:55:47,417] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 16:56:09,003] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:56:09,030] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0357 seconds
INFO [2022-12-06 16:56:12,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338572.7490292, 'message': 'Dec 6 16:56:11 hqnl0246134 sshd[235314]: Invalid user root01 from 165.227.68.95 port 50918', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 16:56:12,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338572.7498684, 'message': 'Dec 6 16:56:11 hqnl0246134 sshd[235321]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.64.79 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 16:56:12,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338572.7495584, 'message': 'Dec 6 16:56:11 hqnl0246134 sshd[235314]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.227.68.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 16:56:12,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338572.7499995, 'message': 'Dec 6 16:56:11 hqnl0246134 sshd[235321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.64.79 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 16:56:12,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338572.7497432, 'message': 'Dec 6 16:56:11 hqnl0246134 sshd[235314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.68.95 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:56:14,793] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338574.7507284, 'message': 'Dec 6 16:56:13 hqnl0246134 sshd[235314]: Failed password for invalid user root01 from 165.227.68.95 port 50918 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 16:56:14,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.250.64.79', 'timestamp': 1670338574.7509127, 'message': 'Dec 6 16:56:13 hqnl0246134 sshd[235321]: Failed password for root from 51.250.64.79 port 43388 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0426 seconds
INFO [2022-12-06 16:56:16,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338576.7533646, 'message': 'Dec 6 16:56:15 hqnl0246134 sshd[235314]: Disconnected from invalid user root01 165.227.68.95 port 50918 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 16:56:17,889] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:56:17,890] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 16:56:17,972] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:56:17,973] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:56:17,984] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 16:56:17,985] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:56:18,005] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1137 seconds
INFO [2022-12-06 16:56:18,005] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0316 seconds
INFO [2022-12-06 16:56:20,705] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:56:20,705] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:56:20,714] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:56:20,726] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 16:56:20,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338580.756382, 'message': 'Dec 6 16:56:20 hqnl0246134 sshd[235340]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:56:22,792] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338582.759783, 'message': 'Dec 6 16:56:20 hqnl0246134 sshd[235340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 16:56:24,782] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338584.7631834, 'message': 'Dec 6 16:56:23 hqnl0246134 sshd[235340]: Failed password for root from 61.177.173.18 port 42358 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:56:26,785] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338586.7655716, 'message': 'Dec 6 16:56:25 hqnl0246134 sshd[235340]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 16:56:28,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338588.7677295, 'message': 'Dec 6 16:56:27 hqnl0246134 sshd[235340]: Failed password for root from 61.177.173.18 port 42358 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 16:56:30,827] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338590.769433, 'message': 'Dec 6 16:56:29 hqnl0246134 sshd[235340]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0579 seconds
INFO [2022-12-06 16:56:32,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338592.7711635, 'message': 'Dec 6 16:56:31 hqnl0246134 sshd[235340]: Failed password for root from 61.177.173.18 port 42358 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 16:56:35,911] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 16:56:35,988] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 16:56:35,989] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 16:56:35,989] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 16:56:35,989] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 16:56:35,989] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 16:56:35,998] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 16:56:36,019] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0286 seconds
WARNING [2022-12-06 16:56:36,026] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 16:56:36,031] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:56:36,051] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0413 seconds
INFO [2022-12-06 16:56:36,053] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0377 seconds
INFO [2022-12-06 16:56:46,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338606.7918007, 'message': 'Dec 6 16:56:45 hqnl0246134 sshd[235362]: Invalid user noc from 49.51.24.192 port 40038', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 16:56:46,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338606.79256, 'message': 'Dec 6 16:56:45 hqnl0246134 sshd[235362]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.51.24.192 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 16:56:46,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338606.792775, 'message': 'Dec 6 16:56:45 hqnl0246134 sshd[235362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.24.192 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-06 16:56:47,420] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:56:47,421] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:56:48,814] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338608.7945545, 'message': 'Dec 6 16:56:47 hqnl0246134 sshd[235362]: Failed password for invalid user noc from 49.51.24.192 port 40038 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 16:56:48,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338608.7947948, 'message': 'Dec 6 16:56:48 hqnl0246134 sshd[235362]: Disconnected from invalid user noc 49.51.24.192 port 40038 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 16:56:52,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.99.59.56', 'timestamp': 1670338612.7991946, 'message': 'Dec 6 16:56:51 hqnl0246134 sshd[235365]: Invalid user administrador from 192.99.59.56 port 56620', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 16:56:52,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '192.99.59.56', 'timestamp': 1670338612.7995155, 'message': 'Dec 6 16:56:51 hqnl0246134 sshd[235365]: pam_imunify(sshd:auth): [IM360_RBL] The IP 192.99.59.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 16:56:52,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '192.99.59.56', 'timestamp': 1670338612.7996905, 'message': 'Dec 6 16:56:51 hqnl0246134 sshd[235365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.59.56 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 16:56:52,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.99.59.56', 'timestamp': 1670338612.7998626, 'message': 'Dec 6 16:56:52 hqnl0246134 sshd[235365]: Failed password for invalid user administrador from 192.99.59.56 port 56620 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 16:56:54,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.99.59.56', 'timestamp': 1670338614.8001645, 'message': 'Dec 6 16:56:53 hqnl0246134 sshd[235365]: Disconnected from invalid user administrador 192.99.59.56 port 56620 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 16:57:04,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338624.8107376, 'message': 'Dec 6 16:57:04 hqnl0246134 sshd[235388]: Invalid user kuku from 51.15.130.203 port 45246', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 16:57:04,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338624.8116415, 'message': 'Dec 6 16:57:04 hqnl0246134 sshd[235388]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.15.130.203 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 16:57:04,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338624.8117702, 'message': 'Dec 6 16:57:04 hqnl0246134 sshd[235388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.130.203 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 16:57:06,836] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338626.8142488, 'message': 'Dec 6 16:57:06 hqnl0246134 sshd[235388]: Failed password for invalid user kuku from 51.15.130.203 port 45246 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 16:57:06,855] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338626.8146348, 'message': 'Dec 6 16:57:06 hqnl0246134 sshd[235388]: Disconnected from invalid user kuku 51.15.130.203 port 45246 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 16:57:09,008] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:57:09,037] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0374 seconds
INFO [2022-12-06 16:57:12,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338632.8230858, 'message': 'Dec 6 16:57:11 hqnl0246134 sshd[235390]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 16:57:12,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338632.8235075, 'message': 'Dec 6 16:57:11 hqnl0246134 sshd[235390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 16:57:14,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338634.8277624, 'message': 'Dec 6 16:57:13 hqnl0246134 sshd[235390]: Failed password for root from 61.177.173.18 port 27484 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 16:57:14,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338634.8280313, 'message': 'Dec 6 16:57:14 hqnl0246134 sshd[235390]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 16:57:16,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338636.8282125, 'message': 'Dec 6 16:57:16 hqnl0246134 sshd[235390]: Failed password for root from 61.177.173.18 port 27484 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 16:57:18,066] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:57:18,066] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 16:57:18,070] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 16:57:18,070] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 16:57:18,071] im360.plugins.client360: Waiting 2 minutes before retry...
WARNING [2022-12-06 16:57:18,078] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:57:18,091] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0226 seconds
INFO [2022-12-06 16:57:18,849] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338638.829626, 'message': 'Dec 6 16:57:18 hqnl0246134 sshd[235390]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 16:57:20,941] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:57:20,941] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:57:20,957] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:57:20,976] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0334 seconds
INFO [2022-12-06 16:57:20,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338640.943632, 'message': 'Dec 6 16:57:20 hqnl0246134 sshd[235390]: Failed password for root from 61.177.173.18 port 27484 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 16:57:24,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.216.40.170', 'timestamp': 1670338644.8349617, 'message': 'Dec 6 16:57:24 hqnl0246134 sshd[235419]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.216.40.170 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 16:57:24,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.216.40.170', 'timestamp': 1670338644.835166, 'message': 'Dec 6 16:57:24 hqnl0246134 sshd[235419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.216.40.170 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 16:57:25,812] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:57:25,812] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:57:25,836] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:57:25,861] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0392 seconds
INFO [2022-12-06 16:57:26,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338646.8357577, 'message': 'Dec 6 16:57:26 hqnl0246134 sshd[235418]: pam_imunify(sshd:auth): [IM360_RBL] The IP 112.30.163.77 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-06 16:57:26,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338646.8359435, 'message': 'Dec 6 16:57:26 hqnl0246134 sshd[235418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.163.77 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 16:57:28,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '189.216.40.170', 'timestamp': 1670338648.8369243, 'message': 'Dec 6 16:57:26 hqnl0246134 sshd[235419]: Failed password for root from 189.216.40.170 port 52016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0513 seconds
INFO [2022-12-06 16:57:28,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338648.8372054, 'message': 'Dec 6 16:57:28 hqnl0246134 sshd[235418]: Failed password for root from 112.30.163.77 port 56684 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0510 seconds
WARNING [2022-12-06 16:57:47,423] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:57:47,425] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:57:58,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338678.8776422, 'message': 'Dec 6 16:57:57 hqnl0246134 sshd[235445]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0399 seconds
INFO [2022-12-06 16:57:58,949] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338678.878649, 'message': 'Dec 6 16:57:57 hqnl0246134 sshd[235445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 16:58:00,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338680.8780556, 'message': 'Dec 6 16:57:58 hqnl0246134 sshd[235445]: Failed password for root from 61.177.172.114 port 16818 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 16:58:00,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338680.878296, 'message': 'Dec 6 16:57:59 hqnl0246134 sshd[235448]: Invalid user test from 103.155.86.96 port 60524', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 16:58:00,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338680.8787756, 'message': 'Dec 6 16:57:59 hqnl0246134 sshd[235445]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 16:58:00,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338680.8784952, 'message': 'Dec 6 16:57:59 hqnl0246134 sshd[235448]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.155.86.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0417 seconds
INFO [2022-12-06 16:58:00,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338680.8786244, 'message': 'Dec 6 16:57:59 hqnl0246134 sshd[235448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.155.86.96 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 16:58:02,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338682.8810701, 'message': 'Dec 6 16:58:01 hqnl0246134 sshd[235448]: Failed password for invalid user test from 103.155.86.96 port 60524 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0498 seconds
INFO [2022-12-06 16:58:02,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338682.8812528, 'message': 'Dec 6 16:58:01 hqnl0246134 sshd[235445]: Failed password for root from 61.177.172.114 port 16818 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0504 seconds
INFO [2022-12-06 16:58:02,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338682.8816843, 'message': 'Dec 6 16:58:02 hqnl0246134 sshd[235454]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0506 seconds
INFO [2022-12-06 16:58:02,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338682.8814332, 'message': 'Dec 6 16:58:01 hqnl0246134 sshd[235448]: Disconnected from invalid user test 103.155.86.96 port 60524 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0431 seconds
INFO [2022-12-06 16:58:02,976] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338682.8815653, 'message': 'Dec 6 16:58:01 hqnl0246134 sshd[235445]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0431 seconds
INFO [2022-12-06 16:58:02,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338682.8818014, 'message': 'Dec 6 16:58:02 hqnl0246134 sshd[235454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-06 16:58:04,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338684.8881392, 'message': 'Dec 6 16:58:04 hqnl0246134 sshd[235445]: Failed password for root from 61.177.172.114 port 16818 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0513 seconds
INFO [2022-12-06 16:58:04,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338684.8884952, 'message': 'Dec 6 16:58:04 hqnl0246134 sshd[235454]: Failed password for root from 61.177.173.18 port 10004 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0510 seconds
INFO [2022-12-06 16:58:06,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338686.889795, 'message': 'Dec 6 16:58:05 hqnl0246134 sshd[235468]: Invalid user appadmin from 138.2.152.212 port 46094', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 16:58:06,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338686.8910308, 'message': 'Dec 6 16:58:06 hqnl0246134 sshd[235454]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0430 seconds
INFO [2022-12-06 16:58:06,958] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338686.8907516, 'message': 'Dec 6 16:58:05 hqnl0246134 sshd[235468]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.2.152.212 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 16:58:06,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338686.8908854, 'message': 'Dec 6 16:58:05 hqnl0246134 sshd[235468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.152.212 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 16:58:08,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338688.8965137, 'message': 'Dec 6 16:58:07 hqnl0246134 sshd[235468]: Failed password for invalid user appadmin from 138.2.152.212 port 46094 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 16:58:08,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338688.8967834, 'message': 'Dec 6 16:58:08 hqnl0246134 sshd[235468]: Disconnected from invalid user appadmin 138.2.152.212 port 46094 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-06 16:58:09,014] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:58:09,044] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0378 seconds
INFO [2022-12-06 16:58:10,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338690.8992152, 'message': 'Dec 6 16:58:09 hqnl0246134 sshd[235454]: Failed password for root from 61.177.173.18 port 10004 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 16:58:10,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338690.8994212, 'message': 'Dec 6 16:58:09 hqnl0246134 sshd[235471]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 16:58:10,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338690.8995893, 'message': 'Dec 6 16:58:09 hqnl0246134 sshd[235471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 16:58:12,976] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338692.9025922, 'message': 'Dec 6 16:58:11 hqnl0246134 sshd[235471]: Failed password for root from 61.177.172.114 port 40495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0714 seconds
INFO [2022-12-06 16:58:12,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338692.903307, 'message': 'Dec 6 16:58:11 hqnl0246134 sshd[235454]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0711 seconds
INFO [2022-12-06 16:58:13,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338692.9036207, 'message': 'Dec 6 16:58:12 hqnl0246134 sshd[235471]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 16:58:13,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338692.9039528, 'message': 'Dec 6 16:58:12 hqnl0246134 sshd[235454]: Failed password for root from 61.177.173.18 port 10004 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 16:58:14,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338694.9075794, 'message': 'Dec 6 16:58:13 hqnl0246134 sshd[235471]: Failed password for root from 61.177.172.114 port 40495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 16:58:14,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338694.907801, 'message': 'Dec 6 16:58:14 hqnl0246134 sshd[235471]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 16:58:16,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338696.9104397, 'message': 'Dec 6 16:58:16 hqnl0246134 sshd[235471]: Failed password for root from 61.177.172.114 port 40495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 16:58:18,414] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:58:18,414] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:58:18,422] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:58:18,433] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 16:58:18,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338698.9121358, 'message': 'Dec 6 16:58:18 hqnl0246134 sshd[235488]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 16:58:18,950] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338698.912463, 'message': 'Dec 6 16:58:18 hqnl0246134 sshd[235488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 16:58:21,242] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:58:21,242] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:58:21,250] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:58:21,267] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0241 seconds
INFO [2022-12-06 16:58:22,796] defence360agent.files: Updating all files
INFO [2022-12-06 16:58:22,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338702.9162176, 'message': 'Dec 6 16:58:20 hqnl0246134 sshd[235488]: Failed password for root from 61.177.172.114 port 64910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 16:58:23,132] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 16:58:23,132] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 16:58:23,486] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 16:58:23,486] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 16:58:23,807] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 16:58:23,808] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 16:58:24,098] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 16:58:24,099] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 16:58:24,099] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 16:58:24,412] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 14:58:24 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E3C33A9353FB6'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 16:58:24,414] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 16:58:24,415] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 16:58:24,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338704.9206512, 'message': 'Dec 6 16:58:23 hqnl0246134 sshd[235488]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:58:24,945] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 16:58:24,945] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 16:58:24,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338704.9208393, 'message': 'Dec 6 16:58:24 hqnl0246134 sshd[235488]: Failed password for root from 61.177.172.114 port 64910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 16:58:25,266] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 16:58:25,266] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 16:58:25,593] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 16:58:25,594] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 16:58:26,066] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 16:58:26,066] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 16:58:26,528] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 16:58:26,529] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 16:58:26,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338706.921747, 'message': 'Dec 6 16:58:25 hqnl0246134 sshd[235488]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 16:58:28,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338708.9244218, 'message': 'Dec 6 16:58:27 hqnl0246134 sshd[235488]: Failed password for root from 61.177.172.114 port 64910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 16:58:32,292] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:58:32,292] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:58:32,303] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:58:32,316] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-06 16:58:32,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338712.9294286, 'message': 'Dec 6 16:58:32 hqnl0246134 sshd[235500]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 16:58:32,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338712.9297035, 'message': 'Dec 6 16:58:32 hqnl0246134 sshd[235500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 16:58:36,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338716.9331224, 'message': 'Dec 6 16:58:35 hqnl0246134 sshd[235500]: Failed password for root from 61.177.172.114 port 59810 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 16:58:36,971] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338716.9334922, 'message': 'Dec 6 16:58:35 hqnl0246134 sshd[235505]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.227.68.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 16:58:36,988] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338716.9336724, 'message': 'Dec 6 16:58:35 hqnl0246134 sshd[235505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.68.95 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 16:58:38,988] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338718.934198, 'message': 'Dec 6 16:58:37 hqnl0246134 sshd[235500]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0529 seconds
INFO [2022-12-06 16:58:38,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338718.9344869, 'message': 'Dec 6 16:58:37 hqnl0246134 sshd[235505]: Failed password for root from 165.227.68.95 port 32974 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0528 seconds
INFO [2022-12-06 16:58:38,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338718.9347286, 'message': 'Dec 6 16:58:37 hqnl0246134 sshd[235508]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.86.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0520 seconds
INFO [2022-12-06 16:58:39,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338718.9349194, 'message': 'Dec 6 16:58:37 hqnl0246134 sshd[235508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.86.95 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:58:40,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338720.9389522, 'message': 'Dec 6 16:58:39 hqnl0246134 sshd[235500]: Failed password for root from 61.177.172.114 port 59810 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 16:58:40,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338720.9393108, 'message': 'Dec 6 16:58:39 hqnl0246134 sshd[235508]: Failed password for root from 51.250.86.95 port 40394 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 16:58:42,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338722.9421344, 'message': 'Dec 6 16:58:41 hqnl0246134 sshd[235500]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 16:58:44,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670338724.9423335, 'message': 'Dec 6 16:58:43 hqnl0246134 sshd[235500]: Failed password for root from 61.177.172.114 port 59810 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
WARNING [2022-12-06 16:58:47,430] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:58:47,431] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:58:56,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338736.955631, 'message': 'Dec 6 16:58:56 hqnl0246134 sshd[235523]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 16:58:57,012] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338736.9562275, 'message': 'Dec 6 16:58:56 hqnl0246134 sshd[235523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 16:58:58,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338738.9563348, 'message': 'Dec 6 16:58:58 hqnl0246134 sshd[235523]: Failed password for root from 61.177.173.18 port 58717 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 16:59:00,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338740.9578123, 'message': 'Dec 6 16:59:00 hqnl0246134 sshd[235523]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 16:59:02,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338742.960527, 'message': 'Dec 6 16:59:02 hqnl0246134 sshd[235523]: Failed password for root from 61.177.173.18 port 58717 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 16:59:04,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338744.9631522, 'message': 'Dec 6 16:59:04 hqnl0246134 sshd[235523]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 16:59:06,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338746.9659545, 'message': 'Dec 6 16:59:06 hqnl0246134 sshd[235523]: Failed password for root from 61.177.173.18 port 58717 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
WARNING [2022-12-06 16:59:09,020] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:59:09,046] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0356 seconds
INFO [2022-12-06 16:59:17,001] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.70.39.68', 'timestamp': 1670338756.9767275, 'message': 'Dec 6 16:59:16 hqnl0246134 sshd[235550]: Invalid user go from 13.70.39.68 port 45014', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 16:59:18,098] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:59:18,099] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:59:18,108] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:59:18,121] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 16:59:19,051] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '13.70.39.68', 'timestamp': 1670338758.9780896, 'message': 'Dec 6 16:59:17 hqnl0246134 sshd[235550]: pam_imunify(sshd:auth): [IM360_RBL] The IP 13.70.39.68 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0720 seconds
INFO [2022-12-06 16:59:19,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338758.9785337, 'message': 'Dec 6 16:59:18 hqnl0246134 sshd[235556]: pam_imunify(sshd:auth): [IM360_RBL] The IP 187.243.248.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0721 seconds
INFO [2022-12-06 16:59:19,082] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '13.70.39.68', 'timestamp': 1670338758.9783442, 'message': 'Dec 6 16:59:17 hqnl0246134 sshd[235550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.70.39.68 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 16:59:19,083] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338758.9786487, 'message': 'Dec 6 16:59:18 hqnl0246134 sshd[235556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 16:59:19,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.70.39.68', 'timestamp': 1670338758.9787574, 'message': 'Dec 6 16:59:18 hqnl0246134 sshd[235550]: Failed password for invalid user go from 13.70.39.68 port 45014 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 16:59:21,019] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.70.39.68', 'timestamp': 1670338760.980067, 'message': 'Dec 6 16:59:20 hqnl0246134 sshd[235550]: Disconnected from invalid user go 13.70.39.68 port 45014 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0391 seconds
INFO [2022-12-06 16:59:21,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338760.9812617, 'message': 'Dec 6 16:59:20 hqnl0246134 sshd[235556]: Failed password for root from 187.243.248.114 port 41202 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-06 16:59:21,149] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:59:21,149] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:59:21,156] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:59:21,170] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 16:59:23,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.226.2', 'timestamp': 1670338762.9833274, 'message': 'Dec 6 16:59:22 hqnl0246134 sshd[235563]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.226.2 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1423 seconds
INFO [2022-12-06 16:59:23,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.226.2', 'timestamp': 1670338762.9843688, 'message': 'Dec 6 16:59:22 hqnl0246134 sshd[235563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 16:59:25,005] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.226.2', 'timestamp': 1670338764.9847565, 'message': 'Dec 6 16:59:24 hqnl0246134 sshd[235563]: Failed password for root from 178.128.226.2 port 57495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 16:59:33,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338772.9898136, 'message': 'Dec 6 16:59:31 hqnl0246134 sshd[235568]: Invalid user andrei from 49.51.24.192 port 57926', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 16:59:33,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338772.9904015, 'message': 'Dec 6 16:59:31 hqnl0246134 sshd[235568]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.51.24.192 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 16:59:33,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338772.9905598, 'message': 'Dec 6 16:59:31 hqnl0246134 sshd[235568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.24.192 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 16:59:35,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338774.9902132, 'message': 'Dec 6 16:59:33 hqnl0246134 sshd[235568]: Failed password for invalid user andrei from 49.51.24.192 port 57926 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 16:59:37,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338776.9909856, 'message': 'Dec 6 16:59:35 hqnl0246134 sshd[235568]: Disconnected from invalid user andrei 49.51.24.192 port 57926 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0770 seconds
INFO [2022-12-06 16:59:37,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338776.9913836, 'message': 'Dec 6 16:59:36 hqnl0246134 sshd[235570]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0769 seconds
INFO [2022-12-06 16:59:37,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338776.9916267, 'message': 'Dec 6 16:59:36 hqnl0246134 sshd[235570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 16:59:38,304] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 16:59:38,305] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 16:59:38,313] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 16:59:38,325] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 16:59:39,011] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338778.9914768, 'message': 'Dec 6 16:59:38 hqnl0246134 sshd[235570]: Failed password for root from 61.177.173.50 port 44949 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 16:59:41,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338780.9944632, 'message': 'Dec 6 16:59:40 hqnl0246134 sshd[235570]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 16:59:43,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338782.9965174, 'message': 'Dec 6 16:59:41 hqnl0246134 sshd[235570]: Failed password for root from 61.177.173.50 port 44949 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 16:59:43,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338782.9968588, 'message': 'Dec 6 16:59:42 hqnl0246134 sshd[235586]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.15.130.203 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 16:59:43,064] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338782.9971867, 'message': 'Dec 6 16:59:42 hqnl0246134 sshd[235570]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 16:59:43,064] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338782.9970667, 'message': 'Dec 6 16:59:42 hqnl0246134 sshd[235586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.130.203 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 16:59:45,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338784.999208, 'message': 'Dec 6 16:59:43 hqnl0246134 sshd[235586]: Failed password for root from 51.15.130.203 port 34918 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 16:59:45,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338784.9995174, 'message': 'Dec 6 16:59:44 hqnl0246134 sshd[235570]: Failed password for root from 61.177.173.50 port 44949 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 16:59:47,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338787.0008273, 'message': 'Dec 6 16:59:45 hqnl0246134 sshd[235589]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 16:59:47,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338787.0012252, 'message': 'Dec 6 16:59:45 hqnl0246134 sshd[235589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
WARNING [2022-12-06 16:59:47,434] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 16:59:47,435] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 16:59:49,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338789.0031917, 'message': 'Dec 6 16:59:47 hqnl0246134 sshd[235589]: Failed password for root from 61.177.173.18 port 36571 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0469 seconds
INFO [2022-12-06 16:59:49,051] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338789.0034103, 'message': 'Dec 6 16:59:47 hqnl0246134 sshd[235591]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 16:59:49,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338789.003562, 'message': 'Dec 6 16:59:47 hqnl0246134 sshd[235591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 16:59:51,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338791.005377, 'message': 'Dec 6 16:59:49 hqnl0246134 sshd[235589]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-06 16:59:51,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338791.005592, 'message': 'Dec 6 16:59:49 hqnl0246134 sshd[235591]: Failed password for root from 61.177.173.50 port 25113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-06 16:59:51,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.80.61', 'timestamp': 1670338791.0063186, 'message': 'Dec 6 16:59:49 hqnl0246134 sshd[235594]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.80.61 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 16:59:51,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338791.0065389, 'message': 'Dec 6 16:59:49 hqnl0246134 sshd[235591]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 16:59:51,076] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.80.61', 'timestamp': 1670338791.0064363, 'message': 'Dec 6 16:59:49 hqnl0246134 sshd[235594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.61 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 16:59:53,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338793.0061383, 'message': 'Dec 6 16:59:51 hqnl0246134 sshd[235589]: Failed password for root from 61.177.173.18 port 36571 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 16:59:53,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.59.80.61', 'timestamp': 1670338793.0063727, 'message': 'Dec 6 16:59:52 hqnl0246134 sshd[235594]: Failed password for root from 139.59.80.61 port 54850 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0477 seconds
INFO [2022-12-06 16:59:53,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338793.0065646, 'message': 'Dec 6 16:59:52 hqnl0246134 sshd[235591]: Failed password for root from 61.177.173.50 port 25113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0475 seconds
INFO [2022-12-06 16:59:55,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338795.0073378, 'message': 'Dec 6 16:59:53 hqnl0246134 sshd[235589]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 16:59:55,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338795.0075364, 'message': 'Dec 6 16:59:54 hqnl0246134 sshd[235591]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 16:59:57,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338797.0179455, 'message': 'Dec 6 16:59:55 hqnl0246134 sshd[235589]: Failed password for root from 61.177.173.18 port 36571 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 16:59:57,057] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670338797.0183496, 'message': 'Dec 6 16:59:56 hqnl0246134 sshd[235591]: Failed password for root from 61.177.173.50 port 25113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-06 17:00:02,952] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 17:00:03,036] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 17:00:03,037] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 17:00:03,037] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 17:00:03,037] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 17:00:03,049] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 17:00:03,089] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 17:00:03,129] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0787 seconds
WARNING [2022-12-06 17:00:03,151] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 17:00:03,155] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:00:03,206] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0931 seconds
INFO [2022-12-06 17:00:03,208] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0910 seconds
INFO [2022-12-06 17:00:05,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338805.0209916, 'message': 'Dec 6 17:00:03 hqnl0246134 sshd[235648]: Invalid user sysadmin from 185.216.116.113 port 46530', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 17:00:05,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338805.0211878, 'message': 'Dec 6 17:00:03 hqnl0246134 sshd[235648]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.216.116.113 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 17:00:05,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338805.021304, 'message': 'Dec 6 17:00:03 hqnl0246134 sshd[235648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.116.113 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 17:00:05,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338805.0214107, 'message': 'Dec 6 17:00:04 hqnl0246134 sshd[235648]: Failed password for invalid user sysadmin from 185.216.116.113 port 46530 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 17:00:07,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338807.023836, 'message': 'Dec 6 17:00:05 hqnl0246134 sshd[235648]: Disconnected from invalid user sysadmin 185.216.116.113 port 46530 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 17:00:07,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.152.105', 'timestamp': 1670338807.0241566, 'message': 'Dec 6 17:00:06 hqnl0246134 sshd[235656]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.152.105 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 17:00:07,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.152.105', 'timestamp': 1670338807.0246024, 'message': 'Dec 6 17:00:06 hqnl0246134 sshd[235656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.152.105 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0304 seconds
WARNING [2022-12-06 17:00:09,032] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:00:09,081] defence360agent.internals.the_sink: SensorIncidentList(<30 item(s)>) processed in 0.0662 seconds
INFO [2022-12-06 17:00:09,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '128.199.152.105', 'timestamp': 1670338809.025484, 'message': 'Dec 6 17:00:08 hqnl0246134 sshd[235656]: Failed password for root from 128.199.152.105 port 38466 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0597 seconds
INFO [2022-12-06 17:00:13,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.122.106.117', 'timestamp': 1670338813.0309517, 'message': 'Dec 6 17:00:11 hqnl0246134 sshd[235663]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.122.106.117 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 17:00:13,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.122.106.117', 'timestamp': 1670338813.0313125, 'message': 'Dec 6 17:00:11 hqnl0246134 sshd[235663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.106.117 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 17:00:15,051] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '134.122.106.117', 'timestamp': 1670338815.032982, 'message': 'Dec 6 17:00:13 hqnl0246134 sshd[235663]: Failed password for root from 134.122.106.117 port 57546 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:00:17,993] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:00:17,993] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:00:18,001] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:00:18,014] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 17:00:20,804] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:00:20,805] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:00:20,812] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:00:20,825] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 17:00:25,058] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.216.40.170', 'timestamp': 1670338825.0396316, 'message': 'Dec 6 17:00:25 hqnl0246134 sshd[235691]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.216.40.170 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:00:25,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.216.40.170', 'timestamp': 1670338825.0398462, 'message': 'Dec 6 17:00:25 hqnl0246134 sshd[235691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.216.40.170 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 17:00:29,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '189.216.40.170', 'timestamp': 1670338829.0403094, 'message': 'Dec 6 17:00:27 hqnl0246134 sshd[235691]: Failed password for root from 189.216.40.170 port 40562 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:00:34,974] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 17:00:34,975] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 17:00:34,977] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 17:00:39,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.31.17.98', 'timestamp': 1670338839.048608, 'message': 'Dec 6 17:00:37 hqnl0246134 sshd[235704]: Invalid user oracle from 123.31.17.98 port 41898', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-06 17:00:39,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338839.049379, 'message': 'Dec 6 17:00:38 hqnl0246134 sshd[235706]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 17:00:39,125] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '123.31.17.98', 'timestamp': 1670338839.0489802, 'message': 'Dec 6 17:00:37 hqnl0246134 sshd[235704]: pam_imunify(sshd:auth): [IM360_RBL] The IP 123.31.17.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 17:00:39,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338839.0495977, 'message': 'Dec 6 17:00:38 hqnl0246134 sshd[235706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 17:00:39,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '123.31.17.98', 'timestamp': 1670338839.0492005, 'message': 'Dec 6 17:00:37 hqnl0246134 sshd[235704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.17.98 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 17:00:41,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.31.17.98', 'timestamp': 1670338841.0496697, 'message': 'Dec 6 17:00:39 hqnl0246134 sshd[235704]: Failed password for invalid user oracle from 123.31.17.98 port 41898 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 17:00:41,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338841.049966, 'message': 'Dec 6 17:00:40 hqnl0246134 sshd[235706]: Failed password for root from 61.177.173.18 port 29467 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 17:00:41,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338841.0501142, 'message': 'Dec 6 17:00:40 hqnl0246134 sshd[235706]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 17:00:43,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.31.17.98', 'timestamp': 1670338843.0535066, 'message': 'Dec 6 17:00:41 hqnl0246134 sshd[235704]: Disconnected from invalid user oracle 123.31.17.98 port 41898 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-06 17:00:43,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338843.0539129, 'message': 'Dec 6 17:00:42 hqnl0246134 sshd[235706]: Failed password for root from 61.177.173.18 port 29467 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 17:00:43,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338843.0540473, 'message': 'Dec 6 17:00:43 hqnl0246134 sshd[235706]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:00:47,088] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338847.0578885, 'message': 'Dec 6 17:00:45 hqnl0246134 sshd[235706]: Failed password for root from 61.177.173.18 port 29467 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 17:00:47,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338847.0581741, 'message': 'Dec 6 17:00:46 hqnl0246134 sshd[235719]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.2.152.212 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 17:00:47,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338847.058333, 'message': 'Dec 6 17:00:46 hqnl0246134 sshd[235719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.152.212 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
WARNING [2022-12-06 17:00:47,438] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:00:47,438] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:00:49,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.2.152.212', 'timestamp': 1670338849.0578837, 'message': 'Dec 6 17:00:48 hqnl0246134 sshd[235719]: Failed password for root from 138.2.152.212 port 34716 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:00:51,938] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:00:51,939] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:00:51,950] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:00:51,963] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-06 17:00:53,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338853.0664032, 'message': 'Dec 6 17:00:52 hqnl0246134 sshd[235728]: Invalid user cubrid from 103.155.86.96 port 49538', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 17:00:53,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338853.0668633, 'message': 'Dec 6 17:00:52 hqnl0246134 sshd[235728]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.155.86.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:00:53,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338853.0669708, 'message': 'Dec 6 17:00:52 hqnl0246134 sshd[235728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.155.86.96 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:00:55,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338855.0702133, 'message': 'Dec 6 17:00:54 hqnl0246134 sshd[235732]: pam_imunify(sshd:auth): [IM360_RBL] The IP 112.30.163.77 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 17:00:55,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338855.0706007, 'message': 'Dec 6 17:00:54 hqnl0246134 sshd[235728]: Failed password for invalid user cubrid from 103.155.86.96 port 49538 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 17:00:55,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338855.070424, 'message': 'Dec 6 17:00:54 hqnl0246134 sshd[235732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.163.77 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 17:00:57,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.155.86.96', 'timestamp': 1670338857.072802, 'message': 'Dec 6 17:00:55 hqnl0246134 sshd[235728]: Disconnected from invalid user cubrid 103.155.86.96 port 49538 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 17:00:57,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '112.30.163.77', 'timestamp': 1670338857.0730467, 'message': 'Dec 6 17:00:56 hqnl0246134 sshd[235732]: Failed password for root from 112.30.163.77 port 53762 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 17:01:07,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338867.0900981, 'message': 'Dec 6 17:01:06 hqnl0246134 sshd[235744]: Invalid user dave from 165.227.68.95 port 43634', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 17:01:07,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338867.0903418, 'message': 'Dec 6 17:01:06 hqnl0246134 sshd[235744]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.227.68.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 17:01:07,151] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338867.090505, 'message': 'Dec 6 17:01:06 hqnl0246134 sshd[235744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.68.95 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 17:01:09,033] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:01:09,073] defence360agent.internals.the_sink: SensorIncidentList(<25 item(s)>) processed in 0.0521 seconds
INFO [2022-12-06 17:01:09,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338869.093022, 'message': 'Dec 6 17:01:07 hqnl0246134 sshd[235744]: Failed password for invalid user dave from 165.227.68.95 port 43634 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:01:09,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.68.95', 'timestamp': 1670338869.0931933, 'message': 'Dec 6 17:01:08 hqnl0246134 sshd[235744]: Disconnected from invalid user dave 165.227.68.95 port 43634 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 17:01:11,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.60.127', 'timestamp': 1670338871.096423, 'message': 'Dec 6 17:01:10 hqnl0246134 sshd[235747]: Invalid user test from 43.153.60.127 port 60162', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 17:01:13,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.60.127', 'timestamp': 1670338873.1007063, 'message': 'Dec 6 17:01:11 hqnl0246134 sshd[235747]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.60.127 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 17:01:13,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.60.127', 'timestamp': 1670338873.1010754, 'message': 'Dec 6 17:01:11 hqnl0246134 sshd[235747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.60.127 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 17:01:15,136] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.60.127', 'timestamp': 1670338875.1022758, 'message': 'Dec 6 17:01:13 hqnl0246134 sshd[235747]: Failed password for invalid user test from 43.153.60.127 port 60162 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 17:01:17,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.60.127', 'timestamp': 1670338877.10452, 'message': 'Dec 6 17:01:15 hqnl0246134 sshd[235747]: Disconnected from invalid user test 43.153.60.127 port 60162 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 17:01:18,082] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:01:18,083] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:01:18,090] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:01:18,101] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 17:01:20,829] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:01:20,830] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:01:20,838] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:01:20,850] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 17:01:27,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338887.118695, 'message': 'Dec 6 17:01:25 hqnl0246134 sshd[235768]: Invalid user xm from 51.250.86.95 port 57036', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 17:01:27,157] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338887.1189954, 'message': 'Dec 6 17:01:25 hqnl0246134 sshd[235768]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.86.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 17:01:27,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338887.1191216, 'message': 'Dec 6 17:01:25 hqnl0246134 sshd[235768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.86.95 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 17:01:29,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338889.129289, 'message': 'Dec 6 17:01:28 hqnl0246134 sshd[235768]: Failed password for invalid user xm from 51.250.86.95 port 57036 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 17:01:29,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338889.1305757, 'message': 'Dec 6 17:01:28 hqnl0246134 sshd[235770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0383 seconds
INFO [2022-12-06 17:01:29,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.86.95', 'timestamp': 1670338889.1296122, 'message': 'Dec 6 17:01:28 hqnl0246134 sshd[235768]: Disconnected from invalid user xm 51.250.86.95 port 57036 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 17:01:29,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338889.130688, 'message': 'Dec 6 17:01:28 hqnl0246134 sshd[235770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 17:01:31,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338891.1330857, 'message': 'Dec 6 17:01:30 hqnl0246134 sshd[235770]: Failed password for root from 61.177.173.18 port 60648 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 17:01:33,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338893.1395679, 'message': 'Dec 6 17:01:32 hqnl0246134 sshd[235770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 17:01:35,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.99.59.56', 'timestamp': 1670338895.1438527, 'message': 'Dec 6 17:01:33 hqnl0246134 sshd[235776]: Invalid user maria from 192.99.59.56 port 36238', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0532 seconds
INFO [2022-12-06 17:01:35,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670338895.1449306, 'message': 'Dec 6 17:01:34 hqnl0246134 sshd[235778]: Invalid user lzh from 201.236.186.32 port 55780', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0545 seconds
INFO [2022-12-06 17:01:35,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338895.1451452, 'message': 'Dec 6 17:01:34 hqnl0246134 sshd[235770]: Failed password for root from 61.177.173.18 port 60648 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0557 seconds
INFO [2022-12-06 17:01:35,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '192.99.59.56', 'timestamp': 1670338895.144379, 'message': 'Dec 6 17:01:33 hqnl0246134 sshd[235776]: pam_imunify(sshd:auth): [IM360_RBL] The IP 192.99.59.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0495 seconds
INFO [2022-12-06 17:01:35,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.236.186.32', 'timestamp': 1670338895.1453505, 'message': 'Dec 6 17:01:34 hqnl0246134 sshd[235778]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.236.186.32 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0471 seconds
INFO [2022-12-06 17:01:35,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '192.99.59.56', 'timestamp': 1670338895.1447434, 'message': 'Dec 6 17:01:33 hqnl0246134 sshd[235776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.59.56 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 17:01:35,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.236.186.32', 'timestamp': 1670338895.1455476, 'message': 'Dec 6 17:01:34 hqnl0246134 sshd[235778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.186.32 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 17:01:35,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.99.59.56', 'timestamp': 1670338895.1457357, 'message': 'Dec 6 17:01:35 hqnl0246134 sshd[235776]: Failed password for invalid user maria from 192.99.59.56 port 36238 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:01:37,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670338897.146145, 'message': 'Dec 6 17:01:36 hqnl0246134 sshd[235778]: Failed password for invalid user lzh from 201.236.186.32 port 55780 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0499 seconds
INFO [2022-12-06 17:01:37,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.99.59.56', 'timestamp': 1670338897.146483, 'message': 'Dec 6 17:01:36 hqnl0246134 sshd[235776]: Disconnected from invalid user maria 192.99.59.56 port 36238 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0502 seconds
INFO [2022-12-06 17:01:37,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338897.1466143, 'message': 'Dec 6 17:01:37 hqnl0246134 sshd[235770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0501 seconds
INFO [2022-12-06 17:01:39,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670338899.1496587, 'message': 'Dec 6 17:01:37 hqnl0246134 sshd[235778]: Disconnected from invalid user lzh 201.236.186.32 port 55780 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 17:01:41,169] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338901.1505141, 'message': 'Dec 6 17:01:39 hqnl0246134 sshd[235770]: Failed password for root from 61.177.173.18 port 60648 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 17:01:47,441] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:01:47,443] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 17:01:53,352] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 17:01:55,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.226.2', 'timestamp': 1670338915.1688666, 'message': 'Dec 6 17:01:53 hqnl0246134 sshd[235793]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.226.2 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 17:01:55,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.226.2', 'timestamp': 1670338915.1694028, 'message': 'Dec 6 17:01:53 hqnl0246134 sshd[235793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:01:57,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.226.2', 'timestamp': 1670338917.171684, 'message': 'Dec 6 17:01:55 hqnl0246134 sshd[235793]: Failed password for root from 178.128.226.2 port 47218 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 17:02:00,433] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:02:00,434] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:02:00,441] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:02:00,452] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
WARNING [2022-12-06 17:02:09,588] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:02:09,615] defence360agent.internals.the_sink: SensorIncidentList(<19 item(s)>) processed in 0.5917 seconds
INFO [2022-12-06 17:02:13,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338933.2012298, 'message': 'Dec 6 17:02:12 hqnl0246134 sshd[235816]: Invalid user web from 187.243.248.114 port 47748', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 17:02:13,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338933.2016232, 'message': 'Dec 6 17:02:12 hqnl0246134 sshd[235816]: pam_imunify(sshd:auth): [IM360_RBL] The IP 187.243.248.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 17:02:13,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338933.2017899, 'message': 'Dec 6 17:02:12 hqnl0246134 sshd[235816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 17:02:15,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338935.2015152, 'message': 'Dec 6 17:02:14 hqnl0246134 sshd[235816]: Failed password for invalid user web from 187.243.248.114 port 47748 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 17:02:17,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '187.243.248.114', 'timestamp': 1670338937.205031, 'message': 'Dec 6 17:02:16 hqnl0246134 sshd[235816]: Disconnected from invalid user web 187.243.248.114 port 47748 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 17:02:18,086] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:02:18,087] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:02:18,097] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:02:18,111] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0229 seconds
INFO [2022-12-06 17:02:20,756] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:02:20,756] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:02:20,764] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:02:20,775] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 17:02:21,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338941.2077165, 'message': 'Dec 6 17:02:20 hqnl0246134 sshd[235834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:02:21,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338941.2079067, 'message': 'Dec 6 17:02:20 hqnl0246134 sshd[235834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 17:02:23,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338943.2100532, 'message': 'Dec 6 17:02:22 hqnl0246134 sshd[235834]: Failed password for root from 61.177.173.18 port 43596 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 17:02:23,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338943.212978, 'message': 'Dec 6 17:02:23 hqnl0246134 sshd[235834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 17:02:27,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338947.2158678, 'message': 'Dec 6 17:02:25 hqnl0246134 sshd[235834]: Failed password for root from 61.177.173.18 port 43596 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 17:02:27,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338947.2161298, 'message': 'Dec 6 17:02:26 hqnl0246134 sshd[235841]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.15.130.203 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 17:02:27,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338947.2163343, 'message': 'Dec 6 17:02:26 hqnl0246134 sshd[235841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.130.203 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 17:02:29,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338949.2177744, 'message': 'Dec 6 17:02:27 hqnl0246134 sshd[235834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 17:02:29,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.15.130.203', 'timestamp': 1670338949.2181542, 'message': 'Dec 6 17:02:28 hqnl0246134 sshd[235841]: Failed password for root from 51.15.130.203 port 52834 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 17:02:31,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338951.21908, 'message': 'Dec 6 17:02:29 hqnl0246134 sshd[235834]: Failed password for root from 61.177.173.18 port 43596 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 17:02:47,445] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:02:47,447] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:02:55,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338975.251086, 'message': 'Dec 6 17:02:54 hqnl0246134 sshd[235857]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.216.116.113 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 17:02:55,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338975.251838, 'message': 'Dec 6 17:02:54 hqnl0246134 sshd[235857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.116.113 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:02:57,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '185.216.116.113', 'timestamp': 1670338977.2527366, 'message': 'Dec 6 17:02:56 hqnl0246134 sshd[235857]: Failed password for root from 185.216.116.113 port 58722 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
WARNING [2022-12-06 17:03:09,036] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:03:09,066] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0409 seconds
INFO [2022-12-06 17:03:13,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338993.2739906, 'message': 'Dec 6 17:03:12 hqnl0246134 sshd[235871]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 17:03:13,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338993.2743707, 'message': 'Dec 6 17:03:12 hqnl0246134 sshd[235871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:03:17,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338997.2767196, 'message': 'Dec 6 17:03:15 hqnl0246134 sshd[235871]: Failed password for root from 61.177.173.18 port 34156 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 17:03:17,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338997.2770522, 'message': 'Dec 6 17:03:17 hqnl0246134 sshd[235871]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 17:03:18,330] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:03:18,331] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:03:18,339] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:03:18,358] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0256 seconds
INFO [2022-12-06 17:03:19,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338999.2821808, 'message': 'Dec 6 17:03:17 hqnl0246134 sshd[235883]: Invalid user svnuser from 49.51.24.192 port 47654', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0560 seconds
INFO [2022-12-06 17:03:19,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670338999.2854211, 'message': 'Dec 6 17:03:18 hqnl0246134 sshd[235871]: Failed password for root from 61.177.173.18 port 34156 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-06 17:03:19,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338999.2827313, 'message': 'Dec 6 17:03:17 hqnl0246134 sshd[235883]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.51.24.192 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 17:03:19,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.51.24.192', 'timestamp': 1670338999.285157, 'message': 'Dec 6 17:03:17 hqnl0246134 sshd[235883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.24.192 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 17:03:21,053] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:03:21,054] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:03:21,060] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:03:21,072] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 17:03:21,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339001.2832348, 'message': 'Dec 6 17:03:19 hqnl0246134 sshd[235871]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 17:03:21,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670339001.2835162, 'message': 'Dec 6 17:03:19 hqnl0246134 sshd[235883]: Failed password for invalid user svnuser from 49.51.24.192 port 47654 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 17:03:21,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339001.2836838, 'message': 'Dec 6 17:03:20 hqnl0246134 sshd[235871]: Failed password for root from 61.177.173.18 port 34156 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 17:03:21,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670339001.283819, 'message': 'Dec 6 17:03:21 hqnl0246134 sshd[235883]: Disconnected from invalid user svnuser 49.51.24.192 port 47654 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 17:03:23,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.152.105', 'timestamp': 1670339003.2849083, 'message': 'Dec 6 17:03:22 hqnl0246134 sshd[235894]: Invalid user student from 128.199.152.105 port 53602', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 17:03:23,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.152.105', 'timestamp': 1670339003.285253, 'message': 'Dec 6 17:03:22 hqnl0246134 sshd[235894]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.152.105 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:03:23,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.152.105', 'timestamp': 1670339003.285374, 'message': 'Dec 6 17:03:22 hqnl0246134 sshd[235894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.152.105 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 17:03:23,719] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:03:23,719] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:03:23,727] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:03:23,738] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 17:03:25,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.152.105', 'timestamp': 1670339005.2862048, 'message': 'Dec 6 17:03:24 hqnl0246134 sshd[235894]: Failed password for invalid user student from 128.199.152.105 port 53602 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 17:03:25,328] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.152.105', 'timestamp': 1670339005.2888513, 'message': 'Dec 6 17:03:24 hqnl0246134 sshd[235894]: Disconnected from invalid user student 128.199.152.105 port 53602 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 17:03:27,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.2.152.212', 'timestamp': 1670339007.2867115, 'message': 'Dec 6 17:03:26 hqnl0246134 sshd[235923]: Invalid user mcserver from 138.2.152.212 port 34210', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 17:03:27,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.2.152.212', 'timestamp': 1670339007.286992, 'message': 'Dec 6 17:03:26 hqnl0246134 sshd[235923]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.2.152.212 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:03:27,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.2.152.212', 'timestamp': 1670339007.2871315, 'message': 'Dec 6 17:03:26 hqnl0246134 sshd[235923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.152.212 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 17:03:29,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.2.152.212', 'timestamp': 1670339009.289841, 'message': 'Dec 6 17:03:28 hqnl0246134 sshd[235923]: Failed password for invalid user mcserver from 138.2.152.212 port 34210 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 17:03:31,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.216.40.170', 'timestamp': 1670339011.2901537, 'message': 'Dec 6 17:03:30 hqnl0246134 sshd[235925]: Invalid user ftptest from 189.216.40.170 port 57326', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0395 seconds
INFO [2022-12-06 17:03:31,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.2.152.212', 'timestamp': 1670339011.2905936, 'message': 'Dec 6 17:03:30 hqnl0246134 sshd[235923]: Disconnected from invalid user mcserver 138.2.152.212 port 34210 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 17:03:31,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.216.40.170', 'timestamp': 1670339011.2903266, 'message': 'Dec 6 17:03:30 hqnl0246134 sshd[235925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.216.40.170 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 17:03:31,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.216.40.170', 'timestamp': 1670339011.290438, 'message': 'Dec 6 17:03:30 hqnl0246134 sshd[235925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.216.40.170 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:03:33,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.216.40.170', 'timestamp': 1670339013.2927825, 'message': 'Dec 6 17:03:31 hqnl0246134 sshd[235925]: Failed password for invalid user ftptest from 189.216.40.170 port 57326 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 17:03:35,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.216.40.170', 'timestamp': 1670339015.2947543, 'message': 'Dec 6 17:03:33 hqnl0246134 sshd[235925]: Disconnected from invalid user ftptest 189.216.40.170 port 57326 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0568 seconds
INFO [2022-12-06 17:03:35,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339015.2950637, 'message': 'Dec 6 17:03:35 hqnl0246134 sshd[235928]: Invalid user yan from 101.226.253.162 port 35347', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0568 seconds
INFO [2022-12-06 17:03:37,314] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339017.2955458, 'message': 'Dec 6 17:03:35 hqnl0246134 sshd[235928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.226.253.162 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 17:03:39,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339019.2977362, 'message': 'Dec 6 17:03:37 hqnl0246134 sshd[235928]: Failed password for invalid user yan from 101.226.253.162 port 35347 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 17:03:41,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339021.3002138, 'message': 'Dec 6 17:03:40 hqnl0246134 sshd[235928]: Disconnected from invalid user yan 101.226.253.162 port 35347 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 17:03:41,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339021.3003857, 'message': 'Dec 6 17:03:41 hqnl0246134 sshd[235933]: Invalid user alfresco from 134.122.106.117 port 57806', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 17:03:41,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339021.3005736, 'message': 'Dec 6 17:03:41 hqnl0246134 sshd[235933]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.122.106.117 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:03:41,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339021.3006794, 'message': 'Dec 6 17:03:41 hqnl0246134 sshd[235933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.106.117 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:03:43,324] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339023.302083, 'message': 'Dec 6 17:03:42 hqnl0246134 sshd[235933]: Failed password for invalid user alfresco from 134.122.106.117 port 57806 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 17:03:43,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339023.3024247, 'message': 'Dec 6 17:03:42 hqnl0246134 sshd[235933]: Disconnected from invalid user alfresco 134.122.106.117 port 57806 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-06 17:03:47,451] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:03:47,453] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:03:49,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.155.86.96', 'timestamp': 1670339029.3089998, 'message': 'Dec 6 17:03:48 hqnl0246134 sshd[235945]: Invalid user adminuser from 103.155.86.96 port 38550', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 17:03:49,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339029.3094606, 'message': 'Dec 6 17:03:48 hqnl0246134 sshd[235947]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 17:03:49,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.155.86.96', 'timestamp': 1670339029.3092387, 'message': 'Dec 6 17:03:48 hqnl0246134 sshd[235945]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.155.86.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 17:03:49,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339029.309627, 'message': 'Dec 6 17:03:48 hqnl0246134 sshd[235947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 17:03:49,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.155.86.96', 'timestamp': 1670339029.309354, 'message': 'Dec 6 17:03:48 hqnl0246134 sshd[235945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.155.86.96 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:03:51,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.155.86.96', 'timestamp': 1670339031.3122747, 'message': 'Dec 6 17:03:50 hqnl0246134 sshd[235945]: Failed password for invalid user adminuser from 103.155.86.96 port 38550 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 17:03:51,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339031.3125298, 'message': 'Dec 6 17:03:50 hqnl0246134 sshd[235947]: Failed password for root from 61.177.173.36 port 30507 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 17:03:53,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.155.86.96', 'timestamp': 1670339033.3147643, 'message': 'Dec 6 17:03:51 hqnl0246134 sshd[235945]: Disconnected from invalid user adminuser 103.155.86.96 port 38550 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 17:03:53,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339033.3170943, 'message': 'Dec 6 17:03:52 hqnl0246134 sshd[235947]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 17:03:55,337] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339035.317133, 'message': 'Dec 6 17:03:54 hqnl0246134 sshd[235947]: Failed password for root from 61.177.173.36 port 30507 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 17:03:55,361] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339035.3210132, 'message': 'Dec 6 17:03:55 hqnl0246134 sshd[235947]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 17:03:57,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.60.127', 'timestamp': 1670339037.3189318, 'message': 'Dec 6 17:03:56 hqnl0246134 sshd[235950]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.60.127 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 17:03:57,359] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.60.127', 'timestamp': 1670339037.3192348, 'message': 'Dec 6 17:03:56 hqnl0246134 sshd[235950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.60.127 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:03:59,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339039.3197885, 'message': 'Dec 6 17:03:57 hqnl0246134 sshd[235947]: Failed password for root from 61.177.173.36 port 30507 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 17:03:59,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.60.127', 'timestamp': 1670339039.320007, 'message': 'Dec 6 17:03:58 hqnl0246134 sshd[235950]: Failed password for root from 43.153.60.127 port 44422 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 17:04:01,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339041.3919406, 'message': 'Dec 6 17:04:01 hqnl0246134 sshd[235953]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 17:04:01,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339041.3921182, 'message': 'Dec 6 17:04:01 hqnl0246134 sshd[235953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 17:04:03,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339043.3239913, 'message': 'Dec 6 17:04:03 hqnl0246134 sshd[235953]: Failed password for root from 61.177.173.36 port 23975 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 17:04:05,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339045.3263412, 'message': 'Dec 6 17:04:03 hqnl0246134 sshd[235953]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0481 seconds
INFO [2022-12-06 17:04:05,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339045.3265615, 'message': 'Dec 6 17:04:03 hqnl0246134 sshd[235962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0485 seconds
INFO [2022-12-06 17:04:05,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339045.32686, 'message': 'Dec 6 17:04:03 hqnl0246134 sshd[235964]: pam_imunify(sshd:auth): [IM360_RBL] The IP 13.70.39.68 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-06 17:04:05,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339045.3267312, 'message': 'Dec 6 17:04:03 hqnl0246134 sshd[235962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0642 seconds
INFO [2022-12-06 17:04:05,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '192.99.59.56', 'timestamp': 1670339045.3271096, 'message': 'Dec 6 17:04:03 hqnl0246134 sshd[235966]: pam_imunify(sshd:auth): [IM360_RBL] The IP 192.99.59.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0647 seconds
INFO [2022-12-06 17:04:05,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339045.3269792, 'message': 'Dec 6 17:04:03 hqnl0246134 sshd[235964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.70.39.68 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0646 seconds
INFO [2022-12-06 17:04:05,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339045.3273716, 'message': 'Dec 6 17:04:05 hqnl0246134 sshd[235953]: Failed password for root from 61.177.173.36 port 23975 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0652 seconds
INFO [2022-12-06 17:04:05,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '192.99.59.56', 'timestamp': 1670339045.3272514, 'message': 'Dec 6 17:04:03 hqnl0246134 sshd[235966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.59.56 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0453 seconds
INFO [2022-12-06 17:04:05,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339045.327513, 'message': 'Dec 6 17:04:05 hqnl0246134 sshd[235962]: Failed password for root from 61.177.173.18 port 19468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-06 17:04:05,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339045.3276336, 'message': 'Dec 6 17:04:05 hqnl0246134 sshd[235964]: Failed password for root from 13.70.39.68 port 54574 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0446 seconds
INFO [2022-12-06 17:04:07,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '192.99.59.56', 'timestamp': 1670339047.3294313, 'message': 'Dec 6 17:04:05 hqnl0246134 sshd[235966]: Failed password for root from 192.99.59.56 port 49450 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0647 seconds
INFO [2022-12-06 17:04:07,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339047.3296802, 'message': 'Dec 6 17:04:05 hqnl0246134 sshd[235953]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0652 seconds
INFO [2022-12-06 17:04:07,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339047.3298318, 'message': 'Dec 6 17:04:05 hqnl0246134 sshd[235962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0655 seconds
INFO [2022-12-06 17:04:07,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.31.17.98', 'timestamp': 1670339047.3299565, 'message': 'Dec 6 17:04:05 hqnl0246134 sshd[235968]: Invalid user sami from 123.31.17.98 port 57072', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0654 seconds
INFO [2022-12-06 17:04:07,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.226.2', 'timestamp': 1670339047.3303604, 'message': 'Dec 6 17:04:07 hqnl0246134 sshd[235971]: Invalid user ali from 178.128.226.2 port 36937', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 17:04:07,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '123.31.17.98', 'timestamp': 1670339047.3300931, 'message': 'Dec 6 17:04:05 hqnl0246134 sshd[235968]: pam_imunify(sshd:auth): [IM360_RBL] The IP 123.31.17.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 17:04:07,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.226.2', 'timestamp': 1670339047.3304634, 'message': 'Dec 6 17:04:07 hqnl0246134 sshd[235971]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.226.2 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0461 seconds
INFO [2022-12-06 17:04:07,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '123.31.17.98', 'timestamp': 1670339047.3302538, 'message': 'Dec 6 17:04:05 hqnl0246134 sshd[235968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.17.98 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0464 seconds
INFO [2022-12-06 17:04:07,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339047.3306875, 'message': 'Dec 6 17:04:07 hqnl0246134 sshd[235953]: Failed password for root from 61.177.173.36 port 23975 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0464 seconds
INFO [2022-12-06 17:04:07,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.226.2', 'timestamp': 1670339047.3305843, 'message': 'Dec 6 17:04:07 hqnl0246134 sshd[235971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0221 seconds
WARNING [2022-12-06 17:04:09,051] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:04:09,108] defence360agent.internals.the_sink: SensorIncidentList(<42 item(s)>) processed in 0.0775 seconds
INFO [2022-12-06 17:04:09,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339049.331261, 'message': 'Dec 6 17:04:07 hqnl0246134 sshd[235962]: Failed password for root from 61.177.173.18 port 19468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0438 seconds
INFO [2022-12-06 17:04:09,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.31.17.98', 'timestamp': 1670339049.3315465, 'message': 'Dec 6 17:04:07 hqnl0246134 sshd[235968]: Failed password for invalid user sami from 123.31.17.98 port 57072 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 17:04:09,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339049.331891, 'message': 'Dec 6 17:04:08 hqnl0246134 sshd[235962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0430 seconds
INFO [2022-12-06 17:04:09,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.31.17.98', 'timestamp': 1670339049.3317325, 'message': 'Dec 6 17:04:07 hqnl0246134 sshd[235968]: Disconnected from invalid user sami 123.31.17.98 port 57072 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-06 17:04:11,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.226.2', 'timestamp': 1670339051.3327708, 'message': 'Dec 6 17:04:09 hqnl0246134 sshd[235971]: Failed password for invalid user ali from 178.128.226.2 port 36937 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0496 seconds
INFO [2022-12-06 17:04:11,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339051.333232, 'message': 'Dec 6 17:04:10 hqnl0246134 sshd[235962]: Failed password for root from 61.177.173.18 port 19468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0498 seconds
INFO [2022-12-06 17:04:11,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.86.95', 'timestamp': 1670339051.3333437, 'message': 'Dec 6 17:04:10 hqnl0246134 sshd[235978]: Invalid user ken from 51.250.86.95 port 45448', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0496 seconds
INFO [2022-12-06 17:04:11,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.226.2', 'timestamp': 1670339051.3330696, 'message': 'Dec 6 17:04:09 hqnl0246134 sshd[235971]: Disconnected from invalid user ali 178.128.226.2 port 36937 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-06 17:04:11,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.86.95', 'timestamp': 1670339051.3340106, 'message': 'Dec 6 17:04:10 hqnl0246134 sshd[235978]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.86.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0445 seconds
INFO [2022-12-06 17:04:11,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339051.3342214, 'message': 'Dec 6 17:04:10 hqnl0246134 sshd[235974]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0447 seconds
INFO [2022-12-06 17:04:11,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.86.95', 'timestamp': 1670339051.3341177, 'message': 'Dec 6 17:04:10 hqnl0246134 sshd[235978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.86.95 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 17:04:11,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339051.3344455, 'message': 'Dec 6 17:04:10 hqnl0246134 sshd[235974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 17:04:13,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.86.95', 'timestamp': 1670339053.3386705, 'message': 'Dec 6 17:04:11 hqnl0246134 sshd[235978]: Failed password for invalid user ken from 51.250.86.95 port 45448 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 17:04:13,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339053.3392189, 'message': 'Dec 6 17:04:12 hqnl0246134 sshd[235974]: Failed password for root from 61.177.173.36 port 45158 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 17:04:13,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.86.95', 'timestamp': 1670339053.3390725, 'message': 'Dec 6 17:04:11 hqnl0246134 sshd[235978]: Disconnected from invalid user ken 51.250.86.95 port 45448 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 17:04:13,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339053.340659, 'message': 'Dec 6 17:04:12 hqnl0246134 sshd[235974]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 17:04:15,362] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339055.3418531, 'message': 'Dec 6 17:04:14 hqnl0246134 sshd[235974]: Failed password for root from 61.177.173.36 port 45158 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:04:15,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339055.3421338, 'message': 'Dec 6 17:04:15 hqnl0246134 sshd[235974]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:04:17,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339057.3451328, 'message': 'Dec 6 17:04:16 hqnl0246134 sshd[235989]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.80.61 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0419 seconds
INFO [2022-12-06 17:04:17,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670339057.3456564, 'message': 'Dec 6 17:04:16 hqnl0246134 sshd[235974]: Failed password for root from 61.177.173.36 port 45158 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0417 seconds
INFO [2022-12-06 17:04:17,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339057.3454475, 'message': 'Dec 6 17:04:16 hqnl0246134 sshd[235989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.61 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 17:04:17,987] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:04:17,988] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:04:17,997] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:04:18,008] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 17:04:19,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339059.3468485, 'message': 'Dec 6 17:04:17 hqnl0246134 sshd[235989]: Failed password for root from 139.59.80.61 port 55744 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 17:04:21,047] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:04:21,048] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:04:21,059] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:04:21,072] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0230 seconds
INFO [2022-12-06 17:04:23,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339063.354859, 'message': 'Dec 6 17:04:21 hqnl0246134 sshd[235998]: Invalid user sachin from 103.170.55.217 port 1481', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 17:04:23,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339063.3554537, 'message': 'Dec 6 17:04:21 hqnl0246134 sshd[235998]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.170.55.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 17:04:23,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339063.3556457, 'message': 'Dec 6 17:04:21 hqnl0246134 sshd[235998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.170.55.217 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 17:04:23,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339063.3558168, 'message': 'Dec 6 17:04:22 hqnl0246134 sshd[235998]: Failed password for invalid user sachin from 103.170.55.217 port 1481 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 17:04:25,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339065.3575253, 'message': 'Dec 6 17:04:23 hqnl0246134 sshd[235998]: Disconnected from invalid user sachin 103.170.55.217 port 1481 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 17:04:26,366] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:04:26,367] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:04:26,380] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:04:26,404] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0358 seconds
WARNING [2022-12-06 17:04:47,457] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:04:47,459] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:04:53,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339093.411445, 'message': 'Dec 6 17:04:52 hqnl0246134 sshd[236019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0402 seconds
INFO [2022-12-06 17:04:53,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339093.4125743, 'message': 'Dec 6 17:04:52 hqnl0246134 sshd[236019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 17:04:55,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339095.412533, 'message': 'Dec 6 17:04:53 hqnl0246134 sshd[236019]: Failed password for root from 61.177.173.18 port 54199 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 17:04:55,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339095.4127474, 'message': 'Dec 6 17:04:54 hqnl0246134 sshd[236019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:04:57,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339097.4172623, 'message': 'Dec 6 17:04:56 hqnl0246134 sshd[236019]: Failed password for root from 61.177.173.18 port 54199 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 17:04:57,458] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339097.4174566, 'message': 'Dec 6 17:04:56 hqnl0246134 sshd[236019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 17:04:59,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339099.4210505, 'message': 'Dec 6 17:04:59 hqnl0246134 sshd[236019]: Failed password for root from 61.177.173.18 port 54199 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 17:05:01,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '187.243.248.114', 'timestamp': 1670339101.4229717, 'message': 'Dec 6 17:05:01 hqnl0246134 sshd[236027]: pam_imunify(sshd:auth): [IM360_RBL] The IP 187.243.248.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 17:05:01,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '187.243.248.114', 'timestamp': 1670339101.4236395, 'message': 'Dec 6 17:05:01 hqnl0246134 sshd[236027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.3418 seconds
INFO [2022-12-06 17:05:05,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '187.243.248.114', 'timestamp': 1670339105.428475, 'message': 'Dec 6 17:05:03 hqnl0246134 sshd[236027]: Failed password for root from 187.243.248.114 port 49880 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0248 seconds
WARNING [2022-12-06 17:05:09,043] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:05:09,074] defence360agent.internals.the_sink: SensorIncidentList(<20 item(s)>) processed in 0.0395 seconds
INFO [2022-12-06 17:05:17,927] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:05:17,928] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:05:17,937] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:05:17,951] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-06 17:05:20,520] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:05:20,521] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:05:20,528] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:05:20,540] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 17:05:35,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.216.116.113', 'timestamp': 1670339135.5029647, 'message': 'Dec 6 17:05:35 hqnl0246134 sshd[236086]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.216.116.113 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 17:05:35,548] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.216.116.113', 'timestamp': 1670339135.503436, 'message': 'Dec 6 17:05:35 hqnl0246134 sshd[236086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.116.113 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 17:05:37,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '185.216.116.113', 'timestamp': 1670339137.506671, 'message': 'Dec 6 17:05:37 hqnl0246134 sshd[236086]: Failed password for root from 185.216.116.113 port 42692 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 17:05:43,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339143.5228543, 'message': 'Dec 6 17:05:41 hqnl0246134 sshd[236089]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 17:05:43,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339143.5232208, 'message': 'Dec 6 17:05:41 hqnl0246134 sshd[236089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 17:05:45,588] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339145.5249357, 'message': 'Dec 6 17:05:43 hqnl0246134 sshd[236089]: Failed password for root from 61.177.173.18 port 30557 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0631 seconds
INFO [2022-12-06 17:05:45,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339145.5252607, 'message': 'Dec 6 17:05:44 hqnl0246134 sshd[236089]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0411 seconds
WARNING [2022-12-06 17:05:47,468] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:05:47,469] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:05:47,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339147.5305989, 'message': 'Dec 6 17:05:46 hqnl0246134 sshd[236089]: Failed password for root from 61.177.173.18 port 30557 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 17:05:47,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339147.5308557, 'message': 'Dec 6 17:05:46 hqnl0246134 sshd[236089]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:05:49,557] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339149.5346813, 'message': 'Dec 6 17:05:47 hqnl0246134 sshd[236089]: Failed password for root from 61.177.173.18 port 30557 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
WARNING [2022-12-06 17:06:09,046] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:06:09,094] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0570 seconds
INFO [2022-12-06 17:06:19,314] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:06:19,315] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:06:19,327] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:06:19,343] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0270 seconds
INFO [2022-12-06 17:06:21,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.152.105', 'timestamp': 1670339181.576329, 'message': 'Dec 6 17:06:19 hqnl0246134 sshd[236151]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.152.105 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 17:06:21,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.152.105', 'timestamp': 1670339181.576691, 'message': 'Dec 6 17:06:19 hqnl0246134 sshd[236151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.152.105 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 17:06:22,197] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:06:22,198] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:06:22,205] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:06:22,219] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 17:06:23,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339183.5780752, 'message': 'Dec 6 17:06:21 hqnl0246134 sshd[236158]: Invalid user jboss from 134.122.106.117 port 58022', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 17:06:23,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '128.199.152.105', 'timestamp': 1670339183.578577, 'message': 'Dec 6 17:06:21 hqnl0246134 sshd[236151]: Failed password for root from 128.199.152.105 port 40504 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 17:06:23,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339183.578304, 'message': 'Dec 6 17:06:21 hqnl0246134 sshd[236158]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.122.106.117 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:06:23,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339183.5784187, 'message': 'Dec 6 17:06:21 hqnl0246134 sshd[236158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.106.117 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:06:24,945] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:06:24,945] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:06:24,953] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:06:24,964] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 17:06:25,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339185.580161, 'message': 'Dec 6 17:06:24 hqnl0246134 sshd[236158]: Failed password for invalid user jboss from 134.122.106.117 port 58022 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 17:06:27,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339187.5822616, 'message': 'Dec 6 17:06:26 hqnl0246134 sshd[236158]: Disconnected from invalid user jboss 134.122.106.117 port 58022 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 17:06:28,979] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 17:06:29,052] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 17:06:29,053] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 17:06:29,053] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 17:06:29,053] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 17:06:29,053] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 17:06:29,065] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 17:06:29,083] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0293 seconds
WARNING [2022-12-06 17:06:29,090] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 17:06:29,092] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:06:29,110] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0321 seconds
INFO [2022-12-06 17:06:29,111] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0303 seconds
INFO [2022-12-06 17:06:33,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.60.127', 'timestamp': 1670339193.59576, 'message': 'Dec 6 17:06:31 hqnl0246134 sshd[236168]: Invalid user user from 43.153.60.127 port 53300', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 17:06:33,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339193.5962791, 'message': 'Dec 6 17:06:33 hqnl0246134 sshd[236170]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 17:06:33,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.60.127', 'timestamp': 1670339193.5959864, 'message': 'Dec 6 17:06:31 hqnl0246134 sshd[236168]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.60.127 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 17:06:33,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339193.5963924, 'message': 'Dec 6 17:06:33 hqnl0246134 sshd[236170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 17:06:33,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.60.127', 'timestamp': 1670339193.5961418, 'message': 'Dec 6 17:06:31 hqnl0246134 sshd[236168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.60.127 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 17:06:35,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.60.127', 'timestamp': 1670339195.598276, 'message': 'Dec 6 17:06:34 hqnl0246134 sshd[236168]: Failed password for invalid user user from 43.153.60.127 port 53300 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 17:06:37,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.60.127', 'timestamp': 1670339197.604487, 'message': 'Dec 6 17:06:36 hqnl0246134 sshd[236168]: Disconnected from invalid user user 43.153.60.127 port 53300 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0456 seconds
INFO [2022-12-06 17:06:37,651] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339197.6046944, 'message': 'Dec 6 17:06:36 hqnl0246134 sshd[236170]: Failed password for root from 61.177.173.18 port 18723 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-06 17:06:39,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339199.6074896, 'message': 'Dec 6 17:06:37 hqnl0246134 sshd[236170]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:06:41,629] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339201.6098487, 'message': 'Dec 6 17:06:40 hqnl0246134 sshd[236170]: Failed password for root from 61.177.173.18 port 18723 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 17:06:43,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339203.6147215, 'message': 'Dec 6 17:06:42 hqnl0246134 sshd[236170]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 17:06:45,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339205.617294, 'message': 'Dec 6 17:06:43 hqnl0246134 sshd[236170]: Failed password for root from 61.177.173.18 port 18723 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 17:06:47,478] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:06:47,479] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:06:53,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339213.625782, 'message': 'Dec 6 17:06:51 hqnl0246134 sshd[236184]: pam_imunify(sshd:auth): [IM360_RBL] The IP 140.238.177.83 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 17:06:53,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339213.6259828, 'message': 'Dec 6 17:06:51 hqnl0246134 sshd[236184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.177.83 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 17:06:55,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339215.6282587, 'message': 'Dec 6 17:06:54 hqnl0246134 sshd[236184]: Failed password for root from 140.238.177.83 port 51202 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 17:06:59,180] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 17:06:59,181] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 17:06:59,182] im360.plugins.client360: Waiting 5 minutes before retry...
WARNING [2022-12-06 17:07:09,049] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:07:09,075] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0341 seconds
INFO [2022-12-06 17:07:17,933] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:07:17,934] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:07:17,943] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:07:17,957] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 17:07:20,831] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:07:20,831] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:07:20,838] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:07:20,850] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 17:07:27,713] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339247.6836298, 'message': 'Dec 6 17:07:25 hqnl0246134 sshd[236231]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 17:07:27,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339247.684005, 'message': 'Dec 6 17:07:25 hqnl0246134 sshd[236231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:07:29,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339249.6839619, 'message': 'Dec 6 17:07:27 hqnl0246134 sshd[236231]: Failed password for root from 61.177.173.18 port 62710 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0453 seconds
INFO [2022-12-06 17:07:29,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '192.99.59.56', 'timestamp': 1670339249.6843302, 'message': 'Dec 6 17:07:28 hqnl0246134 sshd[236234]: pam_imunify(sshd:auth): [IM360_RBL] The IP 192.99.59.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0462 seconds
INFO [2022-12-06 17:07:29,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.31.17.98', 'timestamp': 1670339249.6846006, 'message': 'Dec 6 17:07:29 hqnl0246134 sshd[236235]: Invalid user wasadmin from 123.31.17.98 port 44000', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0461 seconds
INFO [2022-12-06 17:07:29,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339249.6842177, 'message': 'Dec 6 17:07:28 hqnl0246134 sshd[236231]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-06 17:07:29,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '192.99.59.56', 'timestamp': 1670339249.6844816, 'message': 'Dec 6 17:07:28 hqnl0246134 sshd[236234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.59.56 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 17:07:29,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '123.31.17.98', 'timestamp': 1670339249.6847162, 'message': 'Dec 6 17:07:29 hqnl0246134 sshd[236235]: pam_imunify(sshd:auth): [IM360_RBL] The IP 123.31.17.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0416 seconds
INFO [2022-12-06 17:07:29,792] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '123.31.17.98', 'timestamp': 1670339249.6848173, 'message': 'Dec 6 17:07:29 hqnl0246134 sshd[236235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.17.98 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 17:07:31,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339251.6869843, 'message': 'Dec 6 17:07:30 hqnl0246134 sshd[236231]: Failed password for root from 61.177.173.18 port 62710 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0467 seconds
INFO [2022-12-06 17:07:31,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '192.99.59.56', 'timestamp': 1670339251.6875787, 'message': 'Dec 6 17:07:30 hqnl0246134 sshd[236234]: Failed password for root from 192.99.59.56 port 34514 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0473 seconds
INFO [2022-12-06 17:07:31,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.31.17.98', 'timestamp': 1670339251.6877353, 'message': 'Dec 6 17:07:31 hqnl0246134 sshd[236235]: Failed password for invalid user wasadmin from 123.31.17.98 port 44000 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0470 seconds
INFO [2022-12-06 17:07:31,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339251.687343, 'message': 'Dec 6 17:07:30 hqnl0246134 sshd[236231]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:07:33,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.31.17.98', 'timestamp': 1670339253.6899605, 'message': 'Dec 6 17:07:32 hqnl0246134 sshd[236235]: Disconnected from invalid user wasadmin 123.31.17.98 port 44000 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 17:07:33,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339253.6901946, 'message': 'Dec 6 17:07:32 hqnl0246134 sshd[236231]: Failed password for root from 61.177.173.18 port 62710 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 17:07:34,733] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:07:34,733] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:07:34,742] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:07:34,754] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 17:07:39,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339259.7116416, 'message': 'Dec 6 17:07:38 hqnl0246134 sshd[236269]: Invalid user victor from 13.70.39.68 port 43856', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 17:07:39,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339259.7122698, 'message': 'Dec 6 17:07:38 hqnl0246134 sshd[236269]: pam_imunify(sshd:auth): [IM360_RBL] The IP 13.70.39.68 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:07:39,785] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339259.7126005, 'message': 'Dec 6 17:07:38 hqnl0246134 sshd[236269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.70.39.68 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:07:41,735] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339261.714357, 'message': 'Dec 6 17:07:41 hqnl0246134 sshd[236269]: Failed password for invalid user victor from 13.70.39.68 port 43856 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 17:07:43,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339263.718188, 'message': 'Dec 6 17:07:43 hqnl0246134 sshd[236269]: Disconnected from invalid user victor 13.70.39.68 port 43856 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0240 seconds
WARNING [2022-12-06 17:07:47,481] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:07:47,482] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:07:47,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339267.7227416, 'message': 'Dec 6 17:07:46 hqnl0246134 sshd[236282]: Invalid user test from 139.59.80.61 port 44994', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:07:47,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339267.723275, 'message': 'Dec 6 17:07:46 hqnl0246134 sshd[236282]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.80.61 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 17:07:47,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339267.7233944, 'message': 'Dec 6 17:07:46 hqnl0246134 sshd[236282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.61 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 17:07:49,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339269.7256255, 'message': 'Dec 6 17:07:48 hqnl0246134 sshd[236282]: Failed password for invalid user test from 139.59.80.61 port 44994 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:07:49,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339269.7258234, 'message': 'Dec 6 17:07:49 hqnl0246134 sshd[236282]: Disconnected from invalid user test 139.59.80.61 port 44994 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 17:08:03,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339283.7627103, 'message': 'Dec 6 17:08:02 hqnl0246134 sshd[236292]: Invalid user deamon from 103.170.55.217 port 2089', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:08:03,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339283.7629356, 'message': 'Dec 6 17:08:03 hqnl0246134 sshd[236292]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.170.55.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 17:08:03,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339283.7630692, 'message': 'Dec 6 17:08:03 hqnl0246134 sshd[236292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.170.55.217 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 17:08:07,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339287.7749112, 'message': 'Dec 6 17:08:05 hqnl0246134 sshd[236292]: Failed password for invalid user deamon from 103.170.55.217 port 2089 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:08:07,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339287.7750962, 'message': 'Dec 6 17:08:07 hqnl0246134 sshd[236292]: Disconnected from invalid user deamon 103.170.55.217 port 2089 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 17:08:09,058] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:08:09,090] defence360agent.internals.the_sink: SensorIncidentList(<19 item(s)>) processed in 0.0416 seconds
INFO [2022-12-06 17:08:17,920] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:08:17,921] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:08:17,945] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:08:17,979] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0526 seconds
INFO [2022-12-06 17:08:19,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339299.8008175, 'message': 'Dec 6 17:08:18 hqnl0246134 sshd[236307]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0636 seconds
INFO [2022-12-06 17:08:19,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339299.801045, 'message': 'Dec 6 17:08:18 hqnl0246134 sshd[236307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 17:08:20,689] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:08:20,690] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:08:20,698] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:08:20,710] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 17:08:21,825] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339301.8019962, 'message': 'Dec 6 17:08:20 hqnl0246134 sshd[236307]: Failed password for root from 61.177.173.18 port 49340 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 17:08:23,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339303.8039346, 'message': 'Dec 6 17:08:22 hqnl0246134 sshd[236307]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 17:08:25,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339305.8078275, 'message': 'Dec 6 17:08:23 hqnl0246134 sshd[236307]: Failed password for root from 61.177.173.18 port 49340 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 17:08:25,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339305.8080845, 'message': 'Dec 6 17:08:24 hqnl0246134 sshd[236307]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 17:08:27,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339307.811305, 'message': 'Dec 6 17:08:26 hqnl0246134 sshd[236307]: Failed password for root from 61.177.173.18 port 49340 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 17:08:47,485] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:08:47,486] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:08:47,897] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339327.8449843, 'message': 'Dec 6 17:08:46 hqnl0246134 sshd[236332]: Invalid user anaconda from 140.238.177.83 port 41414', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 17:08:47,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339327.8462143, 'message': 'Dec 6 17:08:46 hqnl0246134 sshd[236332]: pam_imunify(sshd:auth): [IM360_RBL] The IP 140.238.177.83 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 17:08:47,945] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339327.8465261, 'message': 'Dec 6 17:08:46 hqnl0246134 sshd[236332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.177.83 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 17:08:49,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339329.8467073, 'message': 'Dec 6 17:08:48 hqnl0246134 sshd[236332]: Failed password for invalid user anaconda from 140.238.177.83 port 41414 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:08:49,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339329.8468964, 'message': 'Dec 6 17:08:48 hqnl0246134 sshd[236332]: Disconnected from invalid user anaconda 140.238.177.83 port 41414 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 17:08:51,421] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:08:51,422] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:08:51,431] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:08:51,444] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 17:09:07,918] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339347.8980181, 'message': 'Dec 6 17:09:07 hqnl0246134 sshd[236471]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.122.106.117 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 17:09:07,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339347.8982968, 'message': 'Dec 6 17:09:07 hqnl0246134 sshd[236471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.106.117 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 17:09:09,059] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:09:09,096] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0442 seconds
INFO [2022-12-06 17:09:09,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '134.122.106.117', 'timestamp': 1670339349.9005685, 'message': 'Dec 6 17:09:09 hqnl0246134 sshd[236471]: Failed password for root from 134.122.106.117 port 58234 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-06 17:09:09,945] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339349.9008439, 'message': 'Dec 6 17:09:09 hqnl0246134 sshd[236474]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 17:09:09,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339349.901032, 'message': 'Dec 6 17:09:09 hqnl0246134 sshd[236474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:09:11,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339351.9049342, 'message': 'Dec 6 17:09:11 hqnl0246134 sshd[236474]: Failed password for root from 61.177.173.18 port 28136 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 17:09:11,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339351.9052374, 'message': 'Dec 6 17:09:11 hqnl0246134 sshd[236474]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 17:09:13,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339353.908651, 'message': 'Dec 6 17:09:13 hqnl0246134 sshd[236474]: Failed password for root from 61.177.173.18 port 28136 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 17:09:17,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339357.9145303, 'message': 'Dec 6 17:09:15 hqnl0246134 sshd[236474]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 17:09:18,039] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:09:18,039] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:09:18,047] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:09:18,059] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 17:09:19,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339359.9167051, 'message': 'Dec 6 17:09:18 hqnl0246134 sshd[236474]: Failed password for root from 61.177.173.18 port 28136 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:09:20,790] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:09:20,790] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:09:20,799] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:09:20,812] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
WARNING [2022-12-06 17:09:47,490] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:09:47,491] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:10:02,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339401.9931228, 'message': 'Dec 6 17:10:01 hqnl0246134 sshd[236515]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 17:10:02,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339401.994333, 'message': 'Dec 6 17:10:01 hqnl0246134 sshd[236515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 17:10:04,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339403.9949496, 'message': 'Dec 6 17:10:03 hqnl0246134 sshd[236515]: Failed password for root from 61.177.173.18 port 11738 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:10:04,035] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339403.9951468, 'message': 'Dec 6 17:10:03 hqnl0246134 sshd[236515]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:10:06,017] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339405.9979858, 'message': 'Dec 6 17:10:05 hqnl0246134 sshd[236515]: Failed password for root from 61.177.173.18 port 11738 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:10:06,035] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339405.9981775, 'message': 'Dec 6 17:10:05 hqnl0246134 sshd[236515]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 17:10:08,019] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339408.0010946, 'message': 'Dec 6 17:10:07 hqnl0246134 sshd[236515]: Failed password for root from 61.177.173.18 port 11738 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
WARNING [2022-12-06 17:10:09,062] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:10:09,083] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0280 seconds
INFO [2022-12-06 17:10:10,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339410.0119529, 'message': 'Dec 6 17:10:08 hqnl0246134 sshd[236542]: Invalid user minecraft from 101.226.253.162 port 5172', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:10:10,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339410.0121326, 'message': 'Dec 6 17:10:08 hqnl0246134 sshd[236542]: pam_imunify(sshd:auth): [IM360_RBL] The IP 101.226.253.162 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 17:10:10,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339410.0125985, 'message': 'Dec 6 17:10:08 hqnl0246134 sshd[236542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.226.253.162 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 17:10:12,037] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339412.0145297, 'message': 'Dec 6 17:10:10 hqnl0246134 sshd[236542]: Failed password for invalid user minecraft from 101.226.253.162 port 5172 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 17:10:14,073] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339414.0181396, 'message': 'Dec 6 17:10:12 hqnl0246134 sshd[236542]: Disconnected from invalid user minecraft 101.226.253.162 port 5172 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0544 seconds
INFO [2022-12-06 17:10:15,027] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:10:15,027] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:10:15,035] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:10:15,049] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-06 17:10:17,885] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:10:17,885] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:10:17,891] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:10:17,903] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-06 17:10:18,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339418.0207114, 'message': 'Dec 6 17:10:17 hqnl0246134 sshd[236563]: Invalid user x from 140.238.177.83 port 59846', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 17:10:18,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339418.0209162, 'message': 'Dec 6 17:10:17 hqnl0246134 sshd[236563]: pam_imunify(sshd:auth): [IM360_RBL] The IP 140.238.177.83 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 17:10:18,097] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339418.0210912, 'message': 'Dec 6 17:10:17 hqnl0246134 sshd[236563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.177.83 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 17:10:20,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339420.02894, 'message': 'Dec 6 17:10:18 hqnl0246134 sshd[236563]: Failed password for invalid user x from 140.238.177.83 port 59846 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:10:22,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '140.238.177.83', 'timestamp': 1670339422.0301044, 'message': 'Dec 6 17:10:20 hqnl0246134 sshd[236563]: Disconnected from invalid user x 140.238.177.83 port 59846 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 17:10:22,726] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:10:22,726] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:10:22,733] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:10:22,744] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 17:10:26,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670339426.0340433, 'message': 'Dec 6 17:10:25 hqnl0246134 sshd[236579]: Invalid user ts3server from 201.236.186.32 port 59791', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 17:10:26,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.236.186.32', 'timestamp': 1670339426.0342574, 'message': 'Dec 6 17:10:25 hqnl0246134 sshd[236579]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.236.186.32 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0507 seconds
INFO [2022-12-06 17:10:26,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.236.186.32', 'timestamp': 1670339426.034386, 'message': 'Dec 6 17:10:25 hqnl0246134 sshd[236579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.186.32 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0434 seconds
INFO [2022-12-06 17:10:28,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670339428.038629, 'message': 'Dec 6 17:10:27 hqnl0246134 sshd[236579]: Failed password for invalid user ts3server from 201.236.186.32 port 59791 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:10:30,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670339430.0469222, 'message': 'Dec 6 17:10:29 hqnl0246134 sshd[236579]: Disconnected from invalid user ts3server 201.236.186.32 port 59791 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 17:10:42,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339442.0711577, 'message': 'Dec 6 17:10:41 hqnl0246134 sshd[236586]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 17:10:42,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339442.0714824, 'message': 'Dec 6 17:10:41 hqnl0246134 sshd[236586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:10:44,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339444.0770774, 'message': 'Dec 6 17:10:43 hqnl0246134 sshd[236586]: Failed password for root from 61.177.173.51 port 48135 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1016 seconds
INFO [2022-12-06 17:10:44,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339444.077569, 'message': 'Dec 6 17:10:43 hqnl0246134 sshd[236586]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 17:10:46,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339446.0791895, 'message': 'Dec 6 17:10:45 hqnl0246134 sshd[236586]: Failed password for root from 61.177.173.51 port 48135 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 17:10:46,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339446.0796697, 'message': 'Dec 6 17:10:45 hqnl0246134 sshd[236586]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
WARNING [2022-12-06 17:10:47,498] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:10:47,499] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:10:48,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339448.0833297, 'message': 'Dec 6 17:10:47 hqnl0246134 sshd[236586]: Failed password for root from 61.177.173.51 port 48135 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 17:10:52,125] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339452.090948, 'message': 'Dec 6 17:10:50 hqnl0246134 sshd[236598]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 17:10:52,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339452.091331, 'message': 'Dec 6 17:10:51 hqnl0246134 sshd[236600]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 17:10:52,157] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339452.0912008, 'message': 'Dec 6 17:10:50 hqnl0246134 sshd[236598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 17:10:52,158] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339452.0914536, 'message': 'Dec 6 17:10:51 hqnl0246134 sshd[236600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 17:10:54,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339454.0952728, 'message': 'Dec 6 17:10:52 hqnl0246134 sshd[236598]: Failed password for root from 61.177.173.51 port 60448 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 17:10:54,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339454.09565, 'message': 'Dec 6 17:10:53 hqnl0246134 sshd[236602]: Invalid user rick from 13.70.39.68 port 33096', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-06 17:10:54,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339454.0955026, 'message': 'Dec 6 17:10:53 hqnl0246134 sshd[236598]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 17:10:54,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339454.0961912, 'message': 'Dec 6 17:10:53 hqnl0246134 sshd[236600]: Failed password for root from 61.177.173.18 port 53695 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0442 seconds
INFO [2022-12-06 17:10:54,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339454.0958583, 'message': 'Dec 6 17:10:53 hqnl0246134 sshd[236602]: pam_imunify(sshd:auth): [IM360_RBL] The IP 13.70.39.68 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0438 seconds
INFO [2022-12-06 17:10:54,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339454.096028, 'message': 'Dec 6 17:10:53 hqnl0246134 sshd[236602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.70.39.68 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 17:10:56,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339456.0983055, 'message': 'Dec 6 17:10:54 hqnl0246134 sshd[236598]: Failed password for root from 61.177.173.51 port 60448 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0507 seconds
INFO [2022-12-06 17:10:56,151] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339456.0986445, 'message': 'Dec 6 17:10:55 hqnl0246134 sshd[236602]: Failed password for invalid user rick from 13.70.39.68 port 33096 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0512 seconds
INFO [2022-12-06 17:10:56,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339456.098828, 'message': 'Dec 6 17:10:55 hqnl0246134 sshd[236600]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0511 seconds
INFO [2022-12-06 17:10:56,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339456.0989861, 'message': 'Dec 6 17:10:56 hqnl0246134 sshd[236598]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 17:10:58,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.70.39.68', 'timestamp': 1670339458.100723, 'message': 'Dec 6 17:10:56 hqnl0246134 sshd[236602]: Disconnected from invalid user rick 13.70.39.68 port 33096 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0651 seconds
INFO [2022-12-06 17:10:58,167] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339458.1010435, 'message': 'Dec 6 17:10:57 hqnl0246134 sshd[236600]: Failed password for root from 61.177.173.18 port 53695 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0653 seconds
INFO [2022-12-06 17:11:00,140] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339460.10344, 'message': 'Dec 6 17:10:58 hqnl0246134 sshd[236600]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 17:11:00,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670339460.1038299, 'message': 'Dec 6 17:10:58 hqnl0246134 sshd[236598]: Failed password for root from 61.177.173.51 port 60448 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 17:11:00,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339460.1039984, 'message': 'Dec 6 17:11:00 hqnl0246134 sshd[236600]: Failed password for root from 61.177.173.18 port 53695 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 17:11:04,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339464.1099403, 'message': 'Dec 6 17:11:02 hqnl0246134 sshd[236616]: Invalid user user from 139.59.80.61 port 34242', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 17:11:04,151] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339464.1102307, 'message': 'Dec 6 17:11:02 hqnl0246134 sshd[236616]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.80.61 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 17:11:04,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339464.1103864, 'message': 'Dec 6 17:11:02 hqnl0246134 sshd[236616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.61 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 17:11:06,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339466.1130018, 'message': 'Dec 6 17:11:04 hqnl0246134 sshd[236616]: Failed password for invalid user user from 139.59.80.61 port 34242 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:11:08,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.80.61', 'timestamp': 1670339468.1193535, 'message': 'Dec 6 17:11:06 hqnl0246134 sshd[236616]: Disconnected from invalid user user 139.59.80.61 port 34242 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 17:11:09,068] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:11:09,097] defence360agent.internals.the_sink: SensorIncidentList(<21 item(s)>) processed in 0.0378 seconds
INFO [2022-12-06 17:11:19,875] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:11:19,876] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:11:19,888] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:11:19,901] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0240 seconds
INFO [2022-12-06 17:11:22,879] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:11:22,880] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:11:22,888] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:11:22,899] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 17:11:38,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339498.1594465, 'message': 'Dec 6 17:11:37 hqnl0246134 sshd[236643]: Invalid user marketing from 103.170.55.217 port 2705', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 17:11:38,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339498.159882, 'message': 'Dec 6 17:11:37 hqnl0246134 sshd[236643]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.170.55.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 17:11:38,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339498.1600301, 'message': 'Dec 6 17:11:37 hqnl0246134 sshd[236643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.170.55.217 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 17:11:40,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339500.1600797, 'message': 'Dec 6 17:11:39 hqnl0246134 sshd[236643]: Failed password for invalid user marketing from 103.170.55.217 port 2705 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 17:11:42,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.170.55.217', 'timestamp': 1670339502.1629577, 'message': 'Dec 6 17:11:40 hqnl0246134 sshd[236643]: Disconnected from invalid user marketing 103.170.55.217 port 2705 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 17:11:42,835] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:11:42,836] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:11:42,842] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:11:42,853] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 17:11:44,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339504.166123, 'message': 'Dec 6 17:11:42 hqnl0246134 sshd[236648]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 17:11:44,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339504.166449, 'message': 'Dec 6 17:11:42 hqnl0246134 sshd[236648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:11:46,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339506.1692524, 'message': 'Dec 6 17:11:44 hqnl0246134 sshd[236648]: Failed password for root from 61.177.173.18 port 41797 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0415 seconds
INFO [2022-12-06 17:11:46,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339506.170586, 'message': 'Dec 6 17:11:45 hqnl0246134 sshd[236648]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 17:11:47,503] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:11:47,504] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:11:48,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339508.1726456, 'message': 'Dec 6 17:11:47 hqnl0246134 sshd[236648]: Failed password for root from 61.177.173.18 port 41797 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 17:11:50,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339510.1757276, 'message': 'Dec 6 17:11:49 hqnl0246134 sshd[236648]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 17:11:52,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339512.177397, 'message': 'Dec 6 17:11:51 hqnl0246134 sshd[236648]: Failed password for root from 61.177.173.18 port 41797 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
WARNING [2022-12-06 17:11:53,356] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 17:12:09,078] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:12:09,102] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0383 seconds
INFO [2022-12-06 17:12:12,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339532.1910818, 'message': 'Dec 6 17:12:11 hqnl0246134 sshd[236705]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0615 seconds
INFO [2022-12-06 17:12:12,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339532.1914465, 'message': 'Dec 6 17:12:11 hqnl0246134 sshd[236705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.124 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0773 seconds
INFO [2022-12-06 17:12:14,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339534.1906228, 'message': 'Dec 6 17:12:13 hqnl0246134 sshd[236705]: Failed password for root from 61.177.172.124 port 46297 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 17:12:14,890] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 17:12:14,955] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 17:12:14,956] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 17:12:14,956] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 17:12:14,957] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 17:12:14,957] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 17:12:14,974] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 17:12:14,992] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0336 seconds
WARNING [2022-12-06 17:12:14,998] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 17:12:15,001] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:12:15,026] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0399 seconds
INFO [2022-12-06 17:12:15,028] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0390 seconds
INFO [2022-12-06 17:12:16,231] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339536.1934805, 'message': 'Dec 6 17:12:16 hqnl0246134 sshd[236705]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 17:12:18,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339538.1966958, 'message': 'Dec 6 17:12:17 hqnl0246134 sshd[236705]: Failed password for root from 61.177.172.124 port 46297 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0414 seconds
INFO [2022-12-06 17:12:19,223] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:12:19,223] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:12:19,233] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:12:19,245] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 17:12:20,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339540.1994338, 'message': 'Dec 6 17:12:18 hqnl0246134 sshd[236705]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 17:12:21,989] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:12:21,989] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:12:21,997] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:12:22,009] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 17:12:22,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339542.2004223, 'message': 'Dec 6 17:12:20 hqnl0246134 sshd[236705]: Failed password for root from 61.177.172.124 port 46297 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 17:12:34,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339554.2147017, 'message': 'Dec 6 17:12:33 hqnl0246134 sshd[236734]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 17:12:34,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339554.2152567, 'message': 'Dec 6 17:12:34 hqnl0246134 sshd[236736]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 17:12:34,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339554.2151086, 'message': 'Dec 6 17:12:33 hqnl0246134 sshd[236734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 17:12:34,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339554.215381, 'message': 'Dec 6 17:12:34 hqnl0246134 sshd[236736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.124 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 17:12:36,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339556.2166717, 'message': 'Dec 6 17:12:34 hqnl0246134 sshd[236734]: Failed password for root from 61.177.173.18 port 28091 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 17:12:36,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339556.217061, 'message': 'Dec 6 17:12:35 hqnl0246134 sshd[236736]: Failed password for root from 61.177.172.124 port 41078 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 17:12:36,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339556.2169452, 'message': 'Dec 6 17:12:35 hqnl0246134 sshd[236734]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:12:38,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339558.2183256, 'message': 'Dec 6 17:12:36 hqnl0246134 sshd[236736]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-06 17:12:38,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339558.2186956, 'message': 'Dec 6 17:12:37 hqnl0246134 sshd[236734]: Failed password for root from 61.177.173.18 port 28091 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0390 seconds
INFO [2022-12-06 17:12:40,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339560.2206638, 'message': 'Dec 6 17:12:38 hqnl0246134 sshd[236736]: Failed password for root from 61.177.172.124 port 41078 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 17:12:40,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339560.221024, 'message': 'Dec 6 17:12:40 hqnl0246134 sshd[236734]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0431 seconds
INFO [2022-12-06 17:12:40,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339560.220899, 'message': 'Dec 6 17:12:38 hqnl0246134 sshd[236736]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:12:42,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670339562.2223268, 'message': 'Dec 6 17:12:41 hqnl0246134 sshd[236736]: Failed password for root from 61.177.172.124 port 41078 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 17:12:42,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339562.2226155, 'message': 'Dec 6 17:12:41 hqnl0246134 sshd[236734]: Failed password for root from 61.177.173.18 port 28091 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 17:12:45,083] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 17:12:45,084] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 17:12:45,085] im360.plugins.client360: Waiting 6 minutes before retry...
WARNING [2022-12-06 17:12:47,506] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:12:47,507] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:13:02,091] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 17:13:02,102] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:13:02,115] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0228 seconds
INFO [2022-12-06 17:13:06,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.255.249.179', 'timestamp': 1670339586.2498624, 'message': 'Dec 6 17:13:05 hqnl0246134 sshd[236770]: Invalid user slave from 84.255.249.179 port 32870', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 17:13:06,295] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '84.255.249.179', 'timestamp': 1670339586.250213, 'message': 'Dec 6 17:13:05 hqnl0246134 sshd[236770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 84.255.249.179 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:13:06,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '84.255.249.179', 'timestamp': 1670339586.2504578, 'message': 'Dec 6 17:13:05 hqnl0246134 sshd[236770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.255.249.179 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 17:13:08,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.255.249.179', 'timestamp': 1670339588.2526534, 'message': 'Dec 6 17:13:07 hqnl0246134 sshd[236770]: Failed password for invalid user slave from 84.255.249.179 port 32870 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 17:13:09,080] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:13:09,105] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0371 seconds
INFO [2022-12-06 17:13:10,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.255.249.179', 'timestamp': 1670339590.2567663, 'message': 'Dec 6 17:13:09 hqnl0246134 sshd[236770]: Disconnected from invalid user slave 84.255.249.179 port 32870 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:13:11,950] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:13:11,951] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:13:11,959] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:13:11,971] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 17:13:17,848] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:13:17,848] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:13:17,861] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:13:17,873] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0238 seconds
INFO [2022-12-06 17:13:20,616] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:13:20,617] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:13:20,624] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:13:20,637] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 17:13:26,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339606.2810163, 'message': 'Dec 6 17:13:24 hqnl0246134 sshd[236798]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 17:13:26,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339606.281341, 'message': 'Dec 6 17:13:24 hqnl0246134 sshd[236798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 17:13:28,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339608.2815812, 'message': 'Dec 6 17:13:26 hqnl0246134 sshd[236798]: Failed password for root from 61.177.173.18 port 57608 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 17:13:30,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339610.2820666, 'message': 'Dec 6 17:13:28 hqnl0246134 sshd[236798]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 17:13:30,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339610.28233, 'message': 'Dec 6 17:13:30 hqnl0246134 sshd[236798]: Failed password for root from 61.177.173.18 port 57608 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 17:13:32,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339612.2857454, 'message': 'Dec 6 17:13:30 hqnl0246134 sshd[236798]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:13:34,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339614.291331, 'message': 'Dec 6 17:13:32 hqnl0246134 sshd[236798]: Failed password for root from 61.177.173.18 port 57608 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 17:13:34,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339614.2916913, 'message': 'Dec 6 17:13:33 hqnl0246134 sshd[236807]: pam_imunify(sshd:auth): [IM360_RBL] The IP 101.226.253.162 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 17:13:34,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339614.2919211, 'message': 'Dec 6 17:13:33 hqnl0246134 sshd[236807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.226.253.162 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 17:13:38,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339618.2946024, 'message': 'Dec 6 17:13:36 hqnl0246134 sshd[236807]: Failed password for root from 101.226.253.162 port 35678 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
WARNING [2022-12-06 17:13:47,514] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:13:47,516] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 17:14:09,082] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:14:09,108] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0352 seconds
INFO [2022-12-06 17:14:18,067] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:14:18,068] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:14:18,077] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:14:18,089] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 17:14:20,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339660.3488412, 'message': 'Dec 6 17:14:18 hqnl0246134 sshd[236846]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 17:14:20,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339660.3490524, 'message': 'Dec 6 17:14:18 hqnl0246134 sshd[236846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:14:20,789] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:14:20,790] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:14:20,810] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:14:20,824] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0331 seconds
INFO [2022-12-06 17:14:22,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339662.3505027, 'message': 'Dec 6 17:14:20 hqnl0246134 sshd[236846]: Failed password for root from 61.177.173.18 port 53334 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 17:14:24,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339664.352428, 'message': 'Dec 6 17:14:22 hqnl0246134 sshd[236846]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 17:14:26,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339666.3550801, 'message': 'Dec 6 17:14:24 hqnl0246134 sshd[236846]: Failed password for root from 61.177.173.18 port 53334 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 17:14:26,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339666.3552897, 'message': 'Dec 6 17:14:25 hqnl0246134 sshd[236846]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 17:14:28,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339668.3594947, 'message': 'Dec 6 17:14:27 hqnl0246134 sshd[236846]: Failed password for root from 61.177.173.18 port 53334 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0360 seconds
WARNING [2022-12-06 17:14:47,519] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:14:47,521] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 17:15:09,093] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:15:09,130] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0529 seconds
INFO [2022-12-06 17:15:10,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339710.4176311, 'message': 'Dec 6 17:15:10 hqnl0246134 sshd[236901]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 17:15:10,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339710.4178684, 'message': 'Dec 6 17:15:10 hqnl0246134 sshd[236901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:15:12,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339712.4257035, 'message': 'Dec 6 17:15:11 hqnl0246134 sshd[236901]: Failed password for root from 61.177.173.18 port 34710 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:15:14,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339714.4282644, 'message': 'Dec 6 17:15:12 hqnl0246134 sshd[236901]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 17:15:14,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339714.4285297, 'message': 'Dec 6 17:15:14 hqnl0246134 sshd[236901]: Failed password for root from 61.177.173.18 port 34710 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:15:16,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339716.4303744, 'message': 'Dec 6 17:15:14 hqnl0246134 sshd[236901]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 17:15:17,817] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:15:17,817] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:15:17,825] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:15:17,836] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 17:15:18,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339718.4336486, 'message': 'Dec 6 17:15:17 hqnl0246134 sshd[236901]: Failed password for root from 61.177.173.18 port 34710 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 17:15:20,902] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:15:20,903] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:15:20,909] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:15:20,921] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 17:15:21,753] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:15:21,753] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:15:21,761] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:15:21,772] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
WARNING [2022-12-06 17:15:47,526] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:15:47,527] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:15:56,933] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:15:56,934] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:15:56,946] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:15:56,961] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0251 seconds
INFO [2022-12-06 17:16:04,524] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339764.503193, 'message': 'Dec 6 17:16:02 hqnl0246134 sshd[237006]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 17:16:04,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339764.503459, 'message': 'Dec 6 17:16:02 hqnl0246134 sshd[237006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:16:06,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339766.5048616, 'message': 'Dec 6 17:16:05 hqnl0246134 sshd[237006]: Failed password for root from 61.177.173.18 port 28174 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 17:16:08,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339768.5058093, 'message': 'Dec 6 17:16:07 hqnl0246134 sshd[237006]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-06 17:16:09,087] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:16:09,109] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0297 seconds
INFO [2022-12-06 17:16:10,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339770.5078223, 'message': 'Dec 6 17:16:09 hqnl0246134 sshd[237006]: Failed password for root from 61.177.173.18 port 28174 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:16:10,567] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339770.508013, 'message': 'Dec 6 17:16:10 hqnl0246134 sshd[237006]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 17:16:12,530] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339772.51107, 'message': 'Dec 6 17:16:11 hqnl0246134 sshd[237006]: Failed password for root from 61.177.173.18 port 28174 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 17:16:17,872] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:16:17,873] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:16:17,881] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:16:17,893] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 17:16:20,659] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:16:20,660] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:16:20,666] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:16:20,679] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 17:16:22,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670339782.524948, 'message': 'Dec 6 17:16:22 hqnl0246134 sshd[237037]: Invalid user paula from 201.236.186.32 port 55138', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 17:16:24,552] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.236.186.32', 'timestamp': 1670339784.5266902, 'message': 'Dec 6 17:16:22 hqnl0246134 sshd[237037]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.236.186.32 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 17:16:24,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.236.186.32', 'timestamp': 1670339784.5273163, 'message': 'Dec 6 17:16:22 hqnl0246134 sshd[237037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.186.32 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 17:16:24,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670339784.5277355, 'message': 'Dec 6 17:16:23 hqnl0246134 sshd[237037]: Failed password for invalid user paula from 201.236.186.32 port 55138 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 17:16:24,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670339784.5281012, 'message': 'Dec 6 17:16:24 hqnl0246134 sshd[237037]: Disconnected from invalid user paula 201.236.186.32 port 55138 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:16:26,850] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:16:26,851] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:16:26,858] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:16:26,869] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
WARNING [2022-12-06 17:16:47,530] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:16:47,531] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:16:54,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339814.5736449, 'message': 'Dec 6 17:16:54 hqnl0246134 sshd[237057]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 17:16:54,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339814.5743058, 'message': 'Dec 6 17:16:54 hqnl0246134 sshd[237057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 17:16:56,599] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339816.577458, 'message': 'Dec 6 17:16:56 hqnl0246134 sshd[237057]: Failed password for root from 61.177.173.18 port 60705 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 17:16:58,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339818.580957, 'message': 'Dec 6 17:16:56 hqnl0246134 sshd[237057]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 17:17:00,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339820.5840063, 'message': 'Dec 6 17:16:58 hqnl0246134 sshd[237057]: Failed password for root from 61.177.173.18 port 60705 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 17:17:00,624] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339820.5843673, 'message': 'Dec 6 17:16:59 hqnl0246134 sshd[237057]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 17:17:00,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339820.5845335, 'message': 'Dec 6 17:17:00 hqnl0246134 sshd[237057]: Failed password for root from 61.177.173.18 port 60705 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:17:04,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339824.5886524, 'message': 'Dec 6 17:17:02 hqnl0246134 sshd[237079]: pam_imunify(sshd:auth): [IM360_RBL] The IP 101.226.253.162 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 17:17:04,629] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339824.5889163, 'message': 'Dec 6 17:17:02 hqnl0246134 sshd[237079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.226.253.162 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 17:17:06,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '101.226.253.162', 'timestamp': 1670339826.5933862, 'message': 'Dec 6 17:17:04 hqnl0246134 sshd[237079]: Failed password for root from 101.226.253.162 port 18173 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 17:17:09,090] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:17:09,127] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0438 seconds
INFO [2022-12-06 17:17:17,886] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:17:17,887] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:17:17,896] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:17:17,908] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 17:17:21,255] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:17:21,255] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:17:21,263] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:17:21,274] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 17:17:46,672] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339866.6470075, 'message': 'Dec 6 17:17:45 hqnl0246134 sshd[237123]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 17:17:46,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339866.6476274, 'message': 'Dec 6 17:17:45 hqnl0246134 sshd[237123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 17:17:47,538] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:17:47,539] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:17:48,673] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339868.6511135, 'message': 'Dec 6 17:17:47 hqnl0246134 sshd[237123]: Failed password for root from 61.177.173.18 port 52637 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 17:17:50,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339870.653926, 'message': 'Dec 6 17:17:49 hqnl0246134 sshd[237123]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 17:17:52,675] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339872.6544492, 'message': 'Dec 6 17:17:51 hqnl0246134 sshd[237123]: Failed password for root from 61.177.173.18 port 52637 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 17:17:52,693] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339872.654723, 'message': 'Dec 6 17:17:51 hqnl0246134 sshd[237123]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 17:17:54,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339874.655595, 'message': 'Dec 6 17:17:53 hqnl0246134 sshd[237123]: Failed password for root from 61.177.173.18 port 52637 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
WARNING [2022-12-06 17:18:09,094] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:18:09,114] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0277 seconds
INFO [2022-12-06 17:18:18,039] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:18:18,040] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:18:18,048] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:18:18,060] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 17:18:20,761] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:18:20,762] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:18:20,772] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:18:20,789] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0261 seconds
INFO [2022-12-06 17:18:34,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339914.6848488, 'message': 'Dec 6 17:18:34 hqnl0246134 sshd[237170]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 17:18:34,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339914.6851037, 'message': 'Dec 6 17:18:34 hqnl0246134 sshd[237170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 17:18:36,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339916.685711, 'message': 'Dec 6 17:18:36 hqnl0246134 sshd[237170]: Failed password for root from 61.177.173.18 port 33067 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 17:18:38,721] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339918.6864383, 'message': 'Dec 6 17:18:38 hqnl0246134 sshd[237170]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 17:18:40,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339920.68861, 'message': 'Dec 6 17:18:40 hqnl0246134 sshd[237170]: Failed password for root from 61.177.173.18 port 33067 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:18:42,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339922.6898315, 'message': 'Dec 6 17:18:40 hqnl0246134 sshd[237170]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 17:18:44,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339924.6919115, 'message': 'Dec 6 17:18:43 hqnl0246134 sshd[237170]: Failed password for root from 61.177.173.18 port 33067 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
WARNING [2022-12-06 17:18:47,544] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:18:47,545] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:18:47,883] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:18:47,884] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:18:47,896] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:18:47,915] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0299 seconds
INFO [2022-12-06 17:18:48,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '212.60.80.58', 'timestamp': 1670339928.6970437, 'message': 'Dec 6 17:18:48 hqnl0246134 sshd[237186]: pam_imunify(sshd:auth): [IM360_RBL] The IP 212.60.80.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0360 seconds
INFO [2022-12-06 17:18:48,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '212.60.80.58', 'timestamp': 1670339928.7019322, 'message': 'Dec 6 17:18:48 hqnl0246134 sshd[237186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.60.80.58 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 17:18:50,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '212.60.80.58', 'timestamp': 1670339930.6994133, 'message': 'Dec 6 17:18:50 hqnl0246134 sshd[237186]: Failed password for root from 212.60.80.58 port 56113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 17:19:09,097] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:19:09,120] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0316 seconds
INFO [2022-12-06 17:19:17,942] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:19:17,943] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:19:17,953] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:19:17,967] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-06 17:19:20,663] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:19:20,664] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:19:20,676] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:19:20,695] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0297 seconds
INFO [2022-12-06 17:19:26,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339966.7351398, 'message': 'Dec 6 17:19:25 hqnl0246134 sshd[237219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 17:19:26,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339966.7354813, 'message': 'Dec 6 17:19:26 hqnl0246134 sshd[237219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 17:19:28,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339968.7370112, 'message': 'Dec 6 17:19:28 hqnl0246134 sshd[237219]: Failed password for root from 61.177.173.18 port 18103 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:19:30,758] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339970.7378929, 'message': 'Dec 6 17:19:30 hqnl0246134 sshd[237219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 17:19:32,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339972.741538, 'message': 'Dec 6 17:19:32 hqnl0246134 sshd[237219]: Failed password for root from 61.177.173.18 port 18103 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 17:19:33,843] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 17:19:33,919] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 17:19:33,919] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 17:19:33,920] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 17:19:33,920] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 17:19:33,921] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 17:19:33,935] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 17:19:33,961] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0397 seconds
WARNING [2022-12-06 17:19:33,974] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 17:19:33,977] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:19:33,995] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0424 seconds
INFO [2022-12-06 17:19:33,996] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0385 seconds
INFO [2022-12-06 17:19:34,852] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339974.8339186, 'message': 'Dec 6 17:19:34 hqnl0246134 sshd[237219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:19:38,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670339978.7455802, 'message': 'Dec 6 17:19:37 hqnl0246134 sshd[237219]: Failed password for root from 61.177.173.18 port 18103 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0252 seconds
WARNING [2022-12-06 17:19:47,548] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:19:47,550] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:20:05,054] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 17:20:05,056] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 17:20:05,057] im360.plugins.client360: Waiting 4 minutes before retry...
WARNING [2022-12-06 17:20:09,102] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:20:09,126] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0321 seconds
INFO [2022-12-06 17:20:17,964] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:20:17,964] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:20:17,973] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:20:17,985] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 17:20:18,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340018.7843113, 'message': 'Dec 6 17:20:17 hqnl0246134 sshd[237293]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 17:20:18,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340018.7845888, 'message': 'Dec 6 17:20:17 hqnl0246134 sshd[237293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 17:20:20,636] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:20:20,637] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:20:20,643] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:20:20,654] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-06 17:20:20,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340020.7842178, 'message': 'Dec 6 17:20:19 hqnl0246134 sshd[237293]: Failed password for root from 61.177.173.18 port 49876 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 17:20:20,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340020.784408, 'message': 'Dec 6 17:20:19 hqnl0246134 sshd[237293]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:20:22,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340022.7861855, 'message': 'Dec 6 17:20:22 hqnl0246134 sshd[237293]: Failed password for root from 61.177.173.18 port 49876 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:20:24,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340024.788687, 'message': 'Dec 6 17:20:24 hqnl0246134 sshd[237293]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 17:20:26,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340026.7929637, 'message': 'Dec 6 17:20:26 hqnl0246134 sshd[237293]: Failed password for root from 61.177.173.18 port 49876 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 17:20:31,038] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:20:31,039] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:20:31,047] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:20:31,060] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
WARNING [2022-12-06 17:20:47,557] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:20:47,558] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:20:58,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670340058.8350532, 'message': 'Dec 6 17:20:57 hqnl0246134 sshd[237331]: Invalid user ubnt from 152.89.196.220 port 17210', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-06 17:20:58,894] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670340058.8356328, 'message': 'Dec 6 17:20:57 hqnl0246134 sshd[237331]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 17:20:58,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670340058.8358786, 'message': 'Dec 6 17:20:57 hqnl0246134 sshd[237331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:21:00,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670340060.8362734, 'message': 'Dec 6 17:21:00 hqnl0246134 sshd[237331]: Failed password for invalid user ubnt from 152.89.196.220 port 17210 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 17:21:02,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670340062.8384762, 'message': 'Dec 6 17:21:02 hqnl0246134 sshd[237331]: Disconnected from invalid user ubnt 152.89.196.220 port 17210 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0256 seconds
WARNING [2022-12-06 17:21:09,113] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:21:09,148] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0478 seconds
INFO [2022-12-06 17:21:14,893] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340074.8705437, 'message': 'Dec 6 17:21:13 hqnl0246134 sshd[237345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 17:21:14,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340074.8708518, 'message': 'Dec 6 17:21:13 hqnl0246134 sshd[237345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:21:16,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340076.8728738, 'message': 'Dec 6 17:21:15 hqnl0246134 sshd[237345]: Failed password for root from 61.177.173.18 port 32816 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0396 seconds
INFO [2022-12-06 17:21:16,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340076.873494, 'message': 'Dec 6 17:21:15 hqnl0246134 sshd[237345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 17:21:17,965] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:21:17,965] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:21:17,973] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:21:17,986] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 17:21:18,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340078.8743563, 'message': 'Dec 6 17:21:17 hqnl0246134 sshd[237345]: Failed password for root from 61.177.173.18 port 32816 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 17:21:18,945] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340078.8746521, 'message': 'Dec 6 17:21:18 hqnl0246134 sshd[237345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 17:21:20,804] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:21:20,805] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:21:20,821] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:21:20,842] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0359 seconds
INFO [2022-12-06 17:21:20,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340080.877031, 'message': 'Dec 6 17:21:20 hqnl0246134 sshd[237345]: Failed password for root from 61.177.173.18 port 32816 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
WARNING [2022-12-06 17:21:47,565] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:21:47,566] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 17:21:53,359] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 17:21:58,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340118.9266262, 'message': 'Dec 6 17:21:58 hqnl0246134 sshd[237390]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 17:21:58,971] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340118.9270964, 'message': 'Dec 6 17:21:58 hqnl0246134 sshd[237390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:22:00,945] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340120.9258964, 'message': 'Dec 6 17:22:00 hqnl0246134 sshd[237390]: Failed password for root from 61.177.173.46 port 27753 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:22:02,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340122.9289865, 'message': 'Dec 6 17:22:02 hqnl0246134 sshd[237390]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0552 seconds
INFO [2022-12-06 17:22:02,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340122.9293022, 'message': 'Dec 6 17:22:02 hqnl0246134 sshd[237394]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0556 seconds
INFO [2022-12-06 17:22:03,021] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340122.9294796, 'message': 'Dec 6 17:22:02 hqnl0246134 sshd[237394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 17:22:04,967] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340124.9327137, 'message': 'Dec 6 17:22:03 hqnl0246134 sshd[237390]: Failed password for root from 61.177.173.46 port 27753 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 17:22:04,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340124.9329312, 'message': 'Dec 6 17:22:04 hqnl0246134 sshd[237394]: Failed password for root from 61.177.173.18 port 17914 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 17:22:06,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340126.936114, 'message': 'Dec 6 17:22:05 hqnl0246134 sshd[237394]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 17:22:06,967] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340126.9365864, 'message': 'Dec 6 17:22:05 hqnl0246134 sshd[237390]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 17:22:06,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340126.9367285, 'message': 'Dec 6 17:22:06 hqnl0246134 sshd[237394]: Failed password for root from 61.177.173.18 port 17914 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 17:22:06,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340126.9368353, 'message': 'Dec 6 17:22:06 hqnl0246134 sshd[237390]: Failed password for root from 61.177.173.46 port 27753 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 17:22:08,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340128.941094, 'message': 'Dec 6 17:22:07 hqnl0246134 sshd[237394]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 17:22:09,112] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:22:09,141] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0362 seconds
INFO [2022-12-06 17:22:10,025] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:22:10,025] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:22:10,033] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:22:10,044] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 17:22:10,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340130.9421208, 'message': 'Dec 6 17:22:09 hqnl0246134 sshd[237408]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0383 seconds
INFO [2022-12-06 17:22:10,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340130.9426663, 'message': 'Dec 6 17:22:10 hqnl0246134 sshd[237394]: Failed password for root from 61.177.173.18 port 17914 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0387 seconds
INFO [2022-12-06 17:22:11,000] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340130.9425066, 'message': 'Dec 6 17:22:09 hqnl0246134 sshd[237408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:22:12,971] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340132.9503093, 'message': 'Dec 6 17:22:11 hqnl0246134 sshd[237408]: Failed password for root from 61.177.173.46 port 15145 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 17:22:12,990] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340132.9506936, 'message': 'Dec 6 17:22:11 hqnl0246134 sshd[237408]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:22:14,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340134.9530728, 'message': 'Dec 6 17:22:12 hqnl0246134 sshd[237408]: Failed password for root from 61.177.173.46 port 15145 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 17:22:14,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340134.953384, 'message': 'Dec 6 17:22:13 hqnl0246134 sshd[237408]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:22:17,001] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670340136.9550548, 'message': 'Dec 6 17:22:15 hqnl0246134 sshd[237408]: Failed password for root from 61.177.173.46 port 15145 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0449 seconds
INFO [2022-12-06 17:22:17,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670340136.9555593, 'message': 'Dec 6 17:22:16 hqnl0246134 sshd[237415]: Invalid user ohit@123 from 201.236.186.32 port 50482', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0453 seconds
INFO [2022-12-06 17:22:17,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.236.186.32', 'timestamp': 1670340136.955819, 'message': 'Dec 6 17:22:16 hqnl0246134 sshd[237415]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.236.186.32 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 17:22:17,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.236.186.32', 'timestamp': 1670340136.9560008, 'message': 'Dec 6 17:22:16 hqnl0246134 sshd[237415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.186.32 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:22:18,092] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:22:18,093] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:22:18,101] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:22:18,113] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 17:22:19,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670340138.9567604, 'message': 'Dec 6 17:22:18 hqnl0246134 sshd[237415]: Failed password for invalid user ohit@123 from 201.236.186.32 port 50482 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0464 seconds
INFO [2022-12-06 17:22:20,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670340140.9577396, 'message': 'Dec 6 17:22:19 hqnl0246134 sshd[237415]: Disconnected from invalid user ohit@123 201.236.186.32 port 50482 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 17:22:21,404] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:22:21,404] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:22:21,411] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:22:21,424] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
WARNING [2022-12-06 17:22:47,571] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:22:47,572] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:22:55,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340174.9991565, 'message': 'Dec 6 17:22:53 hqnl0246134 sshd[237450]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 17:22:55,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340174.999607, 'message': 'Dec 6 17:22:53 hqnl0246134 sshd[237450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 17:22:55,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340174.999771, 'message': 'Dec 6 17:22:54 hqnl0246134 sshd[237450]: Failed password for root from 61.177.173.18 port 57153 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 17:22:57,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340176.9986093, 'message': 'Dec 6 17:22:55 hqnl0246134 sshd[237450]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 17:22:57,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340176.9989967, 'message': 'Dec 6 17:22:56 hqnl0246134 sshd[237450]: Failed password for root from 61.177.173.18 port 57153 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:22:59,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340178.9998477, 'message': 'Dec 6 17:22:57 hqnl0246134 sshd[237450]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 17:23:01,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340181.0017333, 'message': 'Dec 6 17:22:59 hqnl0246134 sshd[237450]: Failed password for root from 61.177.173.18 port 57153 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 17:23:09,140] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:23:09,231] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.1233 seconds
INFO [2022-12-06 17:23:18,066] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:23:18,067] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:23:18,081] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:23:18,101] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0329 seconds
INFO [2022-12-06 17:23:20,765] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:23:20,765] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:23:20,774] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:23:20,787] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 17:23:45,090] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340225.0687206, 'message': 'Dec 6 17:23:43 hqnl0246134 sshd[237490]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 17:23:45,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340225.0690382, 'message': 'Dec 6 17:23:43 hqnl0246134 sshd[237490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 17:23:47,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340227.073029, 'message': 'Dec 6 17:23:45 hqnl0246134 sshd[237490]: Failed password for root from 61.177.173.18 port 43521 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0221 seconds
WARNING [2022-12-06 17:23:47,577] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:23:47,578] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:23:49,098] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340229.0761213, 'message': 'Dec 6 17:23:47 hqnl0246134 sshd[237490]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 17:23:51,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340231.0801446, 'message': 'Dec 6 17:23:49 hqnl0246134 sshd[237490]: Failed password for root from 61.177.173.18 port 43521 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 17:23:51,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340231.0804837, 'message': 'Dec 6 17:23:49 hqnl0246134 sshd[237490]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 17:23:53,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340233.083102, 'message': 'Dec 6 17:23:51 hqnl0246134 sshd[237490]: Failed password for root from 61.177.173.18 port 43521 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 17:23:54,791] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:23:54,791] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:23:54,799] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:23:54,812] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 17:24:05,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340245.1098204, 'message': 'Dec 6 17:24:05 hqnl0246134 sshd[237541]: Invalid user andy from 212.60.80.58 port 35916', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 17:24:05,153] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340245.1103146, 'message': 'Dec 6 17:24:05 hqnl0246134 sshd[237541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 212.60.80.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 17:24:05,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340245.1104586, 'message': 'Dec 6 17:24:05 hqnl0246134 sshd[237541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.60.80.58 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 17:24:07,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340247.1134522, 'message': 'Dec 6 17:24:06 hqnl0246134 sshd[237541]: Failed password for invalid user andy from 212.60.80.58 port 35916 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:24:07,465] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 17:24:07,525] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 17:24:07,526] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 17:24:07,526] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 17:24:07,526] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 17:24:07,526] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 17:24:07,536] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 17:24:07,552] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0248 seconds
WARNING [2022-12-06 17:24:07,558] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 17:24:07,560] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:24:07,577] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0308 seconds
INFO [2022-12-06 17:24:07,578] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0288 seconds
WARNING [2022-12-06 17:24:09,124] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:24:09,171] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0600 seconds
INFO [2022-12-06 17:24:09,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340249.117292, 'message': 'Dec 6 17:24:07 hqnl0246134 sshd[237541]: Disconnected from invalid user andy 212.60.80.58 port 35916 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0570 seconds
INFO [2022-12-06 17:24:17,905] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:24:17,906] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:24:17,915] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:24:17,933] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0257 seconds
INFO [2022-12-06 17:24:20,596] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:24:20,597] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:24:20,604] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:24:20,616] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 17:24:21,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.249.89.102', 'timestamp': 1670340261.1568255, 'message': 'Dec 6 17:24:20 hqnl0246134 sshd[237546]: Invalid user ts from 201.249.89.102 port 39480', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:24:21,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.249.89.102', 'timestamp': 1670340261.1570501, 'message': 'Dec 6 17:24:21 hqnl0246134 sshd[237546]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.249.89.102 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:24:21,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.249.89.102', 'timestamp': 1670340261.1574545, 'message': 'Dec 6 17:24:21 hqnl0246134 sshd[237546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.249.89.102 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:24:23,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.249.89.102', 'timestamp': 1670340263.1628492, 'message': 'Dec 6 17:24:22 hqnl0246134 sshd[237546]: Failed password for invalid user ts from 201.249.89.102 port 39480 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:24:25,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.249.89.102', 'timestamp': 1670340265.1639485, 'message': 'Dec 6 17:24:23 hqnl0246134 sshd[237546]: Disconnected from invalid user ts 201.249.89.102 port 39480 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 17:24:37,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340277.1901383, 'message': 'Dec 6 17:24:35 hqnl0246134 sshd[237572]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 17:24:37,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340277.1904838, 'message': 'Dec 6 17:24:35 hqnl0246134 sshd[237572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 17:24:37,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340277.1909542, 'message': 'Dec 6 17:24:36 hqnl0246134 sshd[237572]: Failed password for root from 61.177.173.18 port 30071 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:24:39,211] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340279.1931062, 'message': 'Dec 6 17:24:37 hqnl0246134 sshd[237572]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:24:41,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340281.1981168, 'message': 'Dec 6 17:24:39 hqnl0246134 sshd[237572]: Failed password for root from 61.177.173.18 port 30071 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 17:24:41,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340281.1984856, 'message': 'Dec 6 17:24:39 hqnl0246134 sshd[237572]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:24:42,840] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 17:24:42,841] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 17:24:42,841] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 17:24:43,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340283.2016714, 'message': 'Dec 6 17:24:41 hqnl0246134 sshd[237572]: Failed password for root from 61.177.173.18 port 30071 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 17:24:47,581] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:24:47,582] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 17:25:09,126] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:25:09,150] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0332 seconds
INFO [2022-12-06 17:25:18,273] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:25:18,274] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:25:18,284] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:25:18,300] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0246 seconds
INFO [2022-12-06 17:25:21,033] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:25:21,034] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:25:21,046] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:25:21,058] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0224 seconds
INFO [2022-12-06 17:25:27,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340327.2795622, 'message': 'Dec 6 17:25:26 hqnl0246134 sshd[237635]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 17:25:27,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340327.2801096, 'message': 'Dec 6 17:25:26 hqnl0246134 sshd[237635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:25:29,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340329.2813861, 'message': 'Dec 6 17:25:28 hqnl0246134 sshd[237635]: Failed password for root from 61.177.173.18 port 16097 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 17:25:29,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340329.285576, 'message': 'Dec 6 17:25:29 hqnl0246134 sshd[237635]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 17:25:31,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340331.2846057, 'message': 'Dec 6 17:25:30 hqnl0246134 sshd[237635]: Failed password for root from 61.177.173.18 port 16097 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:25:33,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340333.287938, 'message': 'Dec 6 17:25:31 hqnl0246134 sshd[237635]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:25:35,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340335.2902095, 'message': 'Dec 6 17:25:33 hqnl0246134 sshd[237635]: Failed password for root from 61.177.173.18 port 16097 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 17:25:36,802] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:25:36,803] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:25:36,810] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:25:36,822] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
WARNING [2022-12-06 17:25:47,587] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:25:47,588] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 17:26:09,134] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:26:09,156] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0308 seconds
INFO [2022-12-06 17:26:17,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340377.3467324, 'message': 'Dec 6 17:26:16 hqnl0246134 sshd[237666]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 17:26:17,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340377.3471735, 'message': 'Dec 6 17:26:16 hqnl0246134 sshd[237666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:26:17,952] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:26:17,953] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:26:17,964] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:26:17,977] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0211 seconds
INFO [2022-12-06 17:26:19,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340379.3503902, 'message': 'Dec 6 17:26:18 hqnl0246134 sshd[237666]: Failed password for root from 61.177.173.18 port 50004 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 17:26:20,695] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:26:20,695] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:26:20,703] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:26:20,714] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 17:26:21,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340381.3520079, 'message': 'Dec 6 17:26:20 hqnl0246134 sshd[237666]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:26:23,382] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340383.3564808, 'message': 'Dec 6 17:26:22 hqnl0246134 sshd[237666]: Failed password for root from 61.177.173.18 port 50004 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 17:26:23,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340383.3568642, 'message': 'Dec 6 17:26:23 hqnl0246134 sshd[237666]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 17:26:25,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340385.360429, 'message': 'Dec 6 17:26:25 hqnl0246134 sshd[237666]: Failed password for root from 61.177.173.18 port 50004 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 17:26:33,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340393.379101, 'message': 'Dec 6 17:26:32 hqnl0246134 sshd[237690]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 17:26:33,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340393.379395, 'message': 'Dec 6 17:26:32 hqnl0246134 sshd[237690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:26:35,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340395.3822205, 'message': 'Dec 6 17:26:34 hqnl0246134 sshd[237690]: Failed password for root from 61.177.172.19 port 26134 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 17:26:35,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340395.3825903, 'message': 'Dec 6 17:26:34 hqnl0246134 sshd[237690]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 17:26:37,406] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340397.385884, 'message': 'Dec 6 17:26:37 hqnl0246134 sshd[237690]: Failed password for root from 61.177.172.19 port 26134 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 17:26:39,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340399.3903143, 'message': 'Dec 6 17:26:39 hqnl0246134 sshd[237690]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 17:26:41,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340401.3931088, 'message': 'Dec 6 17:26:41 hqnl0246134 sshd[237690]: Failed password for root from 61.177.172.19 port 26134 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 17:26:43,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340403.3945365, 'message': 'Dec 6 17:26:42 hqnl0246134 sshd[237694]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 17:26:43,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340403.3947678, 'message': 'Dec 6 17:26:42 hqnl0246134 sshd[237694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 17:26:44,159] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:26:44,159] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:26:44,167] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:26:44,179] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 17:26:45,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340405.3973103, 'message': 'Dec 6 17:26:44 hqnl0246134 sshd[237694]: Failed password for root from 61.177.172.19 port 11078 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 17:26:45,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340405.3976438, 'message': 'Dec 6 17:26:45 hqnl0246134 sshd[237694]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 17:26:47,592] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:26:47,593] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:26:49,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340409.4021335, 'message': 'Dec 6 17:26:47 hqnl0246134 sshd[237694]: Failed password for root from 61.177.172.19 port 11078 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 17:26:51,426] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340411.4061644, 'message': 'Dec 6 17:26:49 hqnl0246134 sshd[237694]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 17:26:53,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340413.4111812, 'message': 'Dec 6 17:26:51 hqnl0246134 sshd[237694]: Failed password for root from 61.177.172.19 port 11078 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:26:55,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340415.4156702, 'message': 'Dec 6 17:26:53 hqnl0246134 sshd[237710]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 17:26:55,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340415.4160845, 'message': 'Dec 6 17:26:53 hqnl0246134 sshd[237710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 17:26:55,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340415.4162145, 'message': 'Dec 6 17:26:55 hqnl0246134 sshd[237710]: Failed password for root from 61.177.172.19 port 34265 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 17:26:57,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340417.4180548, 'message': 'Dec 6 17:26:56 hqnl0246134 sshd[237710]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 17:26:59,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340419.4215055, 'message': 'Dec 6 17:26:58 hqnl0246134 sshd[237710]: Failed password for root from 61.177.172.19 port 34265 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:27:01,444] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340421.4242837, 'message': 'Dec 6 17:27:00 hqnl0246134 sshd[237710]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 17:27:03,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340423.4274163, 'message': 'Dec 6 17:27:02 hqnl0246134 sshd[237710]: Failed password for root from 61.177.172.19 port 34265 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 17:27:05,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340425.4306104, 'message': 'Dec 6 17:27:04 hqnl0246134 sshd[237728]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 17:27:05,468] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340425.4307878, 'message': 'Dec 6 17:27:04 hqnl0246134 sshd[237728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:27:07,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340427.4363024, 'message': 'Dec 6 17:27:06 hqnl0246134 sshd[237728]: Failed password for root from 61.177.172.19 port 61276 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
WARNING [2022-12-06 17:27:09,139] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:27:09,158] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0265 seconds
INFO [2022-12-06 17:27:09,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340429.4418194, 'message': 'Dec 6 17:27:07 hqnl0246134 sshd[237730]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 17:27:09,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340429.4423308, 'message': 'Dec 6 17:27:08 hqnl0246134 sshd[237728]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 17:27:09,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340429.4421332, 'message': 'Dec 6 17:27:07 hqnl0246134 sshd[237730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:27:11,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340431.4446988, 'message': 'Dec 6 17:27:09 hqnl0246134 sshd[237730]: Failed password for root from 61.177.173.18 port 34376 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 17:27:11,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340431.4450395, 'message': 'Dec 6 17:27:11 hqnl0246134 sshd[237728]: Failed password for root from 61.177.172.19 port 61276 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 17:27:11,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340431.4449031, 'message': 'Dec 6 17:27:09 hqnl0246134 sshd[237730]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 17:27:13,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340433.4484248, 'message': 'Dec 6 17:27:12 hqnl0246134 sshd[237730]: Failed password for root from 61.177.173.18 port 34376 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0492 seconds
INFO [2022-12-06 17:27:13,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340433.4486396, 'message': 'Dec 6 17:27:12 hqnl0246134 sshd[237732]: Invalid user user from 212.60.80.58 port 58637', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0496 seconds
INFO [2022-12-06 17:27:13,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340433.4490108, 'message': 'Dec 6 17:27:13 hqnl0246134 sshd[237728]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0495 seconds
INFO [2022-12-06 17:27:13,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340433.448802, 'message': 'Dec 6 17:27:12 hqnl0246134 sshd[237732]: pam_imunify(sshd:auth): [IM360_RBL] The IP 212.60.80.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:27:13,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340433.448908, 'message': 'Dec 6 17:27:12 hqnl0246134 sshd[237732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.60.80.58 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:27:15,496] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340435.4512534, 'message': 'Dec 6 17:27:13 hqnl0246134 sshd[237732]: Failed password for invalid user user from 212.60.80.58 port 58637 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0441 seconds
INFO [2022-12-06 17:27:15,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340435.4515536, 'message': 'Dec 6 17:27:14 hqnl0246134 sshd[237730]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-06 17:27:15,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670340435.4516764, 'message': 'Dec 6 17:27:15 hqnl0246134 sshd[237728]: Failed password for root from 61.177.172.19 port 61276 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-06 17:27:15,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340435.4514382, 'message': 'Dec 6 17:27:14 hqnl0246134 sshd[237732]: Disconnected from invalid user user 212.60.80.58 port 58637 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 17:27:17,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340437.4556978, 'message': 'Dec 6 17:27:16 hqnl0246134 sshd[237730]: Failed password for root from 61.177.173.18 port 34376 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 17:27:17,990] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:27:17,991] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:27:17,999] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:27:18,012] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 17:27:20,674] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:27:20,674] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:27:20,683] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:27:20,694] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
WARNING [2022-12-06 17:27:47,597] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:27:47,599] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:27:51,554] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340471.5234315, 'message': 'Dec 6 17:27:50 hqnl0246134 sshd[237790]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 17:27:51,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340471.5241804, 'message': 'Dec 6 17:27:50 hqnl0246134 sshd[237790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.47 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 17:27:53,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340473.5239637, 'message': 'Dec 6 17:27:52 hqnl0246134 sshd[237790]: Failed password for root from 61.177.173.47 port 48690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 17:27:53,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340473.5241752, 'message': 'Dec 6 17:27:53 hqnl0246134 sshd[237790]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 17:27:55,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340475.5278146, 'message': 'Dec 6 17:27:54 hqnl0246134 sshd[237790]: Failed password for root from 61.177.173.47 port 48690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:27:55,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340475.528065, 'message': 'Dec 6 17:27:55 hqnl0246134 sshd[237790]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:27:57,548] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340477.529902, 'message': 'Dec 6 17:27:57 hqnl0246134 sshd[237792]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 17:27:57,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340477.530208, 'message': 'Dec 6 17:27:57 hqnl0246134 sshd[237792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 17:27:59,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340479.5320044, 'message': 'Dec 6 17:27:57 hqnl0246134 sshd[237790]: Failed password for root from 61.177.173.47 port 48690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 17:28:01,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340481.5355146, 'message': 'Dec 6 17:27:59 hqnl0246134 sshd[237792]: Failed password for root from 61.177.173.18 port 11760 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:28:02,679] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:28:02,679] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:28:02,690] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:28:02,706] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0253 seconds
INFO [2022-12-06 17:28:03,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340483.5367794, 'message': 'Dec 6 17:28:01 hqnl0246134 sshd[237792]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 17:28:03,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340483.5370584, 'message': 'Dec 6 17:28:02 hqnl0246134 sshd[237796]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 17:28:03,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340483.5372384, 'message': 'Dec 6 17:28:02 hqnl0246134 sshd[237796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.47 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:28:05,580] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340485.5392938, 'message': 'Dec 6 17:28:03 hqnl0246134 sshd[237792]: Failed password for root from 61.177.173.18 port 11760 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0399 seconds
INFO [2022-12-06 17:28:05,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340485.53958, 'message': 'Dec 6 17:28:03 hqnl0246134 sshd[237796]: Failed password for root from 61.177.173.47 port 20048 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0403 seconds
INFO [2022-12-06 17:28:05,617] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340485.5399354, 'message': 'Dec 6 17:28:04 hqnl0246134 sshd[237792]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 17:28:05,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340485.5397534, 'message': 'Dec 6 17:28:04 hqnl0246134 sshd[237796]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 17:28:07,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670340487.5425057, 'message': 'Dec 6 17:28:06 hqnl0246134 sshd[237812]: Invalid user eoffice from 201.236.186.32 port 45828', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0506 seconds
INFO [2022-12-06 17:28:07,595] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340487.5427241, 'message': 'Dec 6 17:28:06 hqnl0246134 sshd[237796]: Failed password for root from 61.177.173.47 port 20048 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0513 seconds
INFO [2022-12-06 17:28:07,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340487.5428345, 'message': 'Dec 6 17:28:06 hqnl0246134 sshd[237792]: Failed password for root from 61.177.173.18 port 11760 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-06 17:28:07,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.236.186.32', 'timestamp': 1670340487.542942, 'message': 'Dec 6 17:28:06 hqnl0246134 sshd[237812]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.236.186.32 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 17:28:07,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340487.5432017, 'message': 'Dec 6 17:28:06 hqnl0246134 sshd[237796]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 17:28:07,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.236.186.32', 'timestamp': 1670340487.5430474, 'message': 'Dec 6 17:28:06 hqnl0246134 sshd[237812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.186.32 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 17:28:09,142] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:28:09,170] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0357 seconds
INFO [2022-12-06 17:28:09,578] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670340489.5451033, 'message': 'Dec 6 17:28:08 hqnl0246134 sshd[237812]: Failed password for invalid user eoffice from 201.236.186.32 port 45828 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 17:28:09,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340489.545437, 'message': 'Dec 6 17:28:08 hqnl0246134 sshd[237796]: Failed password for root from 61.177.173.47 port 20048 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 17:28:09,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.236.186.32', 'timestamp': 1670340489.5452957, 'message': 'Dec 6 17:28:08 hqnl0246134 sshd[237812]: Disconnected from invalid user eoffice 201.236.186.32 port 45828 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:28:11,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340491.5475614, 'message': 'Dec 6 17:28:10 hqnl0246134 sshd[237814]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 17:28:11,607] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340491.5478644, 'message': 'Dec 6 17:28:10 hqnl0246134 sshd[237814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.47 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 17:28:13,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340493.5496528, 'message': 'Dec 6 17:28:13 hqnl0246134 sshd[237814]: Failed password for root from 61.177.173.47 port 37289 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 17:28:15,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340495.5513802, 'message': 'Dec 6 17:28:15 hqnl0246134 sshd[237814]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0575 seconds
INFO [2022-12-06 17:28:17,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340497.5537543, 'message': 'Dec 6 17:28:17 hqnl0246134 sshd[237814]: Failed password for root from 61.177.173.47 port 37289 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 17:28:19,199] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:28:19,200] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:28:19,265] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:28:19,312] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0924 seconds
INFO [2022-12-06 17:28:19,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340499.555332, 'message': 'Dec 6 17:28:19 hqnl0246134 sshd[237814]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.47 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0378 seconds
INFO [2022-12-06 17:28:22,198] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:28:22,198] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:28:22,206] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:28:22,219] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 17:28:23,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.47', 'timestamp': 1670340503.558089, 'message': 'Dec 6 17:28:21 hqnl0246134 sshd[237814]: Failed password for root from 61.177.173.47 port 37289 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:28:26,531] defence360agent.files: Updating all files
INFO [2022-12-06 17:28:26,813] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 17:28:26,814] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 17:28:27,101] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 17:28:27,101] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 17:28:27,463] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 17:28:27,464] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 17:28:27,790] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 17:28:27,790] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 17:28:27,791] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 17:28:28,115] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 15:28:28 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E3DD79E433226'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 17:28:28,117] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 17:28:28,118] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 17:28:28,650] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 17:28:28,651] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 17:28:28,972] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 17:28:28,973] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 17:28:29,290] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 17:28:29,291] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 17:28:29,748] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 17:28:29,748] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 17:28:30,162] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 17:28:30,163] defence360agent.files: geo files update finished (not updated)
WARNING [2022-12-06 17:28:47,601] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:28:47,602] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:28:49,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340529.6159956, 'message': 'Dec 6 17:28:49 hqnl0246134 sshd[237843]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 17:28:49,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340529.616742, 'message': 'Dec 6 17:28:49 hqnl0246134 sshd[237843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 17:28:51,644] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340531.6249628, 'message': 'Dec 6 17:28:50 hqnl0246134 sshd[237843]: Failed password for root from 61.177.173.18 port 55797 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 17:28:51,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340531.6251905, 'message': 'Dec 6 17:28:51 hqnl0246134 sshd[237843]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 17:28:53,654] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340533.6341796, 'message': 'Dec 6 17:28:53 hqnl0246134 sshd[237843]: Failed password for root from 61.177.173.18 port 55797 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:28:55,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340535.6375654, 'message': 'Dec 6 17:28:53 hqnl0246134 sshd[237843]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 17:28:55,675] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340535.6378155, 'message': 'Dec 6 17:28:55 hqnl0246134 sshd[237843]: Failed password for root from 61.177.173.18 port 55797 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 17:29:09,146] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:29:09,168] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0300 seconds
INFO [2022-12-06 17:29:13,895] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 17:29:13,969] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 17:29:13,970] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 17:29:13,970] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 17:29:13,970] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 17:29:13,971] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 17:29:13,980] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 17:29:13,997] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0256 seconds
WARNING [2022-12-06 17:29:14,004] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 17:29:14,006] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:29:14,024] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0328 seconds
INFO [2022-12-06 17:29:14,025] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0307 seconds
INFO [2022-12-06 17:29:17,990] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:29:17,990] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:29:18,002] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:29:18,023] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0319 seconds
INFO [2022-12-06 17:29:22,769] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:29:22,769] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:29:22,779] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:29:22,792] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 17:29:41,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340581.7089858, 'message': 'Dec 6 17:29:39 hqnl0246134 sshd[237890]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 17:29:41,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340581.7094016, 'message': 'Dec 6 17:29:39 hqnl0246134 sshd[237890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:29:41,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340581.7096562, 'message': 'Dec 6 17:29:41 hqnl0246134 sshd[237890]: Failed password for root from 61.177.173.18 port 33243 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:29:43,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340583.7093575, 'message': 'Dec 6 17:29:42 hqnl0246134 sshd[237890]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 17:29:44,105] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 17:29:44,106] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 17:29:44,106] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 17:29:45,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340585.7131107, 'message': 'Dec 6 17:29:44 hqnl0246134 sshd[237890]: Failed password for root from 61.177.173.18 port 33243 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 17:29:45,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340585.7135463, 'message': 'Dec 6 17:29:44 hqnl0246134 sshd[237890]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 17:29:47,610] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:29:47,611] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:29:47,735] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340587.7164345, 'message': 'Dec 6 17:29:47 hqnl0246134 sshd[237890]: Failed password for root from 61.177.173.18 port 33243 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:29:51,833] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:29:51,834] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:29:51,843] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:29:51,856] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
WARNING [2022-12-06 17:30:09,154] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:30:09,188] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0437 seconds
INFO [2022-12-06 17:30:15,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340615.7690353, 'message': 'Dec 6 17:30:15 hqnl0246134 sshd[237936]: pam_imunify(sshd:auth): [IM360_RBL] The IP 212.60.80.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 17:30:15,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340615.7693715, 'message': 'Dec 6 17:30:15 hqnl0246134 sshd[237936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.60.80.58 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 17:30:17,975] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:30:17,975] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:30:17,983] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:30:17,998] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 17:30:19,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '212.60.80.58', 'timestamp': 1670340619.7747874, 'message': 'Dec 6 17:30:17 hqnl0246134 sshd[237936]: Failed password for root from 212.60.80.58 port 54448 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1407 seconds
INFO [2022-12-06 17:30:20,946] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:30:20,947] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:30:20,954] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:30:20,965] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 17:30:27,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340627.7936997, 'message': 'Dec 6 17:30:27 hqnl0246134 sshd[237960]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:30:27,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340627.7940028, 'message': 'Dec 6 17:30:27 hqnl0246134 sshd[237960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 17:30:29,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340629.7997966, 'message': 'Dec 6 17:30:29 hqnl0246134 sshd[237960]: Failed password for root from 61.177.173.18 port 14707 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:30:31,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340631.8059368, 'message': 'Dec 6 17:30:31 hqnl0246134 sshd[237960]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:30:33,833] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340633.8127203, 'message': 'Dec 6 17:30:33 hqnl0246134 sshd[237960]: Failed password for root from 61.177.173.18 port 14707 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 17:30:35,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340635.8195832, 'message': 'Dec 6 17:30:33 hqnl0246134 sshd[237960]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 17:30:35,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340635.8198557, 'message': 'Dec 6 17:30:35 hqnl0246134 sshd[237960]: Failed password for root from 61.177.173.18 port 14707 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 17:30:47,628] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:30:47,630] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 17:31:09,170] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:31:09,199] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0402 seconds
INFO [2022-12-06 17:31:18,097] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:31:18,097] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:31:18,108] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:31:18,126] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0279 seconds
INFO [2022-12-06 17:31:19,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340679.92637, 'message': 'Dec 6 17:31:19 hqnl0246134 sshd[237990]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 17:31:20,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340679.9267707, 'message': 'Dec 6 17:31:19 hqnl0246134 sshd[237990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0513 seconds
INFO [2022-12-06 17:31:21,494] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:31:21,495] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:31:21,514] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:31:21,533] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0271 seconds
INFO [2022-12-06 17:31:21,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340681.9261591, 'message': 'Dec 6 17:31:21 hqnl0246134 sshd[237990]: Failed password for root from 61.177.173.18 port 60430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 17:31:21,976] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340681.92643, 'message': 'Dec 6 17:31:21 hqnl0246134 sshd[237990]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:31:25,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340685.9332168, 'message': 'Dec 6 17:31:24 hqnl0246134 sshd[237990]: Failed password for root from 61.177.173.18 port 60430 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 17:31:27,971] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340687.9338899, 'message': 'Dec 6 17:31:26 hqnl0246134 sshd[237990]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 17:31:29,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340689.937369, 'message': 'Dec 6 17:31:27 hqnl0246134 sshd[237990]: Failed password for root from 61.177.173.18 port 60430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 17:31:31,122] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:31:31,122] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:31:31,130] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:31:31,142] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
WARNING [2022-12-06 17:31:47,639] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:31:47,641] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 17:31:53,362] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 17:32:09,182] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:32:09,218] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0551 seconds
INFO [2022-12-06 17:32:12,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340731.997267, 'message': 'Dec 6 17:32:10 hqnl0246134 sshd[238074]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 17:32:12,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340731.9976466, 'message': 'Dec 6 17:32:10 hqnl0246134 sshd[238074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 17:32:14,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340733.9976985, 'message': 'Dec 6 17:32:13 hqnl0246134 sshd[238074]: Failed password for root from 61.177.173.18 port 41294 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 17:32:16,029] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340735.9999526, 'message': 'Dec 6 17:32:15 hqnl0246134 sshd[238074]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 17:32:18,135] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:32:18,136] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 17:32:18,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340738.0013323, 'message': 'Dec 6 17:32:17 hqnl0246134 sshd[238074]: Failed password for root from 61.177.173.18 port 41294 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1452 seconds
WARNING [2022-12-06 17:32:18,150] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:32:18,161] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0234 seconds
INFO [2022-12-06 17:32:20,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340740.0045574, 'message': 'Dec 6 17:32:19 hqnl0246134 sshd[238074]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 17:32:21,062] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:32:21,063] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:32:21,075] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:32:21,097] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0338 seconds
INFO [2022-12-06 17:32:22,024] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340742.0063503, 'message': 'Dec 6 17:32:21 hqnl0246134 sshd[238074]: Failed password for root from 61.177.173.18 port 41294 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 17:32:47,643] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:32:47,645] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:33:04,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340784.0558727, 'message': 'Dec 6 17:33:02 hqnl0246134 sshd[238124]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 17:33:04,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340784.0567825, 'message': 'Dec 6 17:33:02 hqnl0246134 sshd[238124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 17:33:06,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340786.0557225, 'message': 'Dec 6 17:33:05 hqnl0246134 sshd[238124]: Failed password for root from 61.177.173.18 port 19912 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 17:33:08,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340788.1347528, 'message': 'Dec 6 17:33:07 hqnl0246134 sshd[238124]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 17:33:09,178] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:33:09,209] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0413 seconds
INFO [2022-12-06 17:33:10,079] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340790.0612476, 'message': 'Dec 6 17:33:09 hqnl0246134 sshd[238124]: Failed password for root from 61.177.173.18 port 19912 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:33:12,098] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340792.065046, 'message': 'Dec 6 17:33:11 hqnl0246134 sshd[238126]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 17:33:12,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340792.0654154, 'message': 'Dec 6 17:33:12 hqnl0246134 sshd[238124]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 17:33:12,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340792.0652692, 'message': 'Dec 6 17:33:11 hqnl0246134 sshd[238126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.53 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 17:33:16,120] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340796.0699556, 'message': 'Dec 6 17:33:14 hqnl0246134 sshd[238124]: Failed password for root from 61.177.173.18 port 19912 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0488 seconds
INFO [2022-12-06 17:33:16,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340796.0702999, 'message': 'Dec 6 17:33:14 hqnl0246134 sshd[238126]: Failed password for root from 61.177.173.53 port 38182 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 17:33:16,156] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340796.0705523, 'message': 'Dec 6 17:33:15 hqnl0246134 sshd[238126]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 17:33:18,111] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:33:18,111] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:33:18,122] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:33:18,147] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0349 seconds
INFO [2022-12-06 17:33:18,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340798.1131988, 'message': 'Dec 6 17:33:17 hqnl0246134 sshd[238126]: Failed password for root from 61.177.173.53 port 38182 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 17:33:19,047] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:33:19,047] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:33:19,054] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:33:19,067] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 17:33:20,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340800.075155, 'message': 'Dec 6 17:33:18 hqnl0246134 sshd[238126]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 17:33:20,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340800.0754714, 'message': 'Dec 6 17:33:19 hqnl0246134 sshd[238126]: Failed password for root from 61.177.173.53 port 38182 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 17:33:20,916] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:33:20,916] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:33:20,923] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:33:20,936] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 17:33:24,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340804.0818563, 'message': 'Dec 6 17:33:23 hqnl0246134 sshd[238153]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:33:24,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340804.0821116, 'message': 'Dec 6 17:33:23 hqnl0246134 sshd[238153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.53 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 17:33:28,110] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340808.0896595, 'message': 'Dec 6 17:33:26 hqnl0246134 sshd[238153]: Failed password for root from 61.177.173.53 port 47909 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 17:33:30,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340810.0929036, 'message': 'Dec 6 17:33:28 hqnl0246134 sshd[238153]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 17:33:32,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340812.1028376, 'message': 'Dec 6 17:33:30 hqnl0246134 sshd[238153]: Failed password for root from 61.177.173.53 port 47909 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:33:34,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340814.1123726, 'message': 'Dec 6 17:33:32 hqnl0246134 sshd[238153]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 17:33:36,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670340816.116794, 'message': 'Dec 6 17:33:34 hqnl0246134 sshd[238153]: Failed password for root from 61.177.173.53 port 47909 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
WARNING [2022-12-06 17:33:47,649] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:33:47,650] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:33:56,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340836.1418915, 'message': 'Dec 6 17:33:54 hqnl0246134 sshd[238172]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 17:33:56,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340836.1425393, 'message': 'Dec 6 17:33:54 hqnl0246134 sshd[238172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:33:58,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340838.1423538, 'message': 'Dec 6 17:33:56 hqnl0246134 sshd[238172]: Failed password for root from 61.177.173.18 port 54741 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 17:33:58,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340838.1427855, 'message': 'Dec 6 17:33:56 hqnl0246134 sshd[238172]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 17:34:00,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340840.1442742, 'message': 'Dec 6 17:33:58 hqnl0246134 sshd[238172]: Failed password for root from 61.177.173.18 port 54741 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 17:34:00,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340840.144569, 'message': 'Dec 6 17:33:58 hqnl0246134 sshd[238172]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:34:02,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340842.1459892, 'message': 'Dec 6 17:34:01 hqnl0246134 sshd[238172]: Failed password for root from 61.177.173.18 port 54741 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
WARNING [2022-12-06 17:34:09,182] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:34:09,208] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0354 seconds
INFO [2022-12-06 17:34:17,876] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:34:17,877] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:34:17,885] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:34:17,896] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 17:34:20,582] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:34:20,582] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:34:20,590] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:34:20,602] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 17:34:46,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340886.210741, 'message': 'Dec 6 17:34:45 hqnl0246134 sshd[238212]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 17:34:46,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340886.210998, 'message': 'Dec 6 17:34:45 hqnl0246134 sshd[238212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0259 seconds
WARNING [2022-12-06 17:34:47,652] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:34:47,653] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:34:48,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340888.2127626, 'message': 'Dec 6 17:34:47 hqnl0246134 sshd[238212]: Failed password for root from 61.177.173.18 port 40535 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 17:34:50,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340890.2176754, 'message': 'Dec 6 17:34:49 hqnl0246134 sshd[238212]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 17:34:52,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340892.2205892, 'message': 'Dec 6 17:34:51 hqnl0246134 sshd[238212]: Failed password for root from 61.177.173.18 port 40535 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 17:34:52,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340892.2210116, 'message': 'Dec 6 17:34:52 hqnl0246134 sshd[238212]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 17:34:54,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340894.2219493, 'message': 'Dec 6 17:34:54 hqnl0246134 sshd[238212]: Failed password for root from 61.177.173.18 port 40535 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 17:34:57,536] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:34:57,537] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:34:57,545] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:34:57,558] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
WARNING [2022-12-06 17:35:09,183] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:35:09,207] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0317 seconds
INFO [2022-12-06 17:35:17,904] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:35:17,905] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:35:17,912] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:35:17,923] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 17:35:20,540] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:35:20,540] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:35:20,549] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:35:20,561] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 17:35:34,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340934.2946846, 'message': 'Dec 6 17:35:33 hqnl0246134 sshd[238286]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 17:35:34,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340934.2949991, 'message': 'Dec 6 17:35:33 hqnl0246134 sshd[238286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:35:36,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340936.2994986, 'message': 'Dec 6 17:35:35 hqnl0246134 sshd[238286]: Failed password for root from 61.177.173.18 port 11631 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 17:35:38,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340938.3004541, 'message': 'Dec 6 17:35:37 hqnl0246134 sshd[238286]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:35:40,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340940.3022494, 'message': 'Dec 6 17:35:39 hqnl0246134 sshd[238286]: Failed password for root from 61.177.173.18 port 11631 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 17:35:40,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340940.302496, 'message': 'Dec 6 17:35:40 hqnl0246134 sshd[238286]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 17:35:42,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340942.304961, 'message': 'Dec 6 17:35:41 hqnl0246134 sshd[238286]: Failed password for root from 61.177.173.18 port 11631 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
WARNING [2022-12-06 17:35:47,656] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:35:47,658] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 17:36:09,192] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:36:09,224] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0431 seconds
INFO [2022-12-06 17:36:15,220] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 17:36:15,286] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 17:36:15,287] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 17:36:15,287] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 17:36:15,287] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 17:36:15,288] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 17:36:15,298] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 17:36:15,319] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0304 seconds
WARNING [2022-12-06 17:36:15,329] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 17:36:15,332] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:36:15,357] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0459 seconds
INFO [2022-12-06 17:36:15,358] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0427 seconds
INFO [2022-12-06 17:36:16,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.70.0', 'timestamp': 1670340976.3554766, 'message': 'Dec 6 17:36:15 hqnl0246134 sshd[238339]: Invalid user support from 51.250.70.0 port 54094', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 17:36:16,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.70.0', 'timestamp': 1670340976.3558018, 'message': 'Dec 6 17:36:16 hqnl0246134 sshd[238339]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.70.0 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 17:36:16,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.70.0', 'timestamp': 1670340976.3559873, 'message': 'Dec 6 17:36:16 hqnl0246134 sshd[238339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.70.0 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0162 seconds
INFO [2022-12-06 17:36:17,992] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:36:17,992] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:36:17,999] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:36:18,011] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 17:36:18,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.70.0', 'timestamp': 1670340978.3553696, 'message': 'Dec 6 17:36:18 hqnl0246134 sshd[238339]: Failed password for invalid user support from 51.250.70.0 port 54094 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 17:36:20,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.70.0', 'timestamp': 1670340980.3575869, 'message': 'Dec 6 17:36:19 hqnl0246134 sshd[238339]: Disconnected from invalid user support 51.250.70.0 port 54094 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 17:36:21,078] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:36:21,078] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:36:21,089] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:36:21,105] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0254 seconds
INFO [2022-12-06 17:36:22,126] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:36:22,126] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:36:22,143] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:36:22,186] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0497 seconds
INFO [2022-12-06 17:36:26,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340986.361928, 'message': 'Dec 6 17:36:24 hqnl0246134 sshd[238365]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 17:36:26,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340986.3638017, 'message': 'Dec 6 17:36:24 hqnl0246134 sshd[238365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 17:36:26,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340986.3639338, 'message': 'Dec 6 17:36:26 hqnl0246134 sshd[238365]: Failed password for root from 61.177.173.18 port 57796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 17:36:28,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340988.3645468, 'message': 'Dec 6 17:36:26 hqnl0246134 sshd[238365]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0750 seconds
INFO [2022-12-06 17:36:30,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340990.370989, 'message': 'Dec 6 17:36:28 hqnl0246134 sshd[238365]: Failed password for root from 61.177.173.18 port 57796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 17:36:30,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340990.371255, 'message': 'Dec 6 17:36:29 hqnl0246134 sshd[238365]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 17:36:32,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670340992.3780978, 'message': 'Dec 6 17:36:31 hqnl0246134 sshd[238365]: Failed password for root from 61.177.173.18 port 57796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 17:36:45,413] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 17:36:45,413] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 17:36:45,414] im360.plugins.client360: Waiting 2 minutes before retry...
WARNING [2022-12-06 17:36:47,661] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:36:47,662] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:37:02,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670341022.4393177, 'message': 'Dec 6 17:37:01 hqnl0246134 sshd[238392]: Invalid user henry from 206.189.87.115 port 41370', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 17:37:02,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.189.87.115', 'timestamp': 1670341022.4400275, 'message': 'Dec 6 17:37:01 hqnl0246134 sshd[238392]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.189.87.115 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:37:02,506] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.189.87.115', 'timestamp': 1670341022.4401948, 'message': 'Dec 6 17:37:01 hqnl0246134 sshd[238392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.115 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 17:37:04,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670341024.4446297, 'message': 'Dec 6 17:37:03 hqnl0246134 sshd[238392]: Failed password for invalid user henry from 206.189.87.115 port 41370 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 17:37:06,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670341026.4466627, 'message': 'Dec 6 17:37:04 hqnl0246134 sshd[238392]: Disconnected from invalid user henry 206.189.87.115 port 41370 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 17:37:09,193] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:37:09,235] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0510 seconds
INFO [2022-12-06 17:37:14,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341034.4580433, 'message': 'Dec 6 17:37:14 hqnl0246134 sshd[238402]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 17:37:14,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341034.4583585, 'message': 'Dec 6 17:37:14 hqnl0246134 sshd[238402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 17:37:16,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341036.4599395, 'message': 'Dec 6 17:37:16 hqnl0246134 sshd[238402]: Failed password for root from 61.177.173.18 port 34440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 17:37:17,924] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:37:17,924] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:37:17,932] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:37:17,943] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 17:37:20,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341040.473066, 'message': 'Dec 6 17:37:18 hqnl0246134 sshd[238402]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 17:37:20,593] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:37:20,593] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 17:37:20,599] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341040.4736104, 'message': 'Dec 6 17:37:20 hqnl0246134 sshd[238402]: Failed password for root from 61.177.173.18 port 34440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0910 seconds
WARNING [2022-12-06 17:37:20,602] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:37:20,614] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 17:37:22,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341042.4672973, 'message': 'Dec 6 17:37:20 hqnl0246134 sshd[238402]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:37:24,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341044.4699194, 'message': 'Dec 6 17:37:22 hqnl0246134 sshd[238402]: Failed password for root from 61.177.173.18 port 34440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 17:37:47,666] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:37:47,667] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:38:06,563] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341086.5351012, 'message': 'Dec 6 17:38:04 hqnl0246134 sshd[238442]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 17:38:06,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341086.535742, 'message': 'Dec 6 17:38:04 hqnl0246134 sshd[238442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 17:38:08,554] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341088.536434, 'message': 'Dec 6 17:38:07 hqnl0246134 sshd[238442]: Failed password for root from 61.177.173.18 port 15680 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 17:38:09,209] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:38:09,232] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0305 seconds
INFO [2022-12-06 17:38:10,560] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341090.539899, 'message': 'Dec 6 17:38:09 hqnl0246134 sshd[238442]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 17:38:12,560] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341092.5427365, 'message': 'Dec 6 17:38:11 hqnl0246134 sshd[238442]: Failed password for root from 61.177.173.18 port 15680 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:38:14,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341094.5457253, 'message': 'Dec 6 17:38:13 hqnl0246134 sshd[238442]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:38:16,569] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341096.548597, 'message': 'Dec 6 17:38:15 hqnl0246134 sshd[238442]: Failed password for root from 61.177.173.18 port 15680 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 17:38:18,346] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:38:18,346] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:38:18,362] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:38:18,377] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0303 seconds
INFO [2022-12-06 17:38:18,891] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:38:18,892] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:38:18,900] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:38:18,911] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 17:38:21,081] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:38:21,082] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:38:21,090] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:38:21,102] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 17:38:22,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.249.89.102', 'timestamp': 1670341102.5558, 'message': 'Dec 6 17:38:22 hqnl0246134 sshd[238446]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.249.89.102 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 17:38:22,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.249.89.102', 'timestamp': 1670341102.5561948, 'message': 'Dec 6 17:38:22 hqnl0246134 sshd[238446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.249.89.102 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:38:24,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '201.249.89.102', 'timestamp': 1670341104.5578268, 'message': 'Dec 6 17:38:24 hqnl0246134 sshd[238446]: Failed password for root from 201.249.89.102 port 59958 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0233 seconds
WARNING [2022-12-06 17:38:47,671] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:38:47,672] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:38:56,625] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341136.6025267, 'message': 'Dec 6 17:38:55 hqnl0246134 sshd[238492]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 17:38:56,644] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341136.6029043, 'message': 'Dec 6 17:38:55 hqnl0246134 sshd[238492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 17:38:58,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341138.609462, 'message': 'Dec 6 17:38:57 hqnl0246134 sshd[238492]: Failed password for root from 61.177.173.18 port 51723 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 17:38:58,644] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341138.609694, 'message': 'Dec 6 17:38:57 hqnl0246134 sshd[238492]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 17:39:00,637] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341140.6181464, 'message': 'Dec 6 17:38:59 hqnl0246134 sshd[238492]: Failed password for root from 61.177.173.18 port 51723 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:39:00,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341140.6183329, 'message': 'Dec 6 17:38:59 hqnl0246134 sshd[238492]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 17:39:02,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341142.6288185, 'message': 'Dec 6 17:39:01 hqnl0246134 sshd[238492]: Failed password for root from 61.177.173.18 port 51723 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0332 seconds
WARNING [2022-12-06 17:39:09,219] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:39:09,251] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0442 seconds
INFO [2022-12-06 17:39:17,890] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:39:17,891] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:39:17,901] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:39:17,914] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 17:39:20,555] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:39:20,555] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:39:20,564] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:39:20,575] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 17:39:34,475] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 17:39:34,547] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 17:39:34,548] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 17:39:34,548] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 17:39:34,548] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 17:39:34,549] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 17:39:34,563] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 17:39:34,581] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0312 seconds
WARNING [2022-12-06 17:39:34,589] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 17:39:34,591] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:39:34,610] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0349 seconds
INFO [2022-12-06 17:39:34,611] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0325 seconds
INFO [2022-12-06 17:39:42,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341182.6932142, 'message': 'Dec 6 17:39:40 hqnl0246134 sshd[238704]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:39:42,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341182.6935923, 'message': 'Dec 6 17:39:40 hqnl0246134 sshd[238704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 17:39:44,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341184.6944432, 'message': 'Dec 6 17:39:43 hqnl0246134 sshd[238704]: Failed password for root from 61.177.173.39 port 12006 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 17:39:46,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341186.696555, 'message': 'Dec 6 17:39:45 hqnl0246134 sshd[238704]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 17:39:47,674] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:39:47,675] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:39:48,758] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341188.6991315, 'message': 'Dec 6 17:39:46 hqnl0246134 sshd[238704]: Failed password for root from 61.177.173.39 port 12006 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0587 seconds
INFO [2022-12-06 17:39:48,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341188.6994896, 'message': 'Dec 6 17:39:47 hqnl0246134 sshd[238707]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0600 seconds
INFO [2022-12-06 17:39:48,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341188.6993513, 'message': 'Dec 6 17:39:47 hqnl0246134 sshd[238704]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0399 seconds
INFO [2022-12-06 17:39:48,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341188.6996722, 'message': 'Dec 6 17:39:47 hqnl0246134 sshd[238707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0390 seconds
INFO [2022-12-06 17:39:50,740] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341190.7024307, 'message': 'Dec 6 17:39:49 hqnl0246134 sshd[238704]: Failed password for root from 61.177.173.39 port 12006 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-06 17:39:50,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341190.7026505, 'message': 'Dec 6 17:39:49 hqnl0246134 sshd[238707]: Failed password for root from 61.177.173.18 port 41933 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 17:39:52,008] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:39:52,009] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:39:52,025] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:39:52,044] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0341 seconds
INFO [2022-12-06 17:39:52,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341192.7050176, 'message': 'Dec 6 17:39:50 hqnl0246134 sshd[238707]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 17:39:52,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341192.7052963, 'message': 'Dec 6 17:39:51 hqnl0246134 sshd[238711]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 17:39:52,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341192.705493, 'message': 'Dec 6 17:39:51 hqnl0246134 sshd[238711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 17:39:54,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341194.706999, 'message': 'Dec 6 17:39:52 hqnl0246134 sshd[238707]: Failed password for root from 61.177.173.18 port 41933 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 17:39:54,740] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341194.7071853, 'message': 'Dec 6 17:39:53 hqnl0246134 sshd[238711]: Failed password for root from 61.177.173.39 port 37233 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 17:39:54,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341194.7072985, 'message': 'Dec 6 17:39:53 hqnl0246134 sshd[238711]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 17:39:56,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341196.709603, 'message': 'Dec 6 17:39:55 hqnl0246134 sshd[238707]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 17:39:56,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341196.7098322, 'message': 'Dec 6 17:39:55 hqnl0246134 sshd[238711]: Failed password for root from 61.177.173.39 port 37233 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 17:39:56,785] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341196.7099757, 'message': 'Dec 6 17:39:56 hqnl0246134 sshd[238711]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 17:39:58,758] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341198.7120023, 'message': 'Dec 6 17:39:57 hqnl0246134 sshd[238707]: Failed password for root from 61.177.173.18 port 41933 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0456 seconds
INFO [2022-12-06 17:39:58,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341198.7123513, 'message': 'Dec 6 17:39:58 hqnl0246134 sshd[238711]: Failed password for root from 61.177.173.39 port 37233 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0462 seconds
INFO [2022-12-06 17:40:02,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341202.717534, 'message': 'Dec 6 17:40:01 hqnl0246134 sshd[238728]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 17:40:02,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341202.7177782, 'message': 'Dec 6 17:40:01 hqnl0246134 sshd[238728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0542 seconds
INFO [2022-12-06 17:40:04,675] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 17:40:04,675] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 17:40:04,676] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 17:40:04,740] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341204.7190154, 'message': 'Dec 6 17:40:04 hqnl0246134 sshd[238728]: Failed password for root from 61.177.173.39 port 63532 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 17:40:06,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341206.7197182, 'message': 'Dec 6 17:40:06 hqnl0246134 sshd[238728]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
WARNING [2022-12-06 17:40:09,225] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:40:09,263] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0524 seconds
INFO [2022-12-06 17:40:10,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341210.7251866, 'message': 'Dec 6 17:40:09 hqnl0246134 sshd[238728]: Failed password for root from 61.177.173.39 port 63532 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:40:17,801] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:40:17,802] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:40:17,814] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:40:17,835] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0328 seconds
INFO [2022-12-06 17:40:18,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341218.734048, 'message': 'Dec 6 17:40:17 hqnl0246134 sshd[238728]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 17:40:20,476] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:40:20,476] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:40:20,483] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:40:20,495] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 17:40:20,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341220.7362316, 'message': 'Dec 6 17:40:19 hqnl0246134 sshd[238728]: Failed password for root from 61.177.173.39 port 63532 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 17:40:36,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341236.7564032, 'message': 'Dec 6 17:40:36 hqnl0246134 sshd[238804]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 17:40:36,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341236.7568793, 'message': 'Dec 6 17:40:36 hqnl0246134 sshd[238804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 17:40:38,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341238.7574992, 'message': 'Dec 6 17:40:38 hqnl0246134 sshd[238808]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 17:40:38,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341238.7578793, 'message': 'Dec 6 17:40:38 hqnl0246134 sshd[238804]: Failed password for root from 61.177.173.18 port 64572 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-06 17:40:38,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341238.7577534, 'message': 'Dec 6 17:40:38 hqnl0246134 sshd[238808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:40:40,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341240.7606657, 'message': 'Dec 6 17:40:40 hqnl0246134 sshd[238804]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:40:42,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341242.7640707, 'message': 'Dec 6 17:40:40 hqnl0246134 sshd[238808]: Failed password for root from 61.177.172.19 port 29120 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 17:40:42,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341242.764527, 'message': 'Dec 6 17:40:42 hqnl0246134 sshd[238804]: Failed password for root from 61.177.173.18 port 64572 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 17:40:42,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341242.764333, 'message': 'Dec 6 17:40:42 hqnl0246134 sshd[238808]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 17:40:44,802] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341244.766439, 'message': 'Dec 6 17:40:42 hqnl0246134 sshd[238804]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 17:40:44,802] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341244.766643, 'message': 'Dec 6 17:40:44 hqnl0246134 sshd[238808]: Failed password for root from 61.177.172.19 port 29120 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 17:40:46,814] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341246.7695966, 'message': 'Dec 6 17:40:45 hqnl0246134 sshd[238804]: Failed password for root from 61.177.173.18 port 64572 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0437 seconds
INFO [2022-12-06 17:40:46,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341246.769921, 'message': 'Dec 6 17:40:46 hqnl0246134 sshd[238808]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0438 seconds
WARNING [2022-12-06 17:40:47,678] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:40:47,679] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:40:48,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341248.7703543, 'message': 'Dec 6 17:40:48 hqnl0246134 sshd[238808]: Failed password for root from 61.177.172.19 port 29120 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 17:40:50,793] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341250.7727203, 'message': 'Dec 6 17:40:50 hqnl0246134 sshd[238815]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 17:40:50,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341250.7729363, 'message': 'Dec 6 17:40:50 hqnl0246134 sshd[238815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:40:54,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341254.7790618, 'message': 'Dec 6 17:40:53 hqnl0246134 sshd[238815]: Failed password for root from 61.177.172.19 port 63455 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 17:40:56,809] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341256.781525, 'message': 'Dec 6 17:40:55 hqnl0246134 sshd[238815]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 17:40:56,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '163.121.146.133', 'timestamp': 1670341256.7817385, 'message': 'Dec 6 17:40:56 hqnl0246134 sshd[238827]: pam_imunify(sshd:auth): [IM360_RBL] The IP 163.121.146.133 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 17:40:56,827] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '163.121.146.133', 'timestamp': 1670341256.7819026, 'message': 'Dec 6 17:40:56 hqnl0246134 sshd[238827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.121.146.133 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 17:40:58,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341258.7820265, 'message': 'Dec 6 17:40:56 hqnl0246134 sshd[238815]: Failed password for root from 61.177.172.19 port 63455 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 17:40:58,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '163.121.146.133', 'timestamp': 1670341258.7823277, 'message': 'Dec 6 17:40:58 hqnl0246134 sshd[238827]: Failed password for root from 163.121.146.133 port 36912 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 17:40:58,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341258.7822187, 'message': 'Dec 6 17:40:57 hqnl0246134 sshd[238815]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 17:41:00,794] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:41:00,794] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:41:00,805] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:41:00,824] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0285 seconds
INFO [2022-12-06 17:41:00,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341260.7961586, 'message': 'Dec 6 17:40:58 hqnl0246134 sshd[238815]: Failed password for root from 61.177.172.19 port 63455 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 17:41:02,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341262.7861125, 'message': 'Dec 6 17:41:02 hqnl0246134 sshd[238834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 17:41:02,854] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341262.786308, 'message': 'Dec 6 17:41:02 hqnl0246134 sshd[238834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 17:41:06,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341266.7929626, 'message': 'Dec 6 17:41:04 hqnl0246134 sshd[238834]: Failed password for root from 61.177.172.19 port 33929 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 17:41:06,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341266.7931826, 'message': 'Dec 6 17:41:06 hqnl0246134 sshd[238834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 17:41:08,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341268.7944524, 'message': 'Dec 6 17:41:08 hqnl0246134 sshd[238834]: Failed password for root from 61.177.172.19 port 33929 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 17:41:09,228] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:41:09,257] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0426 seconds
INFO [2022-12-06 17:41:10,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341270.7973983, 'message': 'Dec 6 17:41:09 hqnl0246134 sshd[238834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 17:41:10,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341270.7977123, 'message': 'Dec 6 17:41:10 hqnl0246134 sshd[238834]: Failed password for root from 61.177.172.19 port 33929 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:41:14,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341274.8030474, 'message': 'Dec 6 17:41:12 hqnl0246134 sshd[238863]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:41:14,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341274.8033557, 'message': 'Dec 6 17:41:12 hqnl0246134 sshd[238863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 17:41:16,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341276.8054554, 'message': 'Dec 6 17:41:15 hqnl0246134 sshd[238863]: Failed password for root from 61.177.172.19 port 63642 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:41:17,784] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:41:17,785] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:41:17,794] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:41:17,806] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 17:41:18,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341278.8081813, 'message': 'Dec 6 17:41:17 hqnl0246134 sshd[238863]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 17:41:20,232] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:41:20,232] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:41:20,241] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:41:20,259] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0256 seconds
INFO [2022-12-06 17:41:20,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341280.811755, 'message': 'Dec 6 17:41:19 hqnl0246134 sshd[238863]: Failed password for root from 61.177.172.19 port 63642 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 17:41:20,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341280.8121727, 'message': 'Dec 6 17:41:19 hqnl0246134 sshd[238863]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 17:41:22,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670341282.814029, 'message': 'Dec 6 17:41:21 hqnl0246134 sshd[238863]: Failed password for root from 61.177.172.19 port 63642 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 17:41:28,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341288.8208594, 'message': 'Dec 6 17:41:27 hqnl0246134 sshd[238886]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 17:41:28,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341288.8211129, 'message': 'Dec 6 17:41:27 hqnl0246134 sshd[238886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 17:41:28,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341288.821281, 'message': 'Dec 6 17:41:28 hqnl0246134 sshd[238886]: Failed password for root from 61.177.173.18 port 57274 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0162 seconds
INFO [2022-12-06 17:41:30,852] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341290.8221178, 'message': 'Dec 6 17:41:29 hqnl0246134 sshd[238886]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 17:41:30,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.58.130.230', 'timestamp': 1670341290.8223834, 'message': 'Dec 6 17:41:30 hqnl0246134 sshd[238888]: Invalid user ryan from 190.58.130.230 port 49209', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 17:41:30,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341290.8225937, 'message': 'Dec 6 17:41:30 hqnl0246134 sshd[238886]: Failed password for root from 61.177.173.18 port 57274 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:41:32,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.58.130.230', 'timestamp': 1670341292.8232453, 'message': 'Dec 6 17:41:30 hqnl0246134 sshd[238888]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.58.130.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0596 seconds
INFO [2022-12-06 17:41:32,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341292.8239367, 'message': 'Dec 6 17:41:31 hqnl0246134 sshd[238886]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0603 seconds
INFO [2022-12-06 17:41:32,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.58.130.230', 'timestamp': 1670341292.8237214, 'message': 'Dec 6 17:41:30 hqnl0246134 sshd[238888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.58.130.230 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 17:41:32,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.58.130.230', 'timestamp': 1670341292.8241897, 'message': 'Dec 6 17:41:32 hqnl0246134 sshd[238888]: Failed password for invalid user ryan from 190.58.130.230 port 49209 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 17:41:34,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.58.130.230', 'timestamp': 1670341294.8255289, 'message': 'Dec 6 17:41:33 hqnl0246134 sshd[238888]: Disconnected from invalid user ryan 190.58.130.230 port 49209 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0466 seconds
INFO [2022-12-06 17:41:34,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341294.8258696, 'message': 'Dec 6 17:41:34 hqnl0246134 sshd[238886]: Failed password for root from 61.177.173.18 port 57274 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0470 seconds
WARNING [2022-12-06 17:41:47,684] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:41:47,685] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:41:48,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.18.217', 'timestamp': 1670341308.8469756, 'message': 'Dec 6 17:41:48 hqnl0246134 sshd[238894]: Invalid user li from 139.59.18.217 port 33786', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 17:41:48,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.18.217', 'timestamp': 1670341308.8474169, 'message': 'Dec 6 17:41:48 hqnl0246134 sshd[238894]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.18.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 17:41:48,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.18.217', 'timestamp': 1670341308.84762, 'message': 'Dec 6 17:41:48 hqnl0246134 sshd[238894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.217 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 17:41:50,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.18.217', 'timestamp': 1670341310.8495154, 'message': 'Dec 6 17:41:50 hqnl0246134 sshd[238894]: Failed password for invalid user li from 139.59.18.217 port 33786 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:41:52,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.18.217', 'timestamp': 1670341312.8505795, 'message': 'Dec 6 17:41:50 hqnl0246134 sshd[238894]: Disconnected from invalid user li 139.59.18.217 port 33786 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0239 seconds
WARNING [2022-12-06 17:41:53,365] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 17:42:09,230] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:42:09,282] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0631 seconds
INFO [2022-12-06 17:42:16,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341336.911137, 'message': 'Dec 6 17:42:15 hqnl0246134 sshd[238925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-06 17:42:16,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341336.911675, 'message': 'Dec 6 17:42:15 hqnl0246134 sshd[238925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 17:42:18,074] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:42:18,075] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:42:18,082] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:42:18,093] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-06 17:42:18,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341338.915696, 'message': 'Dec 6 17:42:17 hqnl0246134 sshd[238925]: Failed password for root from 61.177.173.18 port 33378 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 17:42:18,984] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341338.9160154, 'message': 'Dec 6 17:42:17 hqnl0246134 sshd[238925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 17:42:20,695] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:42:20,695] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:42:20,702] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:42:20,713] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-06 17:42:20,943] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341340.9181533, 'message': 'Dec 6 17:42:19 hqnl0246134 sshd[238925]: Failed password for root from 61.177.173.18 port 33378 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 17:42:20,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341340.918492, 'message': 'Dec 6 17:42:20 hqnl0246134 sshd[238925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:42:22,946] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341342.924024, 'message': 'Dec 6 17:42:22 hqnl0246134 sshd[238925]: Failed password for root from 61.177.173.18 port 33378 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 17:42:26,943] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:42:26,943] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:42:26,951] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:42:26,963] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
WARNING [2022-12-06 17:42:47,688] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:42:47,690] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:43:07,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341387.0035841, 'message': 'Dec 6 17:43:06 hqnl0246134 sshd[239007]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 17:43:07,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341387.004123, 'message': 'Dec 6 17:43:06 hqnl0246134 sshd[239007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 17:43:09,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341389.0064056, 'message': 'Dec 6 17:43:08 hqnl0246134 sshd[239007]: Failed password for root from 61.177.173.18 port 17964 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 17:43:09,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341389.0067766, 'message': 'Dec 6 17:43:08 hqnl0246134 sshd[239007]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
WARNING [2022-12-06 17:43:09,229] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:43:09,260] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0379 seconds
INFO [2022-12-06 17:43:13,060] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341393.0213737, 'message': 'Dec 6 17:43:11 hqnl0246134 sshd[239007]: Failed password for root from 61.177.173.18 port 17964 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 17:43:15,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341395.0277646, 'message': 'Dec 6 17:43:13 hqnl0246134 sshd[239007]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 17:43:17,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341397.0318286, 'message': 'Dec 6 17:43:15 hqnl0246134 sshd[239007]: Failed password for root from 61.177.173.18 port 17964 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 17:43:17,962] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:43:17,963] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:43:17,970] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:43:17,981] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 17:43:20,567] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:43:20,568] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:43:20,575] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:43:20,587] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 17:43:23,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341403.0455391, 'message': 'Dec 6 17:43:22 hqnl0246134 sshd[239070]: Invalid user speedtest from 161.35.175.231 port 56936', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 17:43:23,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341403.0461307, 'message': 'Dec 6 17:43:22 hqnl0246134 sshd[239070]: pam_imunify(sshd:auth): [IM360_RBL] The IP 161.35.175.231 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 17:43:23,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341403.0464697, 'message': 'Dec 6 17:43:22 hqnl0246134 sshd[239070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.175.231 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 17:43:25,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341405.045999, 'message': 'Dec 6 17:43:24 hqnl0246134 sshd[239070]: Failed password for invalid user speedtest from 161.35.175.231 port 56936 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 17:43:25,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341405.0462663, 'message': 'Dec 6 17:43:24 hqnl0246134 sshd[239070]: Disconnected from invalid user speedtest 161.35.175.231 port 56936 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 17:43:26,919] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:43:26,920] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:43:26,927] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:43:26,938] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
WARNING [2022-12-06 17:43:47,693] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:43:47,694] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:43:51,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341431.1185508, 'message': 'Dec 6 17:43:49 hqnl0246134 sshd[239083]: Invalid user test3 from 103.146.203.217 port 48584', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0542 seconds
INFO [2022-12-06 17:43:51,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341431.1189268, 'message': 'Dec 6 17:43:49 hqnl0246134 sshd[239083]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.146.203.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 17:43:51,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341431.1190863, 'message': 'Dec 6 17:43:49 hqnl0246134 sshd[239083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.203.217 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:43:53,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341433.1214752, 'message': 'Dec 6 17:43:51 hqnl0246134 sshd[239083]: Failed password for invalid user test3 from 103.146.203.217 port 48584 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 17:43:53,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341433.1218092, 'message': 'Dec 6 17:43:52 hqnl0246134 sshd[239083]: Disconnected from invalid user test3 103.146.203.217 port 48584 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:43:59,169] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341439.135293, 'message': 'Dec 6 17:43:57 hqnl0246134 sshd[239100]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 17:43:59,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341439.1357033, 'message': 'Dec 6 17:43:57 hqnl0246134 sshd[239100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 17:43:59,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341439.1359222, 'message': 'Dec 6 17:43:59 hqnl0246134 sshd[239100]: Failed password for root from 61.177.173.18 port 53535 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:44:03,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341443.1376758, 'message': 'Dec 6 17:44:01 hqnl0246134 sshd[239100]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 17:44:05,177] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341445.1506047, 'message': 'Dec 6 17:44:03 hqnl0246134 sshd[239100]: Failed password for root from 61.177.173.18 port 53535 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 17:44:07,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341447.1532633, 'message': 'Dec 6 17:44:05 hqnl0246134 sshd[239100]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 17:44:09,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341449.1583223, 'message': 'Dec 6 17:44:07 hqnl0246134 sshd[239100]: Failed password for root from 61.177.173.18 port 53535 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 17:44:09,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341449.1586142, 'message': 'Dec 6 17:44:08 hqnl0246134 sshd[239110]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 17:44:09,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341449.1588483, 'message': 'Dec 6 17:44:08 hqnl0246134 sshd[239110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0211 seconds
WARNING [2022-12-06 17:44:09,233] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:44:09,266] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0398 seconds
INFO [2022-12-06 17:44:11,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341451.1583571, 'message': 'Dec 6 17:44:10 hqnl0246134 sshd[239110]: Failed password for root from 61.177.173.49 port 16263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 17:44:13,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341453.1605637, 'message': 'Dec 6 17:44:13 hqnl0246134 sshd[239110]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 17:44:17,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341457.1717193, 'message': 'Dec 6 17:44:15 hqnl0246134 sshd[239110]: Failed password for root from 61.177.173.49 port 16263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-06 17:44:17,984] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:44:17,985] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:44:17,995] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:44:18,007] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 17:44:19,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341459.1776228, 'message': 'Dec 6 17:44:17 hqnl0246134 sshd[239110]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 17:44:20,675] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:44:20,676] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:44:20,683] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:44:20,694] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-06 17:44:21,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341461.1811674, 'message': 'Dec 6 17:44:19 hqnl0246134 sshd[239110]: Failed password for root from 61.177.173.49 port 16263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:44:23,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341463.1882246, 'message': 'Dec 6 17:44:21 hqnl0246134 sshd[239123]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 17:44:23,231] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341463.1887066, 'message': 'Dec 6 17:44:21 hqnl0246134 sshd[239123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:44:23,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341463.1888647, 'message': 'Dec 6 17:44:23 hqnl0246134 sshd[239123]: Failed password for root from 61.177.173.49 port 23093 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 17:44:25,209] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341465.1906128, 'message': 'Dec 6 17:44:23 hqnl0246134 sshd[239123]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:44:27,216] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341467.1944106, 'message': 'Dec 6 17:44:25 hqnl0246134 sshd[239123]: Failed password for root from 61.177.173.49 port 23093 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 17:44:27,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341467.194685, 'message': 'Dec 6 17:44:25 hqnl0246134 sshd[239123]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 17:44:29,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670341469.1968133, 'message': 'Dec 6 17:44:28 hqnl0246134 sshd[239123]: Failed password for root from 61.177.173.49 port 23093 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 17:44:47,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341487.219407, 'message': 'Dec 6 17:44:46 hqnl0246134 sshd[239140]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:44:47,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341487.219683, 'message': 'Dec 6 17:44:46 hqnl0246134 sshd[239140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 17:44:47,697] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:44:47,698] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:44:49,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341489.2216046, 'message': 'Dec 6 17:44:48 hqnl0246134 sshd[239140]: Failed password for root from 61.177.173.18 port 29299 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 17:44:49,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341489.2217803, 'message': 'Dec 6 17:44:48 hqnl0246134 sshd[239140]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 17:44:51,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341491.2219374, 'message': 'Dec 6 17:44:51 hqnl0246134 sshd[239140]: Failed password for root from 61.177.173.18 port 29299 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 17:44:55,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341495.2261078, 'message': 'Dec 6 17:44:53 hqnl0246134 sshd[239140]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 17:44:55,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341495.2264683, 'message': 'Dec 6 17:44:55 hqnl0246134 sshd[239140]: Failed password for root from 61.177.173.18 port 29299 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:44:58,817] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:44:58,818] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:44:58,825] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:44:58,835] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0164 seconds
WARNING [2022-12-06 17:45:09,238] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:45:09,259] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0290 seconds
INFO [2022-12-06 17:45:17,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.132.72', 'timestamp': 1670341517.2571936, 'message': 'Dec 6 17:45:15 hqnl0246134 sshd[239188]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.132.72 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 17:45:17,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.132.72', 'timestamp': 1670341517.25738, 'message': 'Dec 6 17:45:15 hqnl0246134 sshd[239188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.132.72 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:45:17,871] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:45:17,872] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:45:17,882] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:45:17,894] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0222 seconds
INFO [2022-12-06 17:45:19,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '68.183.132.72', 'timestamp': 1670341519.257873, 'message': 'Dec 6 17:45:17 hqnl0246134 sshd[239188]: Failed password for root from 68.183.132.72 port 44384 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 17:45:20,399] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:45:20,400] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:45:20,408] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:45:20,419] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 17:45:39,314] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341539.2905312, 'message': 'Dec 6 17:45:37 hqnl0246134 sshd[239213]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 17:45:39,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341539.2930086, 'message': 'Dec 6 17:45:37 hqnl0246134 sshd[239213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:45:39,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341539.2931314, 'message': 'Dec 6 17:45:39 hqnl0246134 sshd[239213]: Failed password for root from 61.177.173.18 port 15437 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 17:45:41,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341541.2934825, 'message': 'Dec 6 17:45:39 hqnl0246134 sshd[239213]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 17:45:43,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341543.299653, 'message': 'Dec 6 17:45:41 hqnl0246134 sshd[239213]: Failed password for root from 61.177.173.18 port 15437 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 17:45:45,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341545.3015711, 'message': 'Dec 6 17:45:44 hqnl0246134 sshd[239213]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:45:47,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341547.304863, 'message': 'Dec 6 17:45:46 hqnl0246134 sshd[239213]: Failed password for root from 61.177.173.18 port 15437 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
WARNING [2022-12-06 17:45:47,701] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:45:47,701] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:45:57,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.6.108.33', 'timestamp': 1670341557.3156784, 'message': 'Dec 6 17:45:56 hqnl0246134 sshd[239228]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.6.108.33 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 17:45:57,357] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.6.108.33', 'timestamp': 1670341557.3162408, 'message': 'Dec 6 17:45:56 hqnl0246134 sshd[239228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.108.33 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:45:59,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.6.108.33', 'timestamp': 1670341559.316261, 'message': 'Dec 6 17:45:58 hqnl0246134 sshd[239228]: Failed password for root from 45.6.108.33 port 51780 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 17:46:03,528] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:46:03,529] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:46:03,537] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:46:03,549] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 17:46:04,942] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 17:46:05,009] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 17:46:05,010] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 17:46:05,010] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 17:46:05,010] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 17:46:05,010] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 17:46:05,025] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 17:46:05,048] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0369 seconds
WARNING [2022-12-06 17:46:05,058] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 17:46:05,060] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:46:05,086] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0451 seconds
INFO [2022-12-06 17:46:05,088] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0443 seconds
WARNING [2022-12-06 17:46:09,257] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:46:09,295] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0623 seconds
INFO [2022-12-06 17:46:17,959] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:46:17,959] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:46:17,967] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:46:17,978] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 17:46:21,249] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:46:21,250] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:46:21,257] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:46:21,268] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 17:46:31,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341591.341472, 'message': 'Dec 6 17:46:29 hqnl0246134 sshd[239268]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 17:46:31,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341591.3420494, 'message': 'Dec 6 17:46:29 hqnl0246134 sshd[239268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 17:46:33,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341593.3425257, 'message': 'Dec 6 17:46:31 hqnl0246134 sshd[239268]: Failed password for root from 61.177.173.18 port 48740 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 17:46:33,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341593.3428004, 'message': 'Dec 6 17:46:31 hqnl0246134 sshd[239268]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 17:46:35,362] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341595.344515, 'message': 'Dec 6 17:46:33 hqnl0246134 sshd[239268]: Failed password for root from 61.177.173.18 port 48740 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:46:35,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341595.3446999, 'message': 'Dec 6 17:46:34 hqnl0246134 sshd[239268]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:46:36,287] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 17:46:36,288] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 17:46:36,289] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 17:46:37,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341597.347524, 'message': 'Dec 6 17:46:35 hqnl0246134 sshd[239268]: Failed password for root from 61.177.173.18 port 48740 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 17:46:41,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341601.35263, 'message': 'Dec 6 17:46:40 hqnl0246134 sshd[239271]: Invalid user csgoserver from 103.146.203.217 port 55216', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 17:46:41,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341601.3528173, 'message': 'Dec 6 17:46:40 hqnl0246134 sshd[239271]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.146.203.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 17:46:41,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341601.3529553, 'message': 'Dec 6 17:46:40 hqnl0246134 sshd[239271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.203.217 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 17:46:43,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341603.3543372, 'message': 'Dec 6 17:46:42 hqnl0246134 sshd[239271]: Failed password for invalid user csgoserver from 103.146.203.217 port 55216 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 17:46:45,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341605.3571613, 'message': 'Dec 6 17:46:44 hqnl0246134 sshd[239271]: Disconnected from invalid user csgoserver 103.146.203.217 port 55216 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-06 17:46:47,705] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:46:47,706] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 17:47:09,249] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:47:09,279] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0416 seconds
INFO [2022-12-06 17:47:17,902] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:47:17,902] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:47:17,910] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:47:17,921] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 17:47:20,597] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:47:20,598] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:47:20,605] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:47:20,617] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 17:47:23,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341643.419783, 'message': 'Dec 6 17:47:22 hqnl0246134 sshd[239314]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 17:47:23,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341643.4201572, 'message': 'Dec 6 17:47:22 hqnl0246134 sshd[239314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:47:25,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341645.4217062, 'message': 'Dec 6 17:47:24 hqnl0246134 sshd[239314]: Failed password for root from 61.177.173.18 port 35352 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 17:47:27,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341647.431405, 'message': 'Dec 6 17:47:26 hqnl0246134 sshd[239314]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 17:47:29,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341649.4339583, 'message': 'Dec 6 17:47:28 hqnl0246134 sshd[239314]: Failed password for root from 61.177.173.18 port 35352 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:47:31,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341651.4364023, 'message': 'Dec 6 17:47:30 hqnl0246134 sshd[239314]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:47:33,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341653.4395094, 'message': 'Dec 6 17:47:32 hqnl0246134 sshd[239314]: Failed password for root from 61.177.173.18 port 35352 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0290 seconds
WARNING [2022-12-06 17:47:47,711] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:47:47,713] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 17:48:09,256] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:48:09,282] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0378 seconds
INFO [2022-12-06 17:48:11,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341691.5313225, 'message': 'Dec 6 17:48:10 hqnl0246134 sshd[239373]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 17:48:11,591] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341691.5316494, 'message': 'Dec 6 17:48:10 hqnl0246134 sshd[239373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 17:48:13,561] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341693.5322938, 'message': 'Dec 6 17:48:11 hqnl0246134 sshd[239373]: Failed password for root from 61.177.173.18 port 14604 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 17:48:13,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341693.5325, 'message': 'Dec 6 17:48:13 hqnl0246134 sshd[239373]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 17:48:15,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341695.533696, 'message': 'Dec 6 17:48:15 hqnl0246134 sshd[239373]: Failed password for root from 61.177.173.18 port 14604 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 17:48:17,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341697.5376275, 'message': 'Dec 6 17:48:17 hqnl0246134 sshd[239373]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 17:48:18,122] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:48:18,122] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:48:18,135] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:48:18,149] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0246 seconds
INFO [2022-12-06 17:48:19,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341699.541247, 'message': 'Dec 6 17:48:18 hqnl0246134 sshd[239373]: Failed password for root from 61.177.173.18 port 14604 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 17:48:21,179] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:48:21,179] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:48:21,187] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:48:21,199] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 17:48:22,388] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:48:22,388] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:48:22,396] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:48:22,407] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 17:48:43,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.249.89.102', 'timestamp': 1670341723.5755851, 'message': 'Dec 6 17:48:43 hqnl0246134 sshd[239404]: Invalid user guest from 201.249.89.102 port 49194', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 17:48:43,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.249.89.102', 'timestamp': 1670341723.5759752, 'message': 'Dec 6 17:48:43 hqnl0246134 sshd[239404]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.249.89.102 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:48:43,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.249.89.102', 'timestamp': 1670341723.576651, 'message': 'Dec 6 17:48:43 hqnl0246134 sshd[239404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.249.89.102 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:48:45,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341725.577347, 'message': 'Dec 6 17:48:44 hqnl0246134 sshd[239406]: Invalid user adm from 161.35.175.231 port 43404', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 17:48:45,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.249.89.102', 'timestamp': 1670341725.5783415, 'message': 'Dec 6 17:48:45 hqnl0246134 sshd[239404]: Failed password for invalid user guest from 201.249.89.102 port 49194 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 17:48:45,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341725.578044, 'message': 'Dec 6 17:48:44 hqnl0246134 sshd[239406]: pam_imunify(sshd:auth): [IM360_RBL] The IP 161.35.175.231 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:48:45,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341725.578226, 'message': 'Dec 6 17:48:44 hqnl0246134 sshd[239406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.175.231 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:48:47,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341727.5785058, 'message': 'Dec 6 17:48:46 hqnl0246134 sshd[239406]: Failed password for invalid user adm from 161.35.175.231 port 43404 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0553 seconds
INFO [2022-12-06 17:48:47,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.249.89.102', 'timestamp': 1670341727.5787864, 'message': 'Dec 6 17:48:46 hqnl0246134 sshd[239404]: Disconnected from invalid user guest 201.249.89.102 port 49194 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0561 seconds
WARNING [2022-12-06 17:48:47,714] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:48:47,715] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:48:49,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341729.5806565, 'message': 'Dec 6 17:48:47 hqnl0246134 sshd[239406]: Disconnected from invalid user adm 161.35.175.231 port 43404 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 17:48:51,616] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341731.5822127, 'message': 'Dec 6 17:48:51 hqnl0246134 sshd[239410]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.146.203.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 17:48:51,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341731.5825078, 'message': 'Dec 6 17:48:51 hqnl0246134 sshd[239410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.203.217 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 17:48:55,624] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341735.5863395, 'message': 'Dec 6 17:48:53 hqnl0246134 sshd[239410]: Failed password for root from 103.146.203.217 port 55922 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 17:48:55,625] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.70.0', 'timestamp': 1670341735.5867844, 'message': 'Dec 6 17:48:53 hqnl0246134 sshd[239412]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.70.0 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 17:48:55,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.70.0', 'timestamp': 1670341735.5869503, 'message': 'Dec 6 17:48:53 hqnl0246134 sshd[239412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.70.0 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 17:48:55,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.250.70.0', 'timestamp': 1670341735.587065, 'message': 'Dec 6 17:48:55 hqnl0246134 sshd[239412]: Failed password for root from 51.250.70.0 port 53582 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:49:01,625] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341741.5937762, 'message': 'Dec 6 17:49:00 hqnl0246134 sshd[239424]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 17:49:01,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341741.5943089, 'message': 'Dec 6 17:49:00 hqnl0246134 sshd[239424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 17:49:03,615] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341743.596767, 'message': 'Dec 6 17:49:01 hqnl0246134 sshd[239424]: Failed password for root from 61.177.173.18 port 45101 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:49:03,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341743.5970483, 'message': 'Dec 6 17:49:02 hqnl0246134 sshd[239424]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:49:05,617] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341745.5983133, 'message': 'Dec 6 17:49:04 hqnl0246134 sshd[239424]: Failed password for root from 61.177.173.18 port 45101 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:49:05,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341745.5985255, 'message': 'Dec 6 17:49:04 hqnl0246134 sshd[239424]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 17:49:07,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341747.601667, 'message': 'Dec 6 17:49:06 hqnl0246134 sshd[239424]: Failed password for root from 61.177.173.18 port 45101 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 17:49:09,258] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:49:09,284] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0356 seconds
INFO [2022-12-06 17:49:18,220] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:49:18,221] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:49:18,231] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:49:18,250] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0281 seconds
INFO [2022-12-06 17:49:20,821] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:49:20,821] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:49:20,828] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:49:20,839] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
WARNING [2022-12-06 17:49:47,719] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:49:47,720] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:49:51,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341791.6694477, 'message': 'Dec 6 17:49:49 hqnl0246134 sshd[239461]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 17:49:51,714] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341791.6700308, 'message': 'Dec 6 17:49:49 hqnl0246134 sshd[239461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:49:53,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341793.6709967, 'message': 'Dec 6 17:49:51 hqnl0246134 sshd[239461]: Failed password for root from 61.177.173.18 port 28537 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 17:49:53,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341793.6717079, 'message': 'Dec 6 17:49:53 hqnl0246134 sshd[239461]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:49:55,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341795.6739123, 'message': 'Dec 6 17:49:54 hqnl0246134 sshd[239461]: Failed password for root from 61.177.173.18 port 28537 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 17:49:55,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341795.6741853, 'message': 'Dec 6 17:49:55 hqnl0246134 sshd[239461]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 17:49:59,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341799.6783738, 'message': 'Dec 6 17:49:57 hqnl0246134 sshd[239461]: Failed password for root from 61.177.173.18 port 28537 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 17:50:03,766] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:50:03,767] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:50:03,783] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:50:03,829] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0611 seconds
INFO [2022-12-06 17:50:05,634] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 17:50:05,706] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 17:50:05,707] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 17:50:05,707] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 17:50:05,707] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 17:50:05,707] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 17:50:05,717] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 17:50:05,733] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0249 seconds
WARNING [2022-12-06 17:50:05,739] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 17:50:05,741] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:50:05,759] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0320 seconds
INFO [2022-12-06 17:50:05,761] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0300 seconds
WARNING [2022-12-06 17:50:09,261] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:50:09,292] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0386 seconds
INFO [2022-12-06 17:50:15,724] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670341815.704559, 'message': 'Dec 6 17:50:14 hqnl0246134 sshd[239510]: Invalid user wayne from 206.189.87.115 port 37938', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 17:50:15,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.189.87.115', 'timestamp': 1670341815.7047908, 'message': 'Dec 6 17:50:14 hqnl0246134 sshd[239510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.189.87.115 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:50:15,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.189.87.115', 'timestamp': 1670341815.7049313, 'message': 'Dec 6 17:50:14 hqnl0246134 sshd[239510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.115 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:50:17,801] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:50:17,801] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 17:50:17,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670341817.7121232, 'message': 'Dec 6 17:50:16 hqnl0246134 sshd[239510]: Failed password for invalid user wayne from 206.189.87.115 port 37938 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0977 seconds
WARNING [2022-12-06 17:50:17,812] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:50:17,827] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0240 seconds
INFO [2022-12-06 17:50:19,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670341819.715406, 'message': 'Dec 6 17:50:18 hqnl0246134 sshd[239510]: Disconnected from invalid user wayne 206.189.87.115 port 37938 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 17:50:20,454] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:50:20,455] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:50:20,466] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:50:20,483] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0259 seconds
INFO [2022-12-06 17:50:36,524] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 17:50:36,525] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 17:50:36,526] im360.plugins.client360: Waiting 2 minutes before retry...
INFO [2022-12-06 17:50:41,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341841.7929733, 'message': 'Dec 6 17:50:40 hqnl0246134 sshd[239541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 17:50:41,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341841.793433, 'message': 'Dec 6 17:50:40 hqnl0246134 sshd[239541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:50:41,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341841.7935798, 'message': 'Dec 6 17:50:41 hqnl0246134 sshd[239541]: Failed password for root from 61.177.173.18 port 13605 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 17:50:43,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341843.7541814, 'message': 'Dec 6 17:50:42 hqnl0246134 sshd[239541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:50:45,778] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341845.7579374, 'message': 'Dec 6 17:50:44 hqnl0246134 sshd[239541]: Failed password for root from 61.177.173.18 port 13605 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 17:50:47,724] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:50:47,725] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:50:47,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341847.76004, 'message': 'Dec 6 17:50:46 hqnl0246134 sshd[239541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 17:50:49,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341849.7637165, 'message': 'Dec 6 17:50:48 hqnl0246134 sshd[239541]: Failed password for root from 61.177.173.18 port 13605 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 17:50:55,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341855.7758904, 'message': 'Dec 6 17:50:54 hqnl0246134 sshd[239570]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.146.203.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 17:50:55,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341855.7763236, 'message': 'Dec 6 17:50:54 hqnl0246134 sshd[239570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.203.217 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:50:57,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.146.203.217', 'timestamp': 1670341857.7799075, 'message': 'Dec 6 17:50:57 hqnl0246134 sshd[239570]: Failed password for root from 103.146.203.217 port 56630 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
WARNING [2022-12-06 17:51:09,266] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:51:09,314] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0569 seconds
INFO [2022-12-06 17:51:15,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341875.8190248, 'message': 'Dec 6 17:51:15 hqnl0246134 sshd[239595]: Invalid user tf2server from 161.35.175.231 port 58308', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 17:51:15,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341875.8193321, 'message': 'Dec 6 17:51:15 hqnl0246134 sshd[239595]: pam_imunify(sshd:auth): [IM360_RBL] The IP 161.35.175.231 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:51:15,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341875.8195033, 'message': 'Dec 6 17:51:15 hqnl0246134 sshd[239595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.175.231 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:51:18,070] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:51:18,070] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:51:18,077] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:51:18,089] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 17:51:19,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341879.8223078, 'message': 'Dec 6 17:51:17 hqnl0246134 sshd[239595]: Failed password for invalid user tf2server from 161.35.175.231 port 58308 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:51:19,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.175.231', 'timestamp': 1670341879.8225582, 'message': 'Dec 6 17:51:19 hqnl0246134 sshd[239595]: Disconnected from invalid user tf2server 161.35.175.231 port 58308 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:51:21,715] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:51:21,716] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:51:21,723] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:51:21,733] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 17:51:21,808] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:51:21,808] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:51:21,815] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:51:21,826] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 17:51:29,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.238.182', 'timestamp': 1670341889.8347437, 'message': 'Dec 6 17:51:29 hqnl0246134 sshd[239624]: Invalid user francois from 68.183.238.182 port 36170', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 17:51:29,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.238.182', 'timestamp': 1670341889.8351116, 'message': 'Dec 6 17:51:29 hqnl0246134 sshd[239624]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.238.182 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 17:51:29,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.238.182', 'timestamp': 1670341889.8353252, 'message': 'Dec 6 17:51:29 hqnl0246134 sshd[239624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.238.182 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 17:51:31,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341891.8367817, 'message': 'Dec 6 17:51:30 hqnl0246134 sshd[239627]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 17:51:31,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.238.182', 'timestamp': 1670341891.8371952, 'message': 'Dec 6 17:51:31 hqnl0246134 sshd[239624]: Failed password for invalid user francois from 68.183.238.182 port 36170 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 17:51:31,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341891.8370523, 'message': 'Dec 6 17:51:30 hqnl0246134 sshd[239627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:51:33,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341893.8386042, 'message': 'Dec 6 17:51:31 hqnl0246134 sshd[239627]: Failed password for root from 61.177.173.18 port 48766 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 17:51:33,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.238.182', 'timestamp': 1670341893.8388343, 'message': 'Dec 6 17:51:32 hqnl0246134 sshd[239624]: Disconnected from invalid user francois 68.183.238.182 port 36170 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 17:51:33,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341893.8389456, 'message': 'Dec 6 17:51:32 hqnl0246134 sshd[239627]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 17:51:35,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341895.8406665, 'message': 'Dec 6 17:51:34 hqnl0246134 sshd[239627]: Failed password for root from 61.177.173.18 port 48766 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 17:51:37,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341897.841987, 'message': 'Dec 6 17:51:36 hqnl0246134 sshd[239627]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 17:51:39,876] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.70.0', 'timestamp': 1670341899.8447845, 'message': 'Dec 6 17:51:38 hqnl0246134 sshd[239635]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.70.0 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 17:51:39,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341899.8451896, 'message': 'Dec 6 17:51:39 hqnl0246134 sshd[239627]: Failed password for root from 61.177.173.18 port 48766 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 17:51:39,893] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.70.0', 'timestamp': 1670341899.8450737, 'message': 'Dec 6 17:51:38 hqnl0246134 sshd[239635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.70.0 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 17:51:40,096] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 17:51:40,098] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 17:51:40,989] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-06 17:51:41,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.250.70.0', 'timestamp': 1670341901.8485236, 'message': 'Dec 6 17:51:41 hqnl0246134 sshd[239635]: Failed password for root from 51.250.70.0 port 44810 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1399 seconds
WARNING [2022-12-06 17:51:47,729] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:51:47,730] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 17:51:53,366] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 17:51:59,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341919.8718352, 'message': 'Dec 6 17:51:58 hqnl0246134 sshd[239669]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 17:51:59,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341919.8727376, 'message': 'Dec 6 17:51:58 hqnl0246134 sshd[239669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 17:52:01,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341921.8743699, 'message': 'Dec 6 17:52:00 hqnl0246134 sshd[239669]: Failed password for root from 61.177.173.39 port 46464 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 17:52:03,894] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341923.8769405, 'message': 'Dec 6 17:52:02 hqnl0246134 sshd[239669]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 17:52:05,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341925.879397, 'message': 'Dec 6 17:52:05 hqnl0246134 sshd[239669]: Failed password for root from 61.177.173.39 port 46464 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 17:52:07,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341927.882972, 'message': 'Dec 6 17:52:07 hqnl0246134 sshd[239669]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
WARNING [2022-12-06 17:52:09,267] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:52:09,295] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0354 seconds
INFO [2022-12-06 17:52:09,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341929.8850958, 'message': 'Dec 6 17:52:09 hqnl0246134 sshd[239669]: Failed password for root from 61.177.173.39 port 46464 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 17:52:13,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341933.9016397, 'message': 'Dec 6 17:52:13 hqnl0246134 sshd[239686]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 17:52:13,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341933.9049547, 'message': 'Dec 6 17:52:13 hqnl0246134 sshd[239686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 17:52:15,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341935.9016457, 'message': 'Dec 6 17:52:15 hqnl0246134 sshd[239686]: Failed password for root from 61.177.173.39 port 55650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0952 seconds
INFO [2022-12-06 17:52:16,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341935.905231, 'message': 'Dec 6 17:52:15 hqnl0246134 sshd[239686]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0514 seconds
INFO [2022-12-06 17:52:17,919] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341937.9021215, 'message': 'Dec 6 17:52:17 hqnl0246134 sshd[239686]: Failed password for root from 61.177.173.39 port 55650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 17:52:18,617] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:52:18,618] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:52:18,625] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:52:18,640] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 17:52:19,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341939.9044368, 'message': 'Dec 6 17:52:19 hqnl0246134 sshd[239686]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:52:21,454] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:52:21,454] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:52:21,462] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:52:21,473] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 17:52:21,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341941.908712, 'message': 'Dec 6 17:52:20 hqnl0246134 sshd[239696]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 17:52:21,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341941.9098737, 'message': 'Dec 6 17:52:21 hqnl0246134 sshd[239686]: Failed password for root from 61.177.173.39 port 55650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 17:52:21,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341941.9096358, 'message': 'Dec 6 17:52:20 hqnl0246134 sshd[239696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 17:52:24,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341943.948476, 'message': 'Dec 6 17:52:22 hqnl0246134 sshd[239696]: Failed password for root from 61.177.173.18 port 32750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0695 seconds
INFO [2022-12-06 17:52:25,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341945.917851, 'message': 'Dec 6 17:52:24 hqnl0246134 sshd[239696]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 17:52:25,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341945.918175, 'message': 'Dec 6 17:52:25 hqnl0246134 sshd[239710]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 17:52:25,967] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341945.9183662, 'message': 'Dec 6 17:52:25 hqnl0246134 sshd[239710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:52:27,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341947.9245746, 'message': 'Dec 6 17:52:26 hqnl0246134 sshd[239696]: Failed password for root from 61.177.173.18 port 32750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 17:52:27,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341947.9249113, 'message': 'Dec 6 17:52:27 hqnl0246134 sshd[239710]: Failed password for root from 61.177.173.39 port 46068 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 17:52:27,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341947.9247801, 'message': 'Dec 6 17:52:27 hqnl0246134 sshd[239696]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:52:29,958] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341949.9261482, 'message': 'Dec 6 17:52:29 hqnl0246134 sshd[239696]: Failed password for root from 61.177.173.18 port 32750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 17:52:29,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341949.9264672, 'message': 'Dec 6 17:52:29 hqnl0246134 sshd[239710]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 17:52:33,949] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341953.9300752, 'message': 'Dec 6 17:52:32 hqnl0246134 sshd[239710]: Failed password for root from 61.177.173.39 port 46068 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 17:52:35,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341955.9346046, 'message': 'Dec 6 17:52:34 hqnl0246134 sshd[239710]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:52:37,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670341957.9370954, 'message': 'Dec 6 17:52:36 hqnl0246134 sshd[239710]: Failed password for root from 61.177.173.39 port 46068 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-06 17:52:39,611] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:52:39,612] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:52:39,621] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:52:39,640] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0275 seconds
WARNING [2022-12-06 17:52:47,734] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:52:47,735] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:53:01,995] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.176.79.163', 'timestamp': 1670341981.9718218, 'message': 'Dec 6 17:53:01 hqnl0246134 sshd[239735]: Invalid user crystal from 103.176.79.163 port 49094', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 17:53:02,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.176.79.163', 'timestamp': 1670341981.9725013, 'message': 'Dec 6 17:53:01 hqnl0246134 sshd[239735]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.176.79.163 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:53:02,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.176.79.163', 'timestamp': 1670341981.9727468, 'message': 'Dec 6 17:53:01 hqnl0246134 sshd[239735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.79.163 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:53:04,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.176.79.163', 'timestamp': 1670341983.9742386, 'message': 'Dec 6 17:53:03 hqnl0246134 sshd[239735]: Failed password for invalid user crystal from 103.176.79.163 port 49094 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 17:53:05,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.176.79.163', 'timestamp': 1670341985.976965, 'message': 'Dec 6 17:53:04 hqnl0246134 sshd[239735]: Disconnected from invalid user crystal 103.176.79.163 port 49094 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
WARNING [2022-12-06 17:53:09,280] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:53:09,315] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0480 seconds
INFO [2022-12-06 17:53:12,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.58.130.230', 'timestamp': 1670341991.9886212, 'message': 'Dec 6 17:53:10 hqnl0246134 sshd[239745]: Invalid user ips from 190.58.130.230 port 60425', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 17:53:12,026] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.58.130.230', 'timestamp': 1670341991.9888737, 'message': 'Dec 6 17:53:10 hqnl0246134 sshd[239745]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.58.130.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:53:12,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.58.130.230', 'timestamp': 1670341991.9890451, 'message': 'Dec 6 17:53:10 hqnl0246134 sshd[239745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.58.130.230 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 17:53:14,026] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341993.9931343, 'message': 'Dec 6 17:53:12 hqnl0246134 sshd[239747]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 17:53:14,027] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.58.130.230', 'timestamp': 1670341993.9935262, 'message': 'Dec 6 17:53:12 hqnl0246134 sshd[239745]: Failed password for invalid user ips from 190.58.130.230 port 60425 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 17:53:14,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341993.993395, 'message': 'Dec 6 17:53:12 hqnl0246134 sshd[239747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:53:14,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341993.9936473, 'message': 'Dec 6 17:53:13 hqnl0246134 sshd[239747]: Failed password for root from 61.177.173.18 port 20546 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:53:15,548] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 17:53:15,624] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 17:53:15,624] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 17:53:15,625] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 17:53:15,625] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 17:53:15,625] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 17:53:15,638] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 17:53:15,662] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0357 seconds
WARNING [2022-12-06 17:53:15,673] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 17:53:15,676] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:53:15,706] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0526 seconds
INFO [2022-12-06 17:53:15,708] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0498 seconds
INFO [2022-12-06 17:53:16,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.58.130.230', 'timestamp': 1670341995.9960809, 'message': 'Dec 6 17:53:14 hqnl0246134 sshd[239745]: Disconnected from invalid user ips 190.58.130.230 port 60425 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-06 17:53:16,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341995.996284, 'message': 'Dec 6 17:53:14 hqnl0246134 sshd[239747]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 17:53:17,989] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:53:17,989] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:53:17,996] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:53:18,017] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0274 seconds
INFO [2022-12-06 17:53:18,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341997.997723, 'message': 'Dec 6 17:53:16 hqnl0246134 sshd[239747]: Failed password for root from 61.177.173.18 port 20546 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 17:53:18,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670341997.9978716, 'message': 'Dec 6 17:53:17 hqnl0246134 sshd[239747]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 17:53:20,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342000.0012252, 'message': 'Dec 6 17:53:19 hqnl0246134 sshd[239747]: Failed password for root from 61.177.173.18 port 20546 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 17:53:20,817] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:53:20,817] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:53:20,837] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:53:20,856] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0353 seconds
INFO [2022-12-06 17:53:30,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342010.0193055, 'message': 'Dec 6 17:53:28 hqnl0246134 sshd[239772]: Invalid user jason from 206.189.87.115 port 54580', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 17:53:30,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342010.0198405, 'message': 'Dec 6 17:53:28 hqnl0246134 sshd[239772]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.189.87.115 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 17:53:30,079] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342010.020077, 'message': 'Dec 6 17:53:28 hqnl0246134 sshd[239772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.115 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 17:53:32,047] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342012.0247965, 'message': 'Dec 6 17:53:30 hqnl0246134 sshd[239772]: Failed password for invalid user jason from 206.189.87.115 port 54580 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 17:53:32,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342012.0250914, 'message': 'Dec 6 17:53:31 hqnl0246134 sshd[239772]: Disconnected from invalid user jason 206.189.87.115 port 54580 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 17:53:47,737] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:53:47,738] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:53:50,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '161.35.175.231', 'timestamp': 1670342030.0597, 'message': 'Dec 6 17:53:48 hqnl0246134 sshd[239785]: pam_imunify(sshd:auth): [IM360_RBL] The IP 161.35.175.231 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 17:53:50,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '161.35.175.231', 'timestamp': 1670342030.0600438, 'message': 'Dec 6 17:53:48 hqnl0246134 sshd[239785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.175.231 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 17:53:50,133] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '161.35.175.231', 'timestamp': 1670342030.0602236, 'message': 'Dec 6 17:53:49 hqnl0246134 sshd[239785]: Failed password for root from 161.35.175.231 port 45006 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 17:53:51,615] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 17:53:51,615] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 17:53:51,616] im360.plugins.client360: Waiting 2 minutes before retry...
INFO [2022-12-06 17:53:52,556] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:53:52,557] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:53:52,564] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:53:52,578] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 17:54:02,101] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342042.078426, 'message': 'Dec 6 17:54:00 hqnl0246134 sshd[239803]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 17:54:02,120] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342042.0788925, 'message': 'Dec 6 17:54:00 hqnl0246134 sshd[239803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:54:02,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342042.0790796, 'message': 'Dec 6 17:54:01 hqnl0246134 sshd[239803]: Failed password for root from 61.177.173.18 port 37495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:54:04,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342044.0804343, 'message': 'Dec 6 17:54:02 hqnl0246134 sshd[239803]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 17:54:06,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342046.082674, 'message': 'Dec 6 17:54:04 hqnl0246134 sshd[239803]: Failed password for root from 61.177.173.18 port 37495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 17:54:08,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342048.0851924, 'message': 'Dec 6 17:54:06 hqnl0246134 sshd[239803]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-06 17:54:09,279] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:54:09,305] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0338 seconds
INFO [2022-12-06 17:54:10,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342050.0892048, 'message': 'Dec 6 17:54:08 hqnl0246134 sshd[239803]: Failed password for root from 61.177.173.18 port 37495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 17:54:17,979] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:54:17,980] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:54:17,988] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:54:18,000] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 17:54:20,577] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:54:20,578] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:54:20,584] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:54:20,595] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 17:54:28,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.70.0', 'timestamp': 1670342068.1261418, 'message': 'Dec 6 17:54:26 hqnl0246134 sshd[239836]: Invalid user downloader from 51.250.70.0 port 60112', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 17:54:28,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.250.70.0', 'timestamp': 1670342068.1268983, 'message': 'Dec 6 17:54:26 hqnl0246134 sshd[239836]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.250.70.0 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:54:28,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.250.70.0', 'timestamp': 1670342068.1271734, 'message': 'Dec 6 17:54:26 hqnl0246134 sshd[239836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.70.0 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:54:30,146] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.70.0', 'timestamp': 1670342070.127302, 'message': 'Dec 6 17:54:28 hqnl0246134 sshd[239836]: Failed password for invalid user downloader from 51.250.70.0 port 60112 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:54:30,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.250.70.0', 'timestamp': 1670342070.127621, 'message': 'Dec 6 17:54:29 hqnl0246134 sshd[239836]: Disconnected from invalid user downloader 51.250.70.0 port 60112 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
WARNING [2022-12-06 17:54:47,742] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:54:47,744] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:54:52,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342092.1486115, 'message': 'Dec 6 17:54:50 hqnl0246134 sshd[239843]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 17:54:52,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342092.1490462, 'message': 'Dec 6 17:54:50 hqnl0246134 sshd[239843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 17:54:54,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342094.1489055, 'message': 'Dec 6 17:54:52 hqnl0246134 sshd[239843]: Failed password for root from 61.177.173.18 port 20409 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:54:56,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342096.1522408, 'message': 'Dec 6 17:54:54 hqnl0246134 sshd[239843]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 17:54:58,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342098.1542523, 'message': 'Dec 6 17:54:56 hqnl0246134 sshd[239843]: Failed password for root from 61.177.173.18 port 20409 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.1050 seconds
INFO [2022-12-06 17:54:58,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342098.1547155, 'message': 'Dec 6 17:54:57 hqnl0246134 sshd[239857]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1176 seconds
INFO [2022-12-06 17:54:58,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342098.1545382, 'message': 'Dec 6 17:54:56 hqnl0246134 sshd[239843]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 17:54:58,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342098.154894, 'message': 'Dec 6 17:54:57 hqnl0246134 sshd[239857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 17:55:00,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342100.158842, 'message': 'Dec 6 17:54:58 hqnl0246134 sshd[239843]: Failed password for root from 61.177.173.18 port 20409 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0513 seconds
INFO [2022-12-06 17:55:00,211] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342100.1590157, 'message': 'Dec 6 17:54:59 hqnl0246134 sshd[239857]: Failed password for root from 61.177.172.19 port 46660 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-06 17:55:02,231] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342102.164868, 'message': 'Dec 6 17:55:01 hqnl0246134 sshd[239857]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0651 seconds
INFO [2022-12-06 17:55:02,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.6.108.33', 'timestamp': 1670342102.1651247, 'message': 'Dec 6 17:55:01 hqnl0246134 sshd[239881]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.6.108.33 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0655 seconds
INFO [2022-12-06 17:55:02,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.6.108.33', 'timestamp': 1670342102.165379, 'message': 'Dec 6 17:55:01 hqnl0246134 sshd[239881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.108.33 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 17:55:04,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342104.1656754, 'message': 'Dec 6 17:55:03 hqnl0246134 sshd[239857]: Failed password for root from 61.177.172.19 port 46660 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:55:06,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.6.108.33', 'timestamp': 1670342106.170707, 'message': 'Dec 6 17:55:04 hqnl0246134 sshd[239881]: Failed password for root from 45.6.108.33 port 56634 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 17:55:06,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342106.1708798, 'message': 'Dec 6 17:55:05 hqnl0246134 sshd[239857]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 17:55:08,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342108.1744313, 'message': 'Dec 6 17:55:07 hqnl0246134 sshd[239857]: Failed password for root from 61.177.172.19 port 46660 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0166 seconds
WARNING [2022-12-06 17:55:09,285] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:55:09,310] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0332 seconds
INFO [2022-12-06 17:55:10,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342110.1763618, 'message': 'Dec 6 17:55:10 hqnl0246134 sshd[239908]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:55:10,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342110.1766062, 'message': 'Dec 6 17:55:10 hqnl0246134 sshd[239908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 17:55:12,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342112.1807272, 'message': 'Dec 6 17:55:11 hqnl0246134 sshd[239908]: Failed password for root from 61.177.172.19 port 44276 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 17:55:14,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342114.1857998, 'message': 'Dec 6 17:55:12 hqnl0246134 sshd[239908]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 17:55:16,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342116.185851, 'message': 'Dec 6 17:55:14 hqnl0246134 sshd[239908]: Failed password for root from 61.177.172.19 port 44276 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 17:55:17,867] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:55:17,868] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:55:17,876] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:55:17,888] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 17:55:18,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342118.1888566, 'message': 'Dec 6 17:55:16 hqnl0246134 sshd[239908]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 17:55:18,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342118.1890662, 'message': 'Dec 6 17:55:18 hqnl0246134 sshd[239908]: Failed password for root from 61.177.172.19 port 44276 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 17:55:21,918] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:55:21,918] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:55:21,927] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:55:21,939] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 17:55:22,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342122.1953773, 'message': 'Dec 6 17:55:21 hqnl0246134 sshd[239926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 17:55:22,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342122.1956217, 'message': 'Dec 6 17:55:21 hqnl0246134 sshd[239926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0390 seconds
INFO [2022-12-06 17:55:22,585] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:55:22,586] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:55:22,599] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:55:22,619] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0329 seconds
INFO [2022-12-06 17:55:24,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342124.1963935, 'message': 'Dec 6 17:55:23 hqnl0246134 sshd[239931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0456 seconds
INFO [2022-12-06 17:55:24,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342124.1967666, 'message': 'Dec 6 17:55:23 hqnl0246134 sshd[239926]: Failed password for root from 61.177.172.19 port 28852 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0459 seconds
INFO [2022-12-06 17:55:24,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342124.1966517, 'message': 'Dec 6 17:55:23 hqnl0246134 sshd[239931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 17:55:24,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342124.1968732, 'message': 'Dec 6 17:55:23 hqnl0246134 sshd[239926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 17:55:26,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342126.1988862, 'message': 'Dec 6 17:55:24 hqnl0246134 sshd[239931]: Failed password for root from 61.177.173.46 port 51642 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 17:55:26,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342126.1992931, 'message': 'Dec 6 17:55:25 hqnl0246134 sshd[239926]: Failed password for root from 61.177.172.19 port 28852 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 17:55:26,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342126.199503, 'message': 'Dec 6 17:55:25 hqnl0246134 sshd[239931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:55:28,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342128.203018, 'message': 'Dec 6 17:55:26 hqnl0246134 sshd[239926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 17:55:28,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342128.203284, 'message': 'Dec 6 17:55:27 hqnl0246134 sshd[239931]: Failed password for root from 61.177.173.46 port 51642 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 17:55:30,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342130.2052276, 'message': 'Dec 6 17:55:28 hqnl0246134 sshd[239926]: Failed password for root from 61.177.172.19 port 28852 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0905 seconds
INFO [2022-12-06 17:55:30,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342130.2054696, 'message': 'Dec 6 17:55:29 hqnl0246134 sshd[239931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0911 seconds
INFO [2022-12-06 17:55:32,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342132.2078514, 'message': 'Dec 6 17:55:31 hqnl0246134 sshd[239931]: Failed password for root from 61.177.173.46 port 51642 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 17:55:32,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342132.2081797, 'message': 'Dec 6 17:55:32 hqnl0246134 sshd[239946]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 17:55:32,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342132.2083719, 'message': 'Dec 6 17:55:32 hqnl0246134 sshd[239946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:55:34,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342134.2126038, 'message': 'Dec 6 17:55:33 hqnl0246134 sshd[239948]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0426 seconds
INFO [2022-12-06 17:55:34,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342134.2131221, 'message': 'Dec 6 17:55:33 hqnl0246134 sshd[239946]: Failed password for root from 61.177.172.19 port 16304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 17:55:34,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342134.2129278, 'message': 'Dec 6 17:55:33 hqnl0246134 sshd[239948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 17:55:36,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342136.2165735, 'message': 'Dec 6 17:55:34 hqnl0246134 sshd[239946]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 17:55:36,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342136.217002, 'message': 'Dec 6 17:55:35 hqnl0246134 sshd[239948]: Failed password for root from 61.177.173.46 port 34584 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 17:55:36,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342136.21745, 'message': 'Dec 6 17:55:35 hqnl0246134 sshd[239946]: Failed password for root from 61.177.172.19 port 16304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 17:55:36,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342136.217223, 'message': 'Dec 6 17:55:35 hqnl0246134 sshd[239948]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 17:55:38,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342138.2181294, 'message': 'Dec 6 17:55:36 hqnl0246134 sshd[239946]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0437 seconds
INFO [2022-12-06 17:55:38,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342138.2183669, 'message': 'Dec 6 17:55:37 hqnl0246134 sshd[239950]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0442 seconds
INFO [2022-12-06 17:55:38,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342138.218664, 'message': 'Dec 6 17:55:37 hqnl0246134 sshd[239948]: Failed password for root from 61.177.173.46 port 34584 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0442 seconds
INFO [2022-12-06 17:55:38,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342138.2185297, 'message': 'Dec 6 17:55:37 hqnl0246134 sshd[239950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 17:55:38,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342138.2187676, 'message': 'Dec 6 17:55:38 hqnl0246134 sshd[239948]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 17:55:40,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670342140.2221344, 'message': 'Dec 6 17:55:38 hqnl0246134 sshd[239946]: Failed password for root from 61.177.172.19 port 16304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 17:55:40,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342140.222321, 'message': 'Dec 6 17:55:39 hqnl0246134 sshd[239950]: Failed password for root from 61.177.173.18 port 59062 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 17:55:42,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670342142.225745, 'message': 'Dec 6 17:55:40 hqnl0246134 sshd[239948]: Failed password for root from 61.177.173.46 port 34584 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-06 17:55:42,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670342142.2259781, 'message': 'Dec 6 17:55:40 hqnl0246134 sshd[239952]: Invalid user vision from 49.51.24.192 port 39042', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0410 seconds
INFO [2022-12-06 17:55:42,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342142.226381, 'message': 'Dec 6 17:55:41 hqnl0246134 sshd[239950]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0408 seconds
INFO [2022-12-06 17:55:42,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.51.24.192', 'timestamp': 1670342142.226095, 'message': 'Dec 6 17:55:40 hqnl0246134 sshd[239952]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.51.24.192 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:55:42,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.51.24.192', 'timestamp': 1670342142.2262537, 'message': 'Dec 6 17:55:40 hqnl0246134 sshd[239952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.24.192 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0162 seconds
INFO [2022-12-06 17:55:42,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670342142.2265396, 'message': 'Dec 6 17:55:41 hqnl0246134 sshd[239952]: Failed password for invalid user vision from 49.51.24.192 port 39042 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0158 seconds
INFO [2022-12-06 17:55:44,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.24.192', 'timestamp': 1670342144.22608, 'message': 'Dec 6 17:55:43 hqnl0246134 sshd[239952]: Disconnected from invalid user vision 49.51.24.192 port 39042 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0547 seconds
INFO [2022-12-06 17:55:44,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342144.2262774, 'message': 'Dec 6 17:55:43 hqnl0246134 sshd[239950]: Failed password for root from 61.177.173.18 port 59062 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0549 seconds
INFO [2022-12-06 17:55:44,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342144.2264373, 'message': 'Dec 6 17:55:44 hqnl0246134 sshd[239950]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 17:55:46,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342146.2258608, 'message': 'Dec 6 17:55:45 hqnl0246134 sshd[239950]: Failed password for root from 61.177.173.18 port 59062 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
WARNING [2022-12-06 17:55:47,749] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:55:47,750] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:55:54,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342154.2349963, 'message': 'Dec 6 17:55:52 hqnl0246134 sshd[239959]: Invalid user centos from 148.153.110.76 port 41272', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 17:55:54,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342154.2357948, 'message': 'Dec 6 17:55:54 hqnl0246134 sshd[239961]: pam_imunify(sshd:auth): [IM360_RBL] The IP 107.0.200.227 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 17:55:54,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342154.2353423, 'message': 'Dec 6 17:55:52 hqnl0246134 sshd[239959]: pam_imunify(sshd:auth): [IM360_RBL] The IP 148.153.110.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 17:55:54,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342154.2359307, 'message': 'Dec 6 17:55:54 hqnl0246134 sshd[239961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.0.200.227 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 17:55:54,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342154.2355034, 'message': 'Dec 6 17:55:52 hqnl0246134 sshd[239959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.153.110.76 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:55:54,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342154.235665, 'message': 'Dec 6 17:55:53 hqnl0246134 sshd[239959]: Failed password for invalid user centos from 148.153.110.76 port 41272 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 17:55:56,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342156.2379327, 'message': 'Dec 6 17:55:55 hqnl0246134 sshd[239959]: Disconnected from invalid user centos 148.153.110.76 port 41272 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 17:55:56,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342156.238328, 'message': 'Dec 6 17:55:56 hqnl0246134 sshd[239961]: Failed password for root from 107.0.200.227 port 40954 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0336 seconds
WARNING [2022-12-06 17:56:09,299] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:56:09,350] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0670 seconds
INFO [2022-12-06 17:56:18,762] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:56:18,763] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:56:18,770] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:56:18,785] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 17:56:21,383] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:56:21,384] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:56:21,395] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:56:21,410] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0250 seconds
INFO [2022-12-06 17:56:26,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.58.130.230', 'timestamp': 1670342186.2799997, 'message': 'Dec 6 17:56:26 hqnl0246134 sshd[239990]: Invalid user steam from 190.58.130.230 port 55269', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 17:56:26,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.58.130.230', 'timestamp': 1670342186.2805142, 'message': 'Dec 6 17:56:26 hqnl0246134 sshd[239990]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.58.130.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 17:56:26,337] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.58.130.230', 'timestamp': 1670342186.2807152, 'message': 'Dec 6 17:56:26 hqnl0246134 sshd[239990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.58.130.230 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 17:56:28,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342188.282489, 'message': 'Dec 6 17:56:26 hqnl0246134 sshd[239999]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:56:28,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342188.2828643, 'message': 'Dec 6 17:56:26 hqnl0246134 sshd[239999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 17:56:30,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.58.130.230', 'timestamp': 1670342190.2898505, 'message': 'Dec 6 17:56:28 hqnl0246134 sshd[239990]: Failed password for invalid user steam from 190.58.130.230 port 55269 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0630 seconds
INFO [2022-12-06 17:56:30,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.176.79.163', 'timestamp': 1670342190.2902775, 'message': 'Dec 6 17:56:28 hqnl0246134 sshd[240003]: Invalid user hacker from 103.176.79.163 port 38568', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0632 seconds
INFO [2022-12-06 17:56:30,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342190.29097, 'message': 'Dec 6 17:56:29 hqnl0246134 sshd[239999]: Failed password for root from 61.177.173.18 port 43256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0620 seconds
INFO [2022-12-06 17:56:30,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.176.79.163', 'timestamp': 1670342190.2905009, 'message': 'Dec 6 17:56:28 hqnl0246134 sshd[240003]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.176.79.163 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 17:56:30,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342190.2911685, 'message': 'Dec 6 17:56:29 hqnl0246134 sshd[240005]: Invalid user nitin from 206.189.87.115 port 42980', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 17:56:30,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.176.79.163', 'timestamp': 1670342190.2907372, 'message': 'Dec 6 17:56:28 hqnl0246134 sshd[240003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.79.163 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0479 seconds
INFO [2022-12-06 17:56:30,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342190.2913492, 'message': 'Dec 6 17:56:29 hqnl0246134 sshd[240005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.189.87.115 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0488 seconds
INFO [2022-12-06 17:56:30,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.58.130.230', 'timestamp': 1670342190.2917445, 'message': 'Dec 6 17:56:30 hqnl0246134 sshd[239990]: Disconnected from invalid user steam 190.58.130.230 port 55269 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0493 seconds
INFO [2022-12-06 17:56:30,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342190.2915623, 'message': 'Dec 6 17:56:29 hqnl0246134 sshd[240005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.115 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 17:56:32,357] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.176.79.163', 'timestamp': 1670342192.2920864, 'message': 'Dec 6 17:56:30 hqnl0246134 sshd[240003]: Failed password for invalid user hacker from 103.176.79.163 port 38568 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0627 seconds
INFO [2022-12-06 17:56:32,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342192.2926993, 'message': 'Dec 6 17:56:30 hqnl0246134 sshd[240005]: Failed password for invalid user nitin from 206.189.87.115 port 42980 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0627 seconds
INFO [2022-12-06 17:56:32,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342192.2929337, 'message': 'Dec 6 17:56:31 hqnl0246134 sshd[239999]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0624 seconds
INFO [2022-12-06 17:56:32,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.176.79.163', 'timestamp': 1670342192.293545, 'message': 'Dec 6 17:56:31 hqnl0246134 sshd[240003]: Disconnected from invalid user hacker 103.176.79.163 port 38568 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 17:56:32,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342192.2932057, 'message': 'Dec 6 17:56:31 hqnl0246134 sshd[240005]: Disconnected from invalid user nitin 206.189.87.115 port 42980 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 17:56:32,669] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:56:32,670] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:56:32,679] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:56:32,693] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 17:56:34,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342194.3008606, 'message': 'Dec 6 17:56:33 hqnl0246134 sshd[239999]: Failed password for root from 61.177.173.18 port 43256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 17:56:35,767] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 17:56:35,845] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 17:56:35,845] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 17:56:35,846] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 17:56:35,846] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 17:56:35,846] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 17:56:35,859] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 17:56:35,886] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0387 seconds
WARNING [2022-12-06 17:56:35,897] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 17:56:35,900] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:56:35,929] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0528 seconds
INFO [2022-12-06 17:56:35,931] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0496 seconds
INFO [2022-12-06 17:56:36,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342196.295027, 'message': 'Dec 6 17:56:35 hqnl0246134 sshd[239999]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 17:56:38,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342198.2976253, 'message': 'Dec 6 17:56:37 hqnl0246134 sshd[239999]: Failed password for root from 61.177.173.18 port 43256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-06 17:56:47,752] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:56:47,753] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:56:54,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342214.3226202, 'message': 'Dec 6 17:56:52 hqnl0246134 sshd[240019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 17:56:54,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342214.3249915, 'message': 'Dec 6 17:56:52 hqnl0246134 sshd[240019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 17:56:54,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342214.325132, 'message': 'Dec 6 17:56:53 hqnl0246134 sshd[240019]: Failed password for root from 61.177.172.90 port 17623 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 17:56:56,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342216.3251, 'message': 'Dec 6 17:56:54 hqnl0246134 sshd[240019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 17:56:58,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342218.3258421, 'message': 'Dec 6 17:56:56 hqnl0246134 sshd[240019]: Failed password for root from 61.177.172.90 port 17623 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 17:57:00,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342220.328494, 'message': 'Dec 6 17:56:58 hqnl0246134 sshd[240019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:57:02,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342222.330422, 'message': 'Dec 6 17:57:00 hqnl0246134 sshd[240019]: Failed password for root from 61.177.172.90 port 17623 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 17:57:04,361] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670342224.3330812, 'message': 'Dec 6 17:57:02 hqnl0246134 sshd[240049]: Invalid user array from 152.89.196.220 port 28870', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 17:57:04,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342224.3409472, 'message': 'Dec 6 17:57:03 hqnl0246134 sshd[240044]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 17:57:04,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670342224.3332634, 'message': 'Dec 6 17:57:02 hqnl0246134 sshd[240049]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 17:57:04,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342224.3411, 'message': 'Dec 6 17:57:03 hqnl0246134 sshd[240044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 17:57:04,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670342224.3408122, 'message': 'Dec 6 17:57:02 hqnl0246134 sshd[240049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 17:57:06,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670342226.3363044, 'message': 'Dec 6 17:57:05 hqnl0246134 sshd[240049]: Failed password for invalid user array from 152.89.196.220 port 28870 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 17:57:06,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342226.3365135, 'message': 'Dec 6 17:57:05 hqnl0246134 sshd[240044]: Failed password for root from 61.177.172.90 port 40082 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 17:57:08,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670342228.339462, 'message': 'Dec 6 17:57:07 hqnl0246134 sshd[240049]: Disconnected from invalid user array 152.89.196.220 port 28870 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 17:57:08,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342228.340302, 'message': 'Dec 6 17:57:07 hqnl0246134 sshd[240044]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
WARNING [2022-12-06 17:57:09,301] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:57:09,346] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0573 seconds
INFO [2022-12-06 17:57:10,359] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342230.3421288, 'message': 'Dec 6 17:57:09 hqnl0246134 sshd[240044]: Failed password for root from 61.177.172.90 port 40082 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 17:57:10,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342230.3423133, 'message': 'Dec 6 17:57:09 hqnl0246134 sshd[240044]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:57:12,202] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 17:57:12,203] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 17:57:12,204] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 17:57:12,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342232.3453476, 'message': 'Dec 6 17:57:11 hqnl0246134 sshd[240044]: Failed password for root from 61.177.172.90 port 40082 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 17:57:16,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342236.3519528, 'message': 'Dec 6 17:57:14 hqnl0246134 sshd[240054]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 17:57:16,392] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342236.3522716, 'message': 'Dec 6 17:57:14 hqnl0246134 sshd[240054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 17:57:17,989] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:57:17,989] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:57:17,996] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:57:18,011] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 17:57:18,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342238.3542595, 'message': 'Dec 6 17:57:16 hqnl0246134 sshd[240054]: Failed password for root from 61.177.173.18 port 18494 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 17:57:20,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342240.3570004, 'message': 'Dec 6 17:57:18 hqnl0246134 sshd[240054]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 17:57:20,688] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:57:20,688] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:57:20,696] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:57:20,710] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 17:57:22,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342242.360036, 'message': 'Dec 6 17:57:21 hqnl0246134 sshd[240054]: Failed password for root from 61.177.173.18 port 18494 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 17:57:24,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342244.3631763, 'message': 'Dec 6 17:57:23 hqnl0246134 sshd[240054]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0442 seconds
INFO [2022-12-06 17:57:24,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342244.3635533, 'message': 'Dec 6 17:57:23 hqnl0246134 sshd[240066]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.18.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0458 seconds
INFO [2022-12-06 17:57:24,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342244.3638604, 'message': 'Dec 6 17:57:23 hqnl0246134 sshd[240067]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0462 seconds
INFO [2022-12-06 17:57:24,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342244.36372, 'message': 'Dec 6 17:57:23 hqnl0246134 sshd[240066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.217 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0554 seconds
INFO [2022-12-06 17:57:24,468] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342244.364029, 'message': 'Dec 6 17:57:23 hqnl0246134 sshd[240067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0550 seconds
INFO [2022-12-06 17:57:26,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342246.3651931, 'message': 'Dec 6 17:57:24 hqnl0246134 sshd[240054]: Failed password for root from 61.177.173.18 port 18494 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 17:57:26,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342246.365521, 'message': 'Dec 6 17:57:24 hqnl0246134 sshd[240066]: Failed password for root from 139.59.18.217 port 51550 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0495 seconds
INFO [2022-12-06 17:57:26,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342246.3656795, 'message': 'Dec 6 17:57:25 hqnl0246134 sshd[240067]: Failed password for root from 61.177.172.90 port 20851 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0493 seconds
INFO [2022-12-06 17:57:26,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342246.3657985, 'message': 'Dec 6 17:57:26 hqnl0246134 sshd[240067]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 17:57:28,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342248.365635, 'message': 'Dec 6 17:57:28 hqnl0246134 sshd[240067]: Failed password for root from 61.177.172.90 port 20851 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 17:57:32,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342252.3729105, 'message': 'Dec 6 17:57:30 hqnl0246134 sshd[240067]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:57:32,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342252.3732078, 'message': 'Dec 6 17:57:32 hqnl0246134 sshd[240067]: Failed password for root from 61.177.172.90 port 20851 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:57:34,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.132.72', 'timestamp': 1670342254.374279, 'message': 'Dec 6 17:57:33 hqnl0246134 sshd[240085]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.132.72 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 17:57:34,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.132.72', 'timestamp': 1670342254.3746886, 'message': 'Dec 6 17:57:33 hqnl0246134 sshd[240085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.132.72 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 17:57:35,488] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:57:35,488] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:57:35,501] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:57:35,522] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0326 seconds
INFO [2022-12-06 17:57:36,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342256.3786519, 'message': 'Dec 6 17:57:34 hqnl0246134 sshd[240089]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 17:57:36,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '68.183.132.72', 'timestamp': 1670342256.3808024, 'message': 'Dec 6 17:57:35 hqnl0246134 sshd[240085]: Failed password for root from 68.183.132.72 port 52192 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 17:57:36,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342256.3788443, 'message': 'Dec 6 17:57:34 hqnl0246134 sshd[240089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 17:57:36,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342256.3809352, 'message': 'Dec 6 17:57:36 hqnl0246134 sshd[240089]: Failed password for root from 61.177.172.90 port 41144 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:57:38,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342258.3816206, 'message': 'Dec 6 17:57:36 hqnl0246134 sshd[240089]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 17:57:40,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342260.3842301, 'message': 'Dec 6 17:57:39 hqnl0246134 sshd[240089]: Failed password for root from 61.177.172.90 port 41144 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:57:42,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342262.386986, 'message': 'Dec 6 17:57:41 hqnl0246134 sshd[240089]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 17:57:44,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670342264.3890696, 'message': 'Dec 6 17:57:43 hqnl0246134 sshd[240089]: Failed password for root from 61.177.172.90 port 41144 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-06 17:57:47,758] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:57:47,759] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:57:56,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.238.182', 'timestamp': 1670342276.4060633, 'message': 'Dec 6 17:57:55 hqnl0246134 sshd[240098]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.238.182 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 17:57:56,448] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.238.182', 'timestamp': 1670342276.4066498, 'message': 'Dec 6 17:57:55 hqnl0246134 sshd[240098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.238.182 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 17:57:58,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '68.183.238.182', 'timestamp': 1670342278.4082046, 'message': 'Dec 6 17:57:57 hqnl0246134 sshd[240098]: Failed password for root from 68.183.238.182 port 53144 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 17:58:04,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342284.416944, 'message': 'Dec 6 17:58:03 hqnl0246134 sshd[240120]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 17:58:04,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342284.4172428, 'message': 'Dec 6 17:58:03 hqnl0246134 sshd[240120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 17:58:08,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342288.4227173, 'message': 'Dec 6 17:58:06 hqnl0246134 sshd[240120]: Failed password for root from 61.177.173.18 port 53869 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 17:58:08,487] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342288.423008, 'message': 'Dec 6 17:58:08 hqnl0246134 sshd[240120]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
WARNING [2022-12-06 17:58:09,305] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:58:09,331] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0326 seconds
INFO [2022-12-06 17:58:10,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342290.4231193, 'message': 'Dec 6 17:58:10 hqnl0246134 sshd[240120]: Failed password for root from 61.177.173.18 port 53869 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:58:12,444] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342292.425669, 'message': 'Dec 6 17:58:10 hqnl0246134 sshd[240120]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 17:58:14,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342294.4285192, 'message': 'Dec 6 17:58:12 hqnl0246134 sshd[240120]: Failed password for root from 61.177.173.18 port 53869 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 17:58:18,004] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:58:18,004] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:58:18,012] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:58:18,023] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 17:58:20,782] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:58:20,782] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:58:20,790] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:58:20,802] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 17:58:26,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.219.33.178', 'timestamp': 1670342306.4408598, 'message': 'Dec 6 17:58:25 hqnl0246134 sshd[240122]: Invalid user debian from 102.219.33.178 port 38636', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 17:58:26,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '102.219.33.178', 'timestamp': 1670342306.441189, 'message': 'Dec 6 17:58:25 hqnl0246134 sshd[240122]: pam_imunify(sshd:auth): [IM360_RBL] The IP 102.219.33.178 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 17:58:26,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '102.219.33.178', 'timestamp': 1670342306.4413438, 'message': 'Dec 6 17:58:25 hqnl0246134 sshd[240122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.219.33.178 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 17:58:28,462] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.219.33.178', 'timestamp': 1670342308.4432943, 'message': 'Dec 6 17:58:27 hqnl0246134 sshd[240122]: Failed password for invalid user debian from 102.219.33.178 port 38636 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 17:58:30,164] defence360agent.files: Updating all files
INFO [2022-12-06 17:58:30,507] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 17:58:30,507] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 17:58:30,882] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 17:58:30,883] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 17:58:31,154] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 17:58:31,154] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 17:58:31,425] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 17:58:31,426] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 17:58:31,426] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 17:58:31,742] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 15:58:31 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E3F7B8EC548E4'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 17:58:31,744] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 17:58:31,744] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 17:58:32,296] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 17:58:32,296] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 17:58:32,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.219.33.178', 'timestamp': 1670342312.4489772, 'message': 'Dec 6 17:58:31 hqnl0246134 sshd[240122]: Disconnected from invalid user debian 102.219.33.178 port 38636 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 17:58:32,563] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 17:58:32,564] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 17:58:32,880] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 17:58:32,881] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 17:58:33,288] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 17:58:33,289] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 17:58:33,761] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 17:58:33,763] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 17:58:38,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.6.108.33', 'timestamp': 1670342318.4544952, 'message': 'Dec 6 17:58:36 hqnl0246134 sshd[240171]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.6.108.33 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 17:58:38,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.6.108.33', 'timestamp': 1670342318.4549668, 'message': 'Dec 6 17:58:36 hqnl0246134 sshd[240171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.108.33 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 17:58:40,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.6.108.33', 'timestamp': 1670342320.4574997, 'message': 'Dec 6 17:58:38 hqnl0246134 sshd[240171]: Failed password for root from 45.6.108.33 port 55626 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 17:58:43,742] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:58:43,743] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:58:43,755] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:58:43,770] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0253 seconds
WARNING [2022-12-06 17:58:47,762] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:58:47,763] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:58:58,530] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342338.489393, 'message': 'Dec 6 17:58:56 hqnl0246134 sshd[240182]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0395 seconds
INFO [2022-12-06 17:58:58,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342338.489967, 'message': 'Dec 6 17:58:56 hqnl0246134 sshd[240182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 17:59:00,509] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342340.4899657, 'message': 'Dec 6 17:58:59 hqnl0246134 sshd[240182]: Failed password for root from 61.177.173.18 port 37207 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 17:59:02,514] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342342.4932275, 'message': 'Dec 6 17:59:01 hqnl0246134 sshd[240182]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 17:59:04,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342344.4966772, 'message': 'Dec 6 17:59:03 hqnl0246134 sshd[240182]: Failed password for root from 61.177.173.18 port 37207 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 17:59:06,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342346.4996367, 'message': 'Dec 6 17:59:05 hqnl0246134 sshd[240182]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 17:59:08,520] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342348.5027432, 'message': 'Dec 6 17:59:07 hqnl0246134 sshd[240182]: Failed password for root from 61.177.173.18 port 37207 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
WARNING [2022-12-06 17:59:09,313] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:59:09,337] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0314 seconds
INFO [2022-12-06 17:59:19,286] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:59:19,287] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:59:19,296] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:59:19,308] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 17:59:22,146] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 17:59:22,146] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 17:59:22,154] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 17:59:22,165] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 17:59:28,560] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.249.89.102', 'timestamp': 1670342368.533771, 'message': 'Dec 6 17:59:26 hqnl0246134 sshd[240246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.249.89.102 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 17:59:28,578] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.249.89.102', 'timestamp': 1670342368.5343826, 'message': 'Dec 6 17:59:26 hqnl0246134 sshd[240246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.249.89.102 user=mysql', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 17:59:30,569] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '201.249.89.102', 'timestamp': 1670342370.5355465, 'message': 'Dec 6 17:59:28 hqnl0246134 sshd[240246]: Failed password for mysql from 201.249.89.102 port 38596 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 17:59:38,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342378.5500138, 'message': 'Dec 6 17:59:36 hqnl0246134 sshd[240264]: Invalid user admin from 206.189.87.115 port 59628', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0399 seconds
INFO [2022-12-06 17:59:38,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342378.5503561, 'message': 'Dec 6 17:59:36 hqnl0246134 sshd[240264]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.189.87.115 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-06 17:59:38,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342378.5505927, 'message': 'Dec 6 17:59:36 hqnl0246134 sshd[240264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.115 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0479 seconds
INFO [2022-12-06 17:59:40,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342380.5526657, 'message': 'Dec 6 17:59:38 hqnl0246134 sshd[240264]: Failed password for invalid user admin from 206.189.87.115 port 59628 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 17:59:42,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.189.87.115', 'timestamp': 1670342382.556692, 'message': 'Dec 6 17:59:40 hqnl0246134 sshd[240264]: Disconnected from invalid user admin 206.189.87.115 port 59628 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 17:59:46,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342386.5638106, 'message': 'Dec 6 17:59:45 hqnl0246134 sshd[240269]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 17:59:46,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342386.5640886, 'message': 'Dec 6 17:59:45 hqnl0246134 sshd[240269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-06 17:59:47,766] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 17:59:47,767] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 17:59:48,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342388.5662525, 'message': 'Dec 6 17:59:47 hqnl0246134 sshd[240269]: Failed password for root from 61.177.173.18 port 16807 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 17:59:50,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342390.5699127, 'message': 'Dec 6 17:59:49 hqnl0246134 sshd[240269]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0490 seconds
INFO [2022-12-06 17:59:50,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.132.72', 'timestamp': 1670342390.5701985, 'message': 'Dec 6 17:59:50 hqnl0246134 sshd[240272]: Invalid user mohammad from 68.183.132.72 port 35922', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0492 seconds
INFO [2022-12-06 17:59:50,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.132.72', 'timestamp': 1670342390.5703633, 'message': 'Dec 6 17:59:50 hqnl0246134 sshd[240272]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.132.72 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 17:59:50,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.132.72', 'timestamp': 1670342390.5705955, 'message': 'Dec 6 17:59:50 hqnl0246134 sshd[240272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.132.72 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 17:59:52,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342392.5726604, 'message': 'Dec 6 17:59:51 hqnl0246134 sshd[240269]: Failed password for root from 61.177.173.18 port 16807 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 17:59:52,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.132.72', 'timestamp': 1670342392.57285, 'message': 'Dec 6 17:59:51 hqnl0246134 sshd[240272]: Failed password for invalid user mohammad from 68.183.132.72 port 35922 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 17:59:52,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342392.5729656, 'message': 'Dec 6 17:59:52 hqnl0246134 sshd[240269]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 17:59:54,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.58.130.230', 'timestamp': 1670342394.5771282, 'message': 'Dec 6 17:59:52 hqnl0246134 sshd[240275]: Invalid user argo from 190.58.130.230 port 50127', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0459 seconds
INFO [2022-12-06 17:59:54,625] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.132.72', 'timestamp': 1670342394.578816, 'message': 'Dec 6 17:59:53 hqnl0246134 sshd[240272]: Disconnected from invalid user mohammad 68.183.132.72 port 35922 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-06 17:59:54,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342394.579006, 'message': 'Dec 6 17:59:54 hqnl0246134 sshd[240269]: Failed password for root from 61.177.173.18 port 16807 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-06 17:59:54,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.58.130.230', 'timestamp': 1670342394.578427, 'message': 'Dec 6 17:59:53 hqnl0246134 sshd[240275]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.58.130.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 17:59:54,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.58.130.230', 'timestamp': 1670342394.5786505, 'message': 'Dec 6 17:59:53 hqnl0246134 sshd[240275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.58.130.230 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 17:59:56,615] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.58.130.230', 'timestamp': 1670342396.5786192, 'message': 'Dec 6 17:59:54 hqnl0246134 sshd[240275]: Failed password for invalid user argo from 190.58.130.230 port 50127 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 17:59:56,616] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.176.79.163', 'timestamp': 1670342396.5791714, 'message': 'Dec 6 17:59:56 hqnl0246134 sshd[240277]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.176.79.163 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 17:59:56,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.58.130.230', 'timestamp': 1670342396.5790224, 'message': 'Dec 6 17:59:55 hqnl0246134 sshd[240275]: Disconnected from invalid user argo 190.58.130.230 port 50127 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 17:59:56,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.176.79.163', 'timestamp': 1670342396.5793138, 'message': 'Dec 6 17:59:56 hqnl0246134 sshd[240277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.79.163 user=mysql', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 18:00:00,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.176.79.163', 'timestamp': 1670342400.5901756, 'message': 'Dec 6 17:59:58 hqnl0246134 sshd[240277]: Failed password for mysql from 103.176.79.163 port 56184 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-06 18:00:09,320] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:00:09,347] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0379 seconds
INFO [2022-12-06 18:00:17,727] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:00:17,728] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:00:17,738] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:00:17,754] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0245 seconds
INFO [2022-12-06 18:00:20,500] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:00:20,500] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:00:20,507] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:00:20,519] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 18:00:36,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342436.6483512, 'message': 'Dec 6 18:00:34 hqnl0246134 sshd[240363]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 18:00:36,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342436.6491377, 'message': 'Dec 6 18:00:34 hqnl0246134 sshd[240363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 18:00:38,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342438.6465294, 'message': 'Dec 6 18:00:36 hqnl0246134 sshd[240363]: Failed password for root from 61.177.173.18 port 49350 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0437 seconds
INFO [2022-12-06 18:00:38,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342438.6467907, 'message': 'Dec 6 18:00:37 hqnl0246134 sshd[240363]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:00:40,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342440.64769, 'message': 'Dec 6 18:00:38 hqnl0246134 sshd[240363]: Failed password for root from 61.177.173.18 port 49350 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:00:40,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342440.6479495, 'message': 'Dec 6 18:00:39 hqnl0246134 sshd[240363]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 18:00:42,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342442.6499956, 'message': 'Dec 6 18:00:41 hqnl0246134 sshd[240363]: Failed password for root from 61.177.173.18 port 49350 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 18:00:44,258] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:00:44,258] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:00:44,271] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:00:44,282] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 18:00:44,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '220.80.223.144', 'timestamp': 1670342444.6509702, 'message': 'Dec 6 18:00:43 hqnl0246134 sshd[240366]: pam_imunify(sshd:auth): [IM360_RBL] The IP 220.80.223.144 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:00:44,688] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '220.80.223.144', 'timestamp': 1670342444.6512027, 'message': 'Dec 6 18:00:43 hqnl0246134 sshd[240366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.80.223.144 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:00:46,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '220.80.223.144', 'timestamp': 1670342446.654016, 'message': 'Dec 6 18:00:45 hqnl0246134 sshd[240366]: Failed password for root from 220.80.223.144 port 45304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0361 seconds
WARNING [2022-12-06 18:00:47,771] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:00:47,772] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 18:01:09,330] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:01:09,369] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0559 seconds
INFO [2022-12-06 18:01:18,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.238.182', 'timestamp': 1670342478.699633, 'message': 'Dec 6 18:01:17 hqnl0246134 sshd[240408]: Invalid user test from 68.183.238.182 port 49724', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 18:01:18,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.238.182', 'timestamp': 1670342478.6999645, 'message': 'Dec 6 18:01:17 hqnl0246134 sshd[240408]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.238.182 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:01:18,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.238.182', 'timestamp': 1670342478.7001734, 'message': 'Dec 6 18:01:17 hqnl0246134 sshd[240408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.238.182 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 18:01:19,422] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:01:19,422] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:01:19,433] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:01:19,454] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0312 seconds
INFO [2022-12-06 18:01:20,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.238.182', 'timestamp': 1670342480.6990013, 'message': 'Dec 6 18:01:19 hqnl0246134 sshd[240408]: Failed password for invalid user test from 68.183.238.182 port 49724 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0557 seconds
INFO [2022-12-06 18:01:20,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.238.182', 'timestamp': 1670342480.6991947, 'message': 'Dec 6 18:01:20 hqnl0246134 sshd[240408]: Disconnected from invalid user test 68.183.238.182 port 49724 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0445 seconds
INFO [2022-12-06 18:01:22,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342482.699391, 'message': 'Dec 6 18:01:21 hqnl0246134 sshd[240418]: Invalid user omar from 139.59.18.217 port 56314', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-06 18:01:22,778] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342482.6996088, 'message': 'Dec 6 18:01:21 hqnl0246134 sshd[240418]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.18.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0387 seconds
INFO [2022-12-06 18:01:22,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342482.6997192, 'message': 'Dec 6 18:01:21 hqnl0246134 sshd[240418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.217 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0842 seconds
INFO [2022-12-06 18:01:24,179] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:01:24,181] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:01:24,194] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:01:24,215] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0336 seconds
INFO [2022-12-06 18:01:24,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342484.701995, 'message': 'Dec 6 18:01:23 hqnl0246134 sshd[240418]: Failed password for invalid user omar from 139.59.18.217 port 56314 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 18:01:24,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342484.7021804, 'message': 'Dec 6 18:01:23 hqnl0246134 sshd[240418]: Disconnected from invalid user omar 139.59.18.217 port 56314 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 18:01:26,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342486.7057726, 'message': 'Dec 6 18:01:25 hqnl0246134 sshd[240424]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 18:01:26,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342486.706566, 'message': 'Dec 6 18:01:25 hqnl0246134 sshd[240424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 18:01:26,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342486.706854, 'message': 'Dec 6 18:01:26 hqnl0246134 sshd[240424]: Failed password for root from 61.177.173.18 port 31872 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 18:01:28,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342488.7059011, 'message': 'Dec 6 18:01:27 hqnl0246134 sshd[240424]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0566 seconds
INFO [2022-12-06 18:01:30,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342490.7077193, 'message': 'Dec 6 18:01:29 hqnl0246134 sshd[240424]: Failed password for root from 61.177.173.18 port 31872 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:01:32,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342492.7094371, 'message': 'Dec 6 18:01:31 hqnl0246134 sshd[240424]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 18:01:34,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342494.7126615, 'message': 'Dec 6 18:01:33 hqnl0246134 sshd[240424]: Failed password for root from 61.177.173.18 port 31872 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 18:01:47,775] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:01:47,776] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 18:01:53,369] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 18:02:02,778] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.132.72', 'timestamp': 1670342522.740368, 'message': 'Dec 6 18:02:01 hqnl0246134 sshd[240462]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.132.72 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 18:02:02,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.132.72', 'timestamp': 1670342522.7410452, 'message': 'Dec 6 18:02:01 hqnl0246134 sshd[240462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.132.72 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 18:02:04,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '68.183.132.72', 'timestamp': 1670342524.736035, 'message': 'Dec 6 18:02:03 hqnl0246134 sshd[240462]: Failed password for root from 68.183.132.72 port 48190 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:02:08,877] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:02:08,877] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:02:08,885] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:02:08,898] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
WARNING [2022-12-06 18:02:09,323] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:02:09,345] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0288 seconds
INFO [2022-12-06 18:02:14,764] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342534.7456574, 'message': 'Dec 6 18:02:14 hqnl0246134 sshd[240473]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:02:14,783] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342534.7458882, 'message': 'Dec 6 18:02:14 hqnl0246134 sshd[240473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:02:16,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342536.746515, 'message': 'Dec 6 18:02:16 hqnl0246134 sshd[240473]: Failed password for root from 61.177.173.18 port 11706 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 18:02:17,855] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:02:17,856] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:02:17,864] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:02:17,876] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 18:02:20,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342540.7537594, 'message': 'Dec 6 18:02:18 hqnl0246134 sshd[240473]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 18:02:20,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342540.7543058, 'message': 'Dec 6 18:02:20 hqnl0246134 sshd[240473]: Failed password for root from 61.177.173.18 port 11706 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:02:20,881] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:02:20,881] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:02:20,889] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:02:20,901] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 18:02:22,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342542.7526133, 'message': 'Dec 6 18:02:21 hqnl0246134 sshd[240473]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-06 18:02:24,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342544.7542756, 'message': 'Dec 6 18:02:23 hqnl0246134 sshd[240473]: Failed password for root from 61.177.173.18 port 11706 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 18:02:32,145] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 18:02:32,214] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 18:02:32,215] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 18:02:32,215] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 18:02:32,215] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 18:02:32,216] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 18:02:32,230] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 18:02:32,256] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0395 seconds
WARNING [2022-12-06 18:02:32,263] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 18:02:32,265] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:02:32,282] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0343 seconds
INFO [2022-12-06 18:02:32,284] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0305 seconds
INFO [2022-12-06 18:02:36,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.51.103.26', 'timestamp': 1670342556.7691946, 'message': 'Dec 6 18:02:36 hqnl0246134 sshd[240519]: Invalid user test from 202.51.103.26 port 48744', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 18:02:36,809] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.51.103.26', 'timestamp': 1670342556.7695644, 'message': 'Dec 6 18:02:36 hqnl0246134 sshd[240519]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.51.103.26 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:02:36,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.51.103.26', 'timestamp': 1670342556.7697272, 'message': 'Dec 6 18:02:36 hqnl0246134 sshd[240519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.103.26 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:02:38,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.51.103.26', 'timestamp': 1670342558.770011, 'message': 'Dec 6 18:02:38 hqnl0246134 sshd[240519]: Failed password for invalid user test from 202.51.103.26 port 48744 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 18:02:38,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.6.108.33', 'timestamp': 1670342558.7702398, 'message': 'Dec 6 18:02:38 hqnl0246134 sshd[240522]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.6.108.33 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 18:02:38,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.6.108.33', 'timestamp': 1670342558.7703557, 'message': 'Dec 6 18:02:38 hqnl0246134 sshd[240522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.108.33 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:02:42,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.6.108.33', 'timestamp': 1670342562.7754555, 'message': 'Dec 6 18:02:40 hqnl0246134 sshd[240522]: Failed password for root from 45.6.108.33 port 40790 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 18:02:46,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.163.202.132', 'timestamp': 1670342566.7811575, 'message': 'Dec 6 18:02:45 hqnl0246134 sshd[240525]: Invalid user test from 103.163.202.132 port 60081', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:02:46,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.163.202.132', 'timestamp': 1670342566.7813718, 'message': 'Dec 6 18:02:45 hqnl0246134 sshd[240525]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.163.202.132 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:02:46,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.163.202.132', 'timestamp': 1670342566.7815573, 'message': 'Dec 6 18:02:45 hqnl0246134 sshd[240525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.163.202.132 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 18:02:47,782] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:02:47,783] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:02:48,802] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.163.202.132', 'timestamp': 1670342568.7833352, 'message': 'Dec 6 18:02:47 hqnl0246134 sshd[240525]: Failed password for invalid user test from 103.163.202.132 port 60081 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:03:02,356] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 18:03:02,357] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 18:03:02,358] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 18:03:06,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342586.806578, 'message': 'Dec 6 18:03:05 hqnl0246134 sshd[240549]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 18:03:06,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342586.807106, 'message': 'Dec 6 18:03:05 hqnl0246134 sshd[240549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 18:03:08,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342588.8063273, 'message': 'Dec 6 18:03:07 hqnl0246134 sshd[240549]: Failed password for root from 61.177.173.18 port 41385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:03:08,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342588.806593, 'message': 'Dec 6 18:03:07 hqnl0246134 sshd[240549]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 18:03:09,861] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:03:09,884] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.5635 seconds
INFO [2022-12-06 18:03:10,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342590.808808, 'message': 'Dec 6 18:03:10 hqnl0246134 sshd[240549]: Failed password for root from 61.177.173.18 port 41385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 18:03:10,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.176.79.163', 'timestamp': 1670342590.809013, 'message': 'Dec 6 18:03:10 hqnl0246134 sshd[240551]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.176.79.163 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 18:03:10,856] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.176.79.163', 'timestamp': 1670342590.8091426, 'message': 'Dec 6 18:03:10 hqnl0246134 sshd[240551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.79.163 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 18:03:12,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.176.79.163', 'timestamp': 1670342592.8120286, 'message': 'Dec 6 18:03:12 hqnl0246134 sshd[240551]: Failed password for root from 103.176.79.163 port 45568 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 18:03:14,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342594.8140569, 'message': 'Dec 6 18:03:12 hqnl0246134 sshd[240549]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:03:14,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342594.8142967, 'message': 'Dec 6 18:03:14 hqnl0246134 sshd[240549]: Failed password for root from 61.177.173.18 port 41385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:03:18,208] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:03:18,209] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:03:18,217] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:03:18,231] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 18:03:20,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342600.8203216, 'message': 'Dec 6 18:03:19 hqnl0246134 sshd[240563]: Invalid user romeo from 107.0.200.227 port 54506', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 18:03:20,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342600.820595, 'message': 'Dec 6 18:03:19 hqnl0246134 sshd[240563]: pam_imunify(sshd:auth): [IM360_RBL] The IP 107.0.200.227 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:03:20,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342600.82071, 'message': 'Dec 6 18:03:19 hqnl0246134 sshd[240563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.0.200.227 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:03:21,131] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:03:21,132] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:03:21,139] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:03:21,150] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 18:03:22,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342602.823254, 'message': 'Dec 6 18:03:22 hqnl0246134 sshd[240563]: Failed password for invalid user romeo from 107.0.200.227 port 54506 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 18:03:24,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342604.825973, 'message': 'Dec 6 18:03:23 hqnl0246134 sshd[240563]: Disconnected from invalid user romeo 107.0.200.227 port 54506 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 18:03:38,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.30.249.87', 'timestamp': 1670342618.838262, 'message': 'Dec 6 18:03:37 hqnl0246134 sshd[240581]: Invalid user musikbot from 123.30.249.87 port 54432', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 18:03:38,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '123.30.249.87', 'timestamp': 1670342618.8389945, 'message': 'Dec 6 18:03:37 hqnl0246134 sshd[240581]: pam_imunify(sshd:auth): [IM360_RBL] The IP 123.30.249.87 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:03:38,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '123.30.249.87', 'timestamp': 1670342618.839218, 'message': 'Dec 6 18:03:37 hqnl0246134 sshd[240581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.249.87 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 18:03:40,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.30.249.87', 'timestamp': 1670342620.8384366, 'message': 'Dec 6 18:03:39 hqnl0246134 sshd[240581]: Failed password for invalid user musikbot from 123.30.249.87 port 54432 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 18:03:40,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.30.249.87', 'timestamp': 1670342620.8386288, 'message': 'Dec 6 18:03:40 hqnl0246134 sshd[240581]: Disconnected from invalid user musikbot 123.30.249.87 port 54432 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0559 seconds
INFO [2022-12-06 18:03:43,101] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:03:43,101] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:03:43,109] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:03:43,120] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 18:03:46,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342626.8404431, 'message': 'Dec 6 18:03:45 hqnl0246134 sshd[240596]: pam_imunify(sshd:auth): [IM360_RBL] The IP 148.153.110.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 18:03:46,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342626.8406925, 'message': 'Dec 6 18:03:45 hqnl0246134 sshd[240596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.153.110.76 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0230 seconds
WARNING [2022-12-06 18:03:47,786] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:03:47,787] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:03:48,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342628.8419251, 'message': 'Dec 6 18:03:47 hqnl0246134 sshd[240596]: Failed password for root from 148.153.110.76 port 59992 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:03:50,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342630.8431172, 'message': 'Dec 6 18:03:48 hqnl0246134 sshd[240599]: Invalid user lee from 139.59.18.217 port 32814', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 18:03:50,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342630.8433125, 'message': 'Dec 6 18:03:48 hqnl0246134 sshd[240599]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.18.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 18:03:50,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342630.8434818, 'message': 'Dec 6 18:03:48 hqnl0246134 sshd[240599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.217 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:03:50,919] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342630.8435931, 'message': 'Dec 6 18:03:50 hqnl0246134 sshd[240599]: Failed password for invalid user lee from 139.59.18.217 port 32814 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:03:52,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.18.217', 'timestamp': 1670342632.845559, 'message': 'Dec 6 18:03:50 hqnl0246134 sshd[240599]: Disconnected from invalid user lee 139.59.18.217 port 32814 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 18:03:56,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342636.8502977, 'message': 'Dec 6 18:03:55 hqnl0246134 sshd[240601]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 18:03:56,894] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342636.8506649, 'message': 'Dec 6 18:03:55 hqnl0246134 sshd[240601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 18:03:58,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342638.8524513, 'message': 'Dec 6 18:03:57 hqnl0246134 sshd[240601]: Failed password for root from 61.177.173.18 port 19745 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:03:58,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342638.8526456, 'message': 'Dec 6 18:03:58 hqnl0246134 sshd[240601]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:04:00,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342640.853662, 'message': 'Dec 6 18:04:00 hqnl0246134 sshd[240601]: Failed password for root from 61.177.173.18 port 19745 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 18:04:02,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342642.8571632, 'message': 'Dec 6 18:04:02 hqnl0246134 sshd[240601]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 18:04:06,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342646.862918, 'message': 'Dec 6 18:04:05 hqnl0246134 sshd[240601]: Failed password for root from 61.177.173.18 port 19745 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0270 seconds
WARNING [2022-12-06 18:04:09,341] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:04:09,392] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0666 seconds
INFO [2022-12-06 18:04:18,235] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:04:18,236] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:04:18,246] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:04:18,258] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-06 18:04:23,162] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:04:23,162] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:04:23,172] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:04:23,186] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0232 seconds
INFO [2022-12-06 18:04:28,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.238.182', 'timestamp': 1670342668.8882952, 'message': 'Dec 6 18:04:27 hqnl0246134 sshd[240639]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.238.182 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0489 seconds
INFO [2022-12-06 18:04:28,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.238.182', 'timestamp': 1670342668.8897226, 'message': 'Dec 6 18:04:27 hqnl0246134 sshd[240639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.238.182 user=ftp', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 18:04:30,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '68.183.238.182', 'timestamp': 1670342670.8883634, 'message': 'Dec 6 18:04:29 hqnl0246134 sshd[240639]: Failed password for ftp from 68.183.238.182 port 43638 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:04:46,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342686.903745, 'message': 'Dec 6 18:04:45 hqnl0246134 sshd[240653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0552 seconds
INFO [2022-12-06 18:04:46,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342686.9042587, 'message': 'Dec 6 18:04:46 hqnl0246134 sshd[240655]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.110.44 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0557 seconds
INFO [2022-12-06 18:04:47,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342686.9040375, 'message': 'Dec 6 18:04:45 hqnl0246134 sshd[240653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0487 seconds
INFO [2022-12-06 18:04:47,011] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342686.9045095, 'message': 'Dec 6 18:04:46 hqnl0246134 sshd[240655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.110.44 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0484 seconds
WARNING [2022-12-06 18:04:47,791] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:04:47,791] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:04:48,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342688.9035296, 'message': 'Dec 6 18:04:47 hqnl0246134 sshd[240653]: Failed password for root from 61.177.173.18 port 46506 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 18:04:48,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342688.9037635, 'message': 'Dec 6 18:04:48 hqnl0246134 sshd[240655]: Failed password for root from 43.153.110.44 port 57344 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 18:04:50,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342690.905983, 'message': 'Dec 6 18:04:49 hqnl0246134 sshd[240653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:04:52,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342692.907073, 'message': 'Dec 6 18:04:51 hqnl0246134 sshd[240653]: Failed password for root from 61.177.173.18 port 46506 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 18:04:52,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342692.907264, 'message': 'Dec 6 18:04:51 hqnl0246134 sshd[240653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 18:04:54,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342694.9097598, 'message': 'Dec 6 18:04:54 hqnl0246134 sshd[240653]: Failed password for root from 61.177.173.18 port 46506 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 18:04:55,116] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:04:55,117] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:04:55,125] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:04:55,137] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 18:05:00,949] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.110.197.126', 'timestamp': 1670342700.917812, 'message': 'Dec 6 18:05:00 hqnl0246134 sshd[240677]: Invalid user user01 from 202.110.197.126 port 54296', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 18:05:00,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.110.197.126', 'timestamp': 1670342700.9186647, 'message': 'Dec 6 18:05:00 hqnl0246134 sshd[240677]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.110.197.126 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 18:05:00,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.110.197.126', 'timestamp': 1670342700.918906, 'message': 'Dec 6 18:05:00 hqnl0246134 sshd[240677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.110.197.126 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 18:05:02,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.110.197.126', 'timestamp': 1670342702.9200544, 'message': 'Dec 6 18:05:02 hqnl0246134 sshd[240677]: Failed password for invalid user user01 from 202.110.197.126 port 54296 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 18:05:02,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.110.197.126', 'timestamp': 1670342702.9205146, 'message': 'Dec 6 18:05:02 hqnl0246134 sshd[240677]: Disconnected from invalid user user01 202.110.197.126 port 54296 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0233 seconds
WARNING [2022-12-06 18:05:09,340] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:05:09,369] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0400 seconds
INFO [2022-12-06 18:05:17,814] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:05:17,815] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:05:17,825] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:05:17,838] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-06 18:05:20,667] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:05:20,668] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:05:20,675] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:05:20,687] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 18:05:20,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.12.119', 'timestamp': 1670342720.9350631, 'message': 'Dec 6 18:05:19 hqnl0246134 sshd[240717]: Invalid user paulo from 14.161.12.119 port 43030', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 18:05:20,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.161.12.119', 'timestamp': 1670342720.9353337, 'message': 'Dec 6 18:05:19 hqnl0246134 sshd[240717]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.161.12.119 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:05:20,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.161.12.119', 'timestamp': 1670342720.935487, 'message': 'Dec 6 18:05:19 hqnl0246134 sshd[240717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 18:05:22,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.12.119', 'timestamp': 1670342722.935636, 'message': 'Dec 6 18:05:21 hqnl0246134 sshd[240717]: Failed password for invalid user paulo from 14.161.12.119 port 43030 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 18:05:22,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.12.119', 'timestamp': 1670342722.9358292, 'message': 'Dec 6 18:05:22 hqnl0246134 sshd[240717]: Disconnected from invalid user paulo 14.161.12.119 port 43030 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:05:30,971] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.164.86.17', 'timestamp': 1670342730.9425046, 'message': 'Dec 6 18:05:30 hqnl0246134 sshd[240736]: Invalid user db2inst1 from 122.164.86.17 port 12340', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 18:05:30,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.164.86.17', 'timestamp': 1670342730.9428477, 'message': 'Dec 6 18:05:30 hqnl0246134 sshd[240736]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.164.86.17 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 18:05:31,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.164.86.17', 'timestamp': 1670342730.9430156, 'message': 'Dec 6 18:05:30 hqnl0246134 sshd[240736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.164.86.17 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 18:05:32,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.164.86.17', 'timestamp': 1670342732.9468977, 'message': 'Dec 6 18:05:32 hqnl0246134 sshd[240736]: Failed password for invalid user db2inst1 from 122.164.86.17 port 12340 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:05:32,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.164.86.17', 'timestamp': 1670342732.947128, 'message': 'Dec 6 18:05:32 hqnl0246134 sshd[240736]: Disconnected from invalid user db2inst1 122.164.86.17 port 12340 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:05:36,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342736.9565456, 'message': 'Dec 6 18:05:35 hqnl0246134 sshd[240743]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 18:05:37,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342736.9568667, 'message': 'Dec 6 18:05:35 hqnl0246134 sshd[240743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 18:05:38,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342738.9611325, 'message': 'Dec 6 18:05:37 hqnl0246134 sshd[240743]: Failed password for root from 61.177.173.18 port 20562 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 18:05:38,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342738.9613166, 'message': 'Dec 6 18:05:37 hqnl0246134 sshd[240743]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 18:05:40,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342740.9711015, 'message': 'Dec 6 18:05:39 hqnl0246134 sshd[240743]: Failed password for root from 61.177.173.18 port 20562 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 18:05:42,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342742.9626262, 'message': 'Dec 6 18:05:42 hqnl0246134 sshd[240743]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 18:05:45,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342745.0133157, 'message': 'Dec 6 18:05:43 hqnl0246134 sshd[240743]: Failed password for root from 61.177.173.18 port 20562 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
WARNING [2022-12-06 18:05:47,794] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:05:47,795] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:06:03,085] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 18:06:03,153] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 18:06:03,154] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 18:06:03,155] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 18:06:03,155] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 18:06:03,155] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 18:06:03,169] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 18:06:03,186] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0292 seconds
WARNING [2022-12-06 18:06:03,193] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 18:06:03,195] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:06:03,212] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0321 seconds
INFO [2022-12-06 18:06:03,214] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0302 seconds
INFO [2022-12-06 18:06:05,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342764.9828982, 'message': 'Dec 6 18:06:03 hqnl0246134 sshd[240765]: Invalid user sysadm from 163.121.146.133 port 37884', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:06:05,029] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342764.983163, 'message': 'Dec 6 18:06:04 hqnl0246134 sshd[240765]: pam_imunify(sshd:auth): [IM360_RBL] The IP 163.121.146.133 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 18:06:05,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342764.9833038, 'message': 'Dec 6 18:06:04 hqnl0246134 sshd[240765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.121.146.133 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 18:06:07,018] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '96.43.99.83', 'timestamp': 1670342766.983179, 'message': 'Dec 6 18:06:06 hqnl0246134 sshd[240768]: Invalid user account from 96.43.99.83 port 46874', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 18:06:07,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342766.9838629, 'message': 'Dec 6 18:06:06 hqnl0246134 sshd[240765]: Failed password for invalid user sysadm from 163.121.146.133 port 37884 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 18:06:07,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '96.43.99.83', 'timestamp': 1670342766.983488, 'message': 'Dec 6 18:06:06 hqnl0246134 sshd[240768]: pam_imunify(sshd:auth): [IM360_RBL] The IP 96.43.99.83 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 18:06:07,057] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '96.43.99.83', 'timestamp': 1670342766.9836283, 'message': 'Dec 6 18:06:06 hqnl0246134 sshd[240768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.43.99.83 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:06:09,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342768.9839034, 'message': 'Dec 6 18:06:07 hqnl0246134 sshd[240765]: Disconnected from invalid user sysadm 163.121.146.133 port 37884 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0645 seconds
INFO [2022-12-06 18:06:09,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '96.43.99.83', 'timestamp': 1670342768.9843647, 'message': 'Dec 6 18:06:08 hqnl0246134 sshd[240768]: Failed password for invalid user account from 96.43.99.83 port 46874 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0645 seconds
INFO [2022-12-06 18:06:09,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '96.43.99.83', 'timestamp': 1670342768.9845629, 'message': 'Dec 6 18:06:08 hqnl0246134 sshd[240768]: Disconnected from invalid user account 96.43.99.83 port 46874 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0705 seconds
WARNING [2022-12-06 18:06:09,350] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:06:09,414] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0811 seconds
INFO [2022-12-06 18:06:11,456] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:06:11,457] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:06:11,471] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:06:11,483] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0250 seconds
INFO [2022-12-06 18:06:15,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342775.093875, 'message': 'Dec 6 18:06:13 hqnl0246134 sshd[240781]: Invalid user username from 107.0.200.227 port 43216', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:06:15,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342775.0941029, 'message': 'Dec 6 18:06:14 hqnl0246134 sshd[240781]: pam_imunify(sshd:auth): [IM360_RBL] The IP 107.0.200.227 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:06:15,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342775.094222, 'message': 'Dec 6 18:06:14 hqnl0246134 sshd[240781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.0.200.227 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 18:06:17,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342776.9906228, 'message': 'Dec 6 18:06:16 hqnl0246134 sshd[240781]: Failed password for invalid user username from 107.0.200.227 port 43216 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:06:17,719] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:06:17,719] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:06:17,732] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:06:17,754] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0338 seconds
INFO [2022-12-06 18:06:19,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342778.9922926, 'message': 'Dec 6 18:06:18 hqnl0246134 sshd[240781]: Disconnected from invalid user username 107.0.200.227 port 43216 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 18:06:20,348] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:06:20,349] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:06:20,356] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:06:20,367] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 18:06:27,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342787.000357, 'message': 'Dec 6 18:06:25 hqnl0246134 sshd[240793]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 18:06:27,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342787.0005689, 'message': 'Dec 6 18:06:25 hqnl0246134 sshd[240793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:06:29,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342789.0033984, 'message': 'Dec 6 18:06:27 hqnl0246134 sshd[240793]: Failed password for root from 61.177.173.18 port 56403 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 18:06:29,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342789.0041194, 'message': 'Dec 6 18:06:27 hqnl0246134 sshd[240793]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:06:31,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342791.0053957, 'message': 'Dec 6 18:06:29 hqnl0246134 sshd[240805]: Invalid user coder from 148.153.110.76 port 49832', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0437 seconds
INFO [2022-12-06 18:06:31,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342791.0060124, 'message': 'Dec 6 18:06:30 hqnl0246134 sshd[240793]: Failed password for root from 61.177.173.18 port 56403 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 18:06:31,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342791.0056605, 'message': 'Dec 6 18:06:29 hqnl0246134 sshd[240805]: pam_imunify(sshd:auth): [IM360_RBL] The IP 148.153.110.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 18:06:31,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342791.0058088, 'message': 'Dec 6 18:06:29 hqnl0246134 sshd[240805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.153.110.76 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 18:06:31,133] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342791.0061607, 'message': 'Dec 6 18:06:30 hqnl0246134 sshd[240805]: Failed password for invalid user coder from 148.153.110.76 port 49832 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 18:06:33,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342793.0082784, 'message': 'Dec 6 18:06:31 hqnl0246134 sshd[240807]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0468 seconds
INFO [2022-12-06 18:06:33,057] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342793.0086753, 'message': 'Dec 6 18:06:31 hqnl0246134 sshd[240805]: Disconnected from invalid user coder 148.153.110.76 port 49832 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0475 seconds
INFO [2022-12-06 18:06:33,058] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342793.00878, 'message': 'Dec 6 18:06:32 hqnl0246134 sshd[240793]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 18:06:33,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342793.0085282, 'message': 'Dec 6 18:06:31 hqnl0246134 sshd[240807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:06:35,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342795.011409, 'message': 'Dec 6 18:06:33 hqnl0246134 sshd[240807]: Failed password for root from 61.177.173.39 port 13072 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 18:06:35,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342795.01164, 'message': 'Dec 6 18:06:34 hqnl0246134 sshd[240793]: Failed password for root from 61.177.173.18 port 56403 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 18:06:36,391] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 18:06:36,391] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 18:06:36,393] im360.plugins.client360: Waiting 7 minutes before retry...
INFO [2022-12-06 18:06:37,079] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342797.0135055, 'message': 'Dec 6 18:06:35 hqnl0246134 sshd[240832]: Invalid user p from 163.121.146.133 port 45406', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0648 seconds
INFO [2022-12-06 18:06:37,082] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342797.0142264, 'message': 'Dec 6 18:06:35 hqnl0246134 sshd[240807]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0669 seconds
INFO [2022-12-06 18:06:37,129] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342797.0137117, 'message': 'Dec 6 18:06:35 hqnl0246134 sshd[240832]: pam_imunify(sshd:auth): [IM360_RBL] The IP 163.121.146.133 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0498 seconds
INFO [2022-12-06 18:06:37,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342797.0138288, 'message': 'Dec 6 18:06:35 hqnl0246134 sshd[240832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.121.146.133 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0684 seconds
INFO [2022-12-06 18:06:39,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342799.0171084, 'message': 'Dec 6 18:06:37 hqnl0246134 sshd[240832]: Failed password for invalid user p from 163.121.146.133 port 45406 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 18:06:39,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342799.0173087, 'message': 'Dec 6 18:06:37 hqnl0246134 sshd[240807]: Failed password for root from 61.177.173.39 port 13072 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 18:06:39,073] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342799.0182252, 'message': 'Dec 6 18:06:38 hqnl0246134 sshd[240832]: Disconnected from invalid user p 163.121.146.133 port 45406 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 18:06:39,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342799.0181046, 'message': 'Dec 6 18:06:37 hqnl0246134 sshd[240807]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 18:06:41,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342801.0201519, 'message': 'Dec 6 18:06:39 hqnl0246134 sshd[240807]: Failed password for root from 61.177.173.39 port 13072 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 18:06:43,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342803.0221376, 'message': 'Dec 6 18:06:42 hqnl0246134 sshd[240838]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 18:06:43,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342803.0224938, 'message': 'Dec 6 18:06:42 hqnl0246134 sshd[240838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 18:06:45,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342805.024651, 'message': 'Dec 6 18:06:43 hqnl0246134 sshd[240838]: Failed password for root from 61.177.173.39 port 35497 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 18:06:45,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342805.0249617, 'message': 'Dec 6 18:06:44 hqnl0246134 sshd[240838]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1510 seconds
INFO [2022-12-06 18:06:47,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342807.026073, 'message': 'Dec 6 18:06:46 hqnl0246134 sshd[240838]: Failed password for root from 61.177.173.39 port 35497 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
WARNING [2022-12-06 18:06:47,797] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:06:47,798] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:06:51,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342811.0298371, 'message': 'Dec 6 18:06:49 hqnl0246134 sshd[240838]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:06:51,068] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342811.0300195, 'message': 'Dec 6 18:06:50 hqnl0246134 sshd[240838]: Failed password for root from 61.177.173.39 port 35497 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:06:53,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342813.0335903, 'message': 'Dec 6 18:06:52 hqnl0246134 sshd[240841]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:06:53,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342813.0337968, 'message': 'Dec 6 18:06:52 hqnl0246134 sshd[240841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 18:06:55,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342815.054236, 'message': 'Dec 6 18:06:54 hqnl0246134 sshd[240841]: Failed password for root from 61.177.173.39 port 12647 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0678 seconds
INFO [2022-12-06 18:06:57,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342817.0402193, 'message': 'Dec 6 18:06:55 hqnl0246134 sshd[240841]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 18:06:59,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342819.0424204, 'message': 'Dec 6 18:06:57 hqnl0246134 sshd[240841]: Failed password for root from 61.177.173.39 port 12647 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 18:07:01,083] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342821.0457804, 'message': 'Dec 6 18:06:59 hqnl0246134 sshd[240841]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 18:07:03,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670342823.0466251, 'message': 'Dec 6 18:07:01 hqnl0246134 sshd[240841]: Failed password for root from 61.177.173.39 port 12647 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 18:07:05,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342825.048661, 'message': 'Dec 6 18:07:04 hqnl0246134 sshd[240870]: pam_imunify(sshd:auth): [IM360_RBL] The IP 163.121.146.133 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 18:07:05,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342825.0490568, 'message': 'Dec 6 18:07:04 hqnl0246134 sshd[240870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.121.146.133 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 18:07:07,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '163.121.146.133', 'timestamp': 1670342827.0496256, 'message': 'Dec 6 18:07:06 hqnl0246134 sshd[240870]: Failed password for root from 163.121.146.133 port 53786 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-06 18:07:09,348] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:07:09,382] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0445 seconds
INFO [2022-12-06 18:07:11,481] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:07:11,482] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:07:11,489] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:07:11,500] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 18:07:15,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342835.0550468, 'message': 'Dec 6 18:07:14 hqnl0246134 sshd[240879]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:07:15,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342835.0553536, 'message': 'Dec 6 18:07:14 hqnl0246134 sshd[240879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 18:07:17,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342837.0555944, 'message': 'Dec 6 18:07:16 hqnl0246134 sshd[240879]: Failed password for root from 61.177.173.18 port 34829 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0445 seconds
INFO [2022-12-06 18:07:18,709] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:07:18,710] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:07:18,742] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:07:18,787] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0579 seconds
INFO [2022-12-06 18:07:19,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342839.0573483, 'message': 'Dec 6 18:07:17 hqnl0246134 sshd[240879]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-06 18:07:19,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342839.0575514, 'message': 'Dec 6 18:07:18 hqnl0246134 sshd[240879]: Failed password for root from 61.177.173.18 port 34829 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 18:07:21,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342841.0593297, 'message': 'Dec 6 18:07:19 hqnl0246134 sshd[240879]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 18:07:21,499] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:07:21,499] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:07:21,508] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:07:21,520] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 18:07:23,082] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342843.0620418, 'message': 'Dec 6 18:07:21 hqnl0246134 sshd[240879]: Failed password for root from 61.177.173.18 port 34829 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 18:07:37,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.30.249.87', 'timestamp': 1670342857.0823824, 'message': 'Dec 6 18:07:35 hqnl0246134 sshd[240903]: Invalid user user1 from 123.30.249.87 port 46724', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 18:07:37,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '220.80.223.144', 'timestamp': 1670342857.0831194, 'message': 'Dec 6 18:07:35 hqnl0246134 sshd[240905]: pam_imunify(sshd:auth): [IM360_RBL] The IP 220.80.223.144 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 18:07:37,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '123.30.249.87', 'timestamp': 1670342857.082815, 'message': 'Dec 6 18:07:35 hqnl0246134 sshd[240903]: pam_imunify(sshd:auth): [IM360_RBL] The IP 123.30.249.87 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 18:07:37,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '220.80.223.144', 'timestamp': 1670342857.0832725, 'message': 'Dec 6 18:07:35 hqnl0246134 sshd[240905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.80.223.144 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 18:07:37,172] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '123.30.249.87', 'timestamp': 1670342857.0829816, 'message': 'Dec 6 18:07:35 hqnl0246134 sshd[240903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.249.87 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:07:39,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.30.249.87', 'timestamp': 1670342859.09021, 'message': 'Dec 6 18:07:37 hqnl0246134 sshd[240903]: Failed password for invalid user user1 from 123.30.249.87 port 46724 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0485 seconds
INFO [2022-12-06 18:07:39,140] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.72.25', 'timestamp': 1670342859.0904484, 'message': 'Dec 6 18:07:37 hqnl0246134 sshd[240910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.72.25 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0492 seconds
INFO [2022-12-06 18:07:39,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '220.80.223.144', 'timestamp': 1670342859.0905905, 'message': 'Dec 6 18:07:37 hqnl0246134 sshd[240905]: Failed password for root from 220.80.223.144 port 50096 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-06 18:07:39,158] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.30.249.87', 'timestamp': 1670342859.090724, 'message': 'Dec 6 18:07:37 hqnl0246134 sshd[240903]: Disconnected from invalid user user1 123.30.249.87 port 46724 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:07:41,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.72.25', 'timestamp': 1670342861.092797, 'message': 'Dec 6 18:07:39 hqnl0246134 sshd[240910]: Failed password for root from 43.153.72.25 port 56392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
WARNING [2022-12-06 18:07:47,801] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:07:47,802] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:08:03,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342883.1202488, 'message': 'Dec 6 18:08:01 hqnl0246134 sshd[240924]: Invalid user cloud from 43.153.110.44 port 56142', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0562 seconds
INFO [2022-12-06 18:08:03,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342883.121358, 'message': 'Dec 6 18:08:02 hqnl0246134 sshd[240934]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0564 seconds
INFO [2022-12-06 18:08:03,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342883.1208522, 'message': 'Dec 6 18:08:01 hqnl0246134 sshd[240924]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.110.44 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 18:08:03,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342883.1215134, 'message': 'Dec 6 18:08:02 hqnl0246134 sshd[240934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 18:08:03,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342883.121083, 'message': 'Dec 6 18:08:01 hqnl0246134 sshd[240924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.110.44 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 18:08:03,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342883.1212244, 'message': 'Dec 6 18:08:02 hqnl0246134 sshd[240924]: Failed password for invalid user cloud from 43.153.110.44 port 56142 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:08:05,151] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342885.1216393, 'message': 'Dec 6 18:08:03 hqnl0246134 sshd[240924]: Disconnected from invalid user cloud 43.153.110.44 port 56142 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 18:08:05,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342885.121875, 'message': 'Dec 6 18:08:04 hqnl0246134 sshd[240934]: Failed password for root from 61.177.173.18 port 15343 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 18:08:07,142] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342887.121872, 'message': 'Dec 6 18:08:05 hqnl0246134 sshd[240934]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 18:08:07,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342887.1289523, 'message': 'Dec 6 18:08:06 hqnl0246134 sshd[240934]: Failed password for root from 61.177.173.18 port 15343 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 18:08:09,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342889.1238601, 'message': 'Dec 6 18:08:07 hqnl0246134 sshd[240934]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 18:08:09,376] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:08:09,454] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.1111 seconds
INFO [2022-12-06 18:08:11,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342891.1261654, 'message': 'Dec 6 18:08:09 hqnl0246134 sshd[240934]: Failed password for root from 61.177.173.18 port 15343 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 18:08:17,879] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:08:17,880] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:08:17,887] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:08:17,898] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 18:08:20,612] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:08:20,613] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:08:20,620] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:08:20,633] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 18:08:35,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.24.244', 'timestamp': 1670342915.157437, 'message': 'Dec 6 18:08:34 hqnl0246134 sshd[240962]: Invalid user albert123 from 161.35.24.244 port 37724', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 18:08:35,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '161.35.24.244', 'timestamp': 1670342915.158022, 'message': 'Dec 6 18:08:34 hqnl0246134 sshd[240962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.24.244 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 18:08:37,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.24.244', 'timestamp': 1670342917.1639009, 'message': 'Dec 6 18:08:36 hqnl0246134 sshd[240962]: Failed password for invalid user albert123 from 161.35.24.244 port 37724 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 18:08:39,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.93.51.98', 'timestamp': 1670342919.1670322, 'message': 'Dec 6 18:08:37 hqnl0246134 sshd[240964]: Invalid user rahul from 177.93.51.98 port 60388', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 18:08:39,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.24.244', 'timestamp': 1670342919.1675403, 'message': 'Dec 6 18:08:38 hqnl0246134 sshd[240962]: Disconnected from invalid user albert123 161.35.24.244 port 37724 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 18:08:39,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.93.51.98', 'timestamp': 1670342919.1672235, 'message': 'Dec 6 18:08:38 hqnl0246134 sshd[240964]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.93.51.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:08:39,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.93.51.98', 'timestamp': 1670342919.1673653, 'message': 'Dec 6 18:08:38 hqnl0246134 sshd[240964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.93.51.98 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:08:40,711] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:08:40,711] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:08:40,719] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:08:40,730] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 18:08:41,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.93.51.98', 'timestamp': 1670342921.1744802, 'message': 'Dec 6 18:08:39 hqnl0246134 sshd[240964]: Failed password for invalid user rahul from 177.93.51.98 port 60388 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:08:41,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.93.51.98', 'timestamp': 1670342921.1747699, 'message': 'Dec 6 18:08:40 hqnl0246134 sshd[240964]: Disconnected from invalid user rahul 177.93.51.98 port 60388 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:08:47,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.33.182.8', 'timestamp': 1670342927.186665, 'message': 'Dec 6 18:08:45 hqnl0246134 sshd[240973]: Invalid user openbravo from 178.33.182.8 port 57196', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:08:47,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.33.182.8', 'timestamp': 1670342927.1868775, 'message': 'Dec 6 18:08:45 hqnl0246134 sshd[240973]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.33.182.8 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:08:47,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.33.182.8', 'timestamp': 1670342927.187007, 'message': 'Dec 6 18:08:45 hqnl0246134 sshd[240973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.182.8 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 18:08:47,805] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:08:47,805] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:08:49,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.33.182.8', 'timestamp': 1670342929.187249, 'message': 'Dec 6 18:08:47 hqnl0246134 sshd[240973]: Failed password for invalid user openbravo from 178.33.182.8 port 57196 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:08:49,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.33.182.8', 'timestamp': 1670342929.1875625, 'message': 'Dec 6 18:08:48 hqnl0246134 sshd[240973]: Disconnected from invalid user openbravo 178.33.182.8 port 57196 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:08:51,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342931.188034, 'message': 'Dec 6 18:08:50 hqnl0246134 sshd[240975]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 18:08:51,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342931.1884646, 'message': 'Dec 6 18:08:50 hqnl0246134 sshd[240977]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.110.44 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 18:08:51,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342931.1883287, 'message': 'Dec 6 18:08:50 hqnl0246134 sshd[240975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 18:08:51,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342931.188586, 'message': 'Dec 6 18:08:50 hqnl0246134 sshd[240977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.110.44 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 18:08:53,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342933.189793, 'message': 'Dec 6 18:08:52 hqnl0246134 sshd[240975]: Failed password for root from 61.177.173.18 port 44332 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0434 seconds
INFO [2022-12-06 18:08:53,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342933.1900136, 'message': 'Dec 6 18:08:52 hqnl0246134 sshd[240977]: Failed password for root from 43.153.110.44 port 59302 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0437 seconds
INFO [2022-12-06 18:08:53,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342933.1901495, 'message': 'Dec 6 18:08:53 hqnl0246134 sshd[240979]: pam_imunify(sshd:auth): [IM360_RBL] The IP 107.0.200.227 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0433 seconds
INFO [2022-12-06 18:08:53,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342933.1902719, 'message': 'Dec 6 18:08:53 hqnl0246134 sshd[240979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.0.200.227 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 18:08:55,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342935.193007, 'message': 'Dec 6 18:08:54 hqnl0246134 sshd[240975]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 18:08:55,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '107.0.200.227', 'timestamp': 1670342935.1932518, 'message': 'Dec 6 18:08:55 hqnl0246134 sshd[240979]: Failed password for root from 107.0.200.227 port 60146 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 18:08:57,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342937.19713, 'message': 'Dec 6 18:08:56 hqnl0246134 sshd[240975]: Failed password for root from 61.177.173.18 port 44332 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:08:57,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342937.1973867, 'message': 'Dec 6 18:08:56 hqnl0246134 sshd[240975]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 18:08:59,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342939.2000108, 'message': 'Dec 6 18:08:58 hqnl0246134 sshd[240975]: Failed password for root from 61.177.173.18 port 44332 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 18:09:03,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342943.207168, 'message': 'Dec 6 18:09:01 hqnl0246134 sshd[240998]: pam_imunify(sshd:auth): [IM360_RBL] The IP 148.153.110.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 18:09:03,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342943.2076612, 'message': 'Dec 6 18:09:01 hqnl0246134 sshd[240998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.153.110.76 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 18:09:05,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '148.153.110.76', 'timestamp': 1670342945.208987, 'message': 'Dec 6 18:09:03 hqnl0246134 sshd[240998]: Failed password for root from 148.153.110.76 port 39620 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 18:09:09,357] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:09:09,386] defence360agent.internals.the_sink: SensorIncidentList(<20 item(s)>) processed in 0.0394 seconds
INFO [2022-12-06 18:09:17,799] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:09:17,800] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:09:17,808] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:09:17,819] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 18:09:20,480] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:09:20,480] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:09:20,488] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:09:20,499] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 18:09:41,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342981.2625542, 'message': 'Dec 6 18:09:39 hqnl0246134 sshd[241148]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 18:09:41,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342981.262941, 'message': 'Dec 6 18:09:39 hqnl0246134 sshd[241148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 18:09:43,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342983.265319, 'message': 'Dec 6 18:09:41 hqnl0246134 sshd[241148]: Failed password for root from 61.177.173.18 port 28364 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 18:09:45,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342985.2672226, 'message': 'Dec 6 18:09:44 hqnl0246134 sshd[241148]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 18:09:45,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342985.2674222, 'message': 'Dec 6 18:09:44 hqnl0246134 sshd[241150]: Invalid user oracle from 43.153.110.44 port 53562', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 18:09:45,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342985.2676213, 'message': 'Dec 6 18:09:44 hqnl0246134 sshd[241150]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.110.44 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 18:09:45,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342985.2677648, 'message': 'Dec 6 18:09:44 hqnl0246134 sshd[241150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.110.44 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:09:47,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342987.270667, 'message': 'Dec 6 18:09:46 hqnl0246134 sshd[241148]: Failed password for root from 61.177.173.18 port 28364 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 18:09:47,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342987.2708533, 'message': 'Dec 6 18:09:46 hqnl0246134 sshd[241150]: Failed password for invalid user oracle from 43.153.110.44 port 53562 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0271 seconds
WARNING [2022-12-06 18:09:47,809] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:09:47,809] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:09:49,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.110.44', 'timestamp': 1670342989.2750463, 'message': 'Dec 6 18:09:48 hqnl0246134 sshd[241150]: Disconnected from invalid user oracle 43.153.110.44 port 53562 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 18:09:49,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342989.2752562, 'message': 'Dec 6 18:09:48 hqnl0246134 sshd[241148]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 18:09:51,062] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:09:51,063] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:09:51,073] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:09:51,086] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-06 18:09:51,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670342991.2764437, 'message': 'Dec 6 18:09:50 hqnl0246134 sshd[241148]: Failed password for root from 61.177.173.18 port 28364 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 18:10:05,321] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.154.12.139', 'timestamp': 1670343005.296018, 'message': 'Dec 6 18:10:04 hqnl0246134 sshd[241185]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.154.12.139 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 18:10:05,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.154.12.139', 'timestamp': 1670343005.296624, 'message': 'Dec 6 18:10:04 hqnl0246134 sshd[241185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.154.12.139 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:10:07,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.154.12.139', 'timestamp': 1670343007.298599, 'message': 'Dec 6 18:10:06 hqnl0246134 sshd[241185]: Failed password for root from 45.154.12.139 port 56274 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-06 18:10:09,359] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:10:09,382] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0300 seconds
INFO [2022-12-06 18:10:17,890] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:10:17,891] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:10:17,898] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:10:17,913] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 18:10:20,926] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:10:20,926] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:10:20,933] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:10:20,944] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 18:10:27,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343027.3224385, 'message': 'Dec 6 18:10:27 hqnl0246134 sshd[241210]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 18:10:27,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343027.3227375, 'message': 'Dec 6 18:10:27 hqnl0246134 sshd[241210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 18:10:29,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343029.3274755, 'message': 'Dec 6 18:10:28 hqnl0246134 sshd[241210]: Failed password for root from 61.177.173.18 port 52719 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 18:10:31,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343031.3259451, 'message': 'Dec 6 18:10:29 hqnl0246134 sshd[241210]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 18:10:33,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343033.3282852, 'message': 'Dec 6 18:10:31 hqnl0246134 sshd[241210]: Failed password for root from 61.177.173.18 port 52719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 18:10:35,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343035.3297563, 'message': 'Dec 6 18:10:33 hqnl0246134 sshd[241210]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:10:37,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.80.223.144', 'timestamp': 1670343037.3332536, 'message': 'Dec 6 18:10:35 hqnl0246134 sshd[241244]: Invalid user virtual from 220.80.223.144 port 42420', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0524 seconds
INFO [2022-12-06 18:10:37,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343037.3339415, 'message': 'Dec 6 18:10:36 hqnl0246134 sshd[241210]: Failed password for root from 61.177.173.18 port 52719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0526 seconds
INFO [2022-12-06 18:10:37,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '220.80.223.144', 'timestamp': 1670343037.3335323, 'message': 'Dec 6 18:10:35 hqnl0246134 sshd[241244]: pam_imunify(sshd:auth): [IM360_RBL] The IP 220.80.223.144 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 18:10:37,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '220.80.223.144', 'timestamp': 1670343037.3337703, 'message': 'Dec 6 18:10:35 hqnl0246134 sshd[241244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.80.223.144 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 18:10:37,474] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.80.223.144', 'timestamp': 1670343037.3340976, 'message': 'Dec 6 18:10:37 hqnl0246134 sshd[241244]: Failed password for invalid user virtual from 220.80.223.144 port 42420 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:10:39,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.80.223.144', 'timestamp': 1670343039.335242, 'message': 'Dec 6 18:10:38 hqnl0246134 sshd[241244]: Disconnected from invalid user virtual 220.80.223.144 port 42420 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
WARNING [2022-12-06 18:10:47,815] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:10:47,816] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:11:05,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.30.249.87', 'timestamp': 1670343065.3673851, 'message': 'Dec 6 18:11:04 hqnl0246134 sshd[241267]: Invalid user sk from 123.30.249.87 port 34550', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 18:11:05,458] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '123.30.249.87', 'timestamp': 1670343065.36801, 'message': 'Dec 6 18:11:04 hqnl0246134 sshd[241267]: pam_imunify(sshd:auth): [IM360_RBL] The IP 123.30.249.87 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0519 seconds
INFO [2022-12-06 18:11:05,506] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '123.30.249.87', 'timestamp': 1670343065.368248, 'message': 'Dec 6 18:11:04 hqnl0246134 sshd[241267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.249.87 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0417 seconds
WARNING [2022-12-06 18:11:09,365] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:11:09,399] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0428 seconds
INFO [2022-12-06 18:11:09,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.30.249.87', 'timestamp': 1670343069.369604, 'message': 'Dec 6 18:11:07 hqnl0246134 sshd[241267]: Failed password for invalid user sk from 123.30.249.87 port 34550 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 18:11:11,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.30.249.87', 'timestamp': 1670343071.3736017, 'message': 'Dec 6 18:11:09 hqnl0246134 sshd[241267]: Disconnected from invalid user sk 123.30.249.87 port 34550 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 18:11:12,486] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:11:12,486] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:11:12,494] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:11:12,506] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 18:11:19,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343079.3832335, 'message': 'Dec 6 18:11:18 hqnl0246134 sshd[241285]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 18:11:19,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343079.3835742, 'message': 'Dec 6 18:11:18 hqnl0246134 sshd[241285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 18:11:19,959] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:11:19,959] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:11:19,966] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:11:19,978] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 18:11:21,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343081.3850105, 'message': 'Dec 6 18:11:20 hqnl0246134 sshd[241285]: Failed password for root from 61.177.173.18 port 38041 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 18:11:21,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343081.3851905, 'message': 'Dec 6 18:11:21 hqnl0246134 sshd[241285]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:11:22,772] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:11:22,773] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:11:22,779] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:11:22,791] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 18:11:23,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343083.3871546, 'message': 'Dec 6 18:11:23 hqnl0246134 sshd[241285]: Failed password for root from 61.177.173.18 port 38041 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 18:11:25,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343085.391048, 'message': 'Dec 6 18:11:23 hqnl0246134 sshd[241285]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:11:27,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343087.393764, 'message': 'Dec 6 18:11:25 hqnl0246134 sshd[241285]: Failed password for root from 61.177.173.18 port 38041 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 18:11:27,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343087.3939636, 'message': 'Dec 6 18:11:25 hqnl0246134 sshd[241298]: Invalid user t3rr0r from 178.128.88.244 port 57258', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 18:11:27,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343087.3941126, 'message': 'Dec 6 18:11:25 hqnl0246134 sshd[241298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.88.244 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 18:11:27,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343087.3942213, 'message': 'Dec 6 18:11:25 hqnl0246134 sshd[241298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.88.244 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:11:29,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343089.3992422, 'message': 'Dec 6 18:11:27 hqnl0246134 sshd[241298]: Failed password for invalid user t3rr0r from 178.128.88.244 port 57258 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 18:11:29,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343089.3996208, 'message': 'Dec 6 18:11:28 hqnl0246134 sshd[241298]: Disconnected from invalid user t3rr0r 178.128.88.244 port 57258 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 18:11:47,819] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:11:47,820] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 18:11:53,379] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 18:12:09,375] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:12:09,403] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0420 seconds
INFO [2022-12-06 18:12:09,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343129.4452279, 'message': 'Dec 6 18:12:08 hqnl0246134 sshd[241343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 18:12:09,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343129.4457023, 'message': 'Dec 6 18:12:08 hqnl0246134 sshd[241343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 18:12:11,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343131.4464312, 'message': 'Dec 6 18:12:10 hqnl0246134 sshd[241343]: Failed password for root from 61.177.173.18 port 10231 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 18:12:11,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343131.4468627, 'message': 'Dec 6 18:12:10 hqnl0246134 sshd[241343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 18:12:15,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343135.451455, 'message': 'Dec 6 18:12:13 hqnl0246134 sshd[241343]: Failed password for root from 61.177.173.18 port 10231 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0399 seconds
INFO [2022-12-06 18:12:15,528] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343135.4519653, 'message': 'Dec 6 18:12:15 hqnl0246134 sshd[241343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 18:12:17,899] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:12:17,900] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:12:17,908] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:12:17,920] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 18:12:19,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343139.453497, 'message': 'Dec 6 18:12:17 hqnl0246134 sshd[241343]: Failed password for root from 61.177.173.18 port 10231 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 18:12:20,675] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:12:20,675] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:12:20,683] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:12:20,697] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 18:12:35,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343155.4826608, 'message': 'Dec 6 18:12:34 hqnl0246134 sshd[241372]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.27.236.73 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 18:12:35,530] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343155.4832644, 'message': 'Dec 6 18:12:34 hqnl0246134 sshd[241372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.236.73 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 18:12:37,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343157.486215, 'message': 'Dec 6 18:12:36 hqnl0246134 sshd[241372]: Failed password for root from 103.27.236.73 port 53226 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:12:41,332] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:12:41,333] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:12:41,339] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:12:41,350] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
WARNING [2022-12-06 18:12:47,823] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:12:47,823] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:12:53,531] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343173.5113702, 'message': 'Dec 6 18:12:52 hqnl0246134 sshd[241382]: Invalid user oracle from 96.43.99.83 port 33576', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:12:53,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343173.5125015, 'message': 'Dec 6 18:12:52 hqnl0246134 sshd[241382]: pam_imunify(sshd:auth): [IM360_RBL] The IP 96.43.99.83 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 18:12:53,567] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343173.51265, 'message': 'Dec 6 18:12:52 hqnl0246134 sshd[241382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.43.99.83 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 18:12:55,537] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343175.5150852, 'message': 'Dec 6 18:12:54 hqnl0246134 sshd[241382]: Failed password for invalid user oracle from 96.43.99.83 port 33576 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 18:12:57,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343177.5179713, 'message': 'Dec 6 18:12:56 hqnl0246134 sshd[241382]: Disconnected from invalid user oracle 96.43.99.83 port 33576 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 18:12:59,557] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343179.5197678, 'message': 'Dec 6 18:12:58 hqnl0246134 sshd[241386]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 18:12:59,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343179.520161, 'message': 'Dec 6 18:12:58 hqnl0246134 sshd[241386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 18:13:01,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343181.524896, 'message': 'Dec 6 18:13:00 hqnl0246134 sshd[241386]: Failed password for root from 61.177.173.18 port 45218 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 18:13:02,344] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 18:13:02,351] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:13:02,363] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0182 seconds
INFO [2022-12-06 18:13:03,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343183.530393, 'message': 'Dec 6 18:13:02 hqnl0246134 sshd[241386]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 18:13:05,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343185.5352488, 'message': 'Dec 6 18:13:04 hqnl0246134 sshd[241386]: Failed password for root from 61.177.173.18 port 45218 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:13:07,559] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343187.538235, 'message': 'Dec 6 18:13:07 hqnl0246134 sshd[241386]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 18:13:09,375] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:13:09,399] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0326 seconds
INFO [2022-12-06 18:13:09,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343189.541259, 'message': 'Dec 6 18:13:08 hqnl0246134 sshd[241386]: Failed password for root from 61.177.173.18 port 45218 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 18:13:17,962] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:13:17,962] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:13:17,973] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:13:17,987] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0242 seconds
INFO [2022-12-06 18:13:20,744] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:13:20,745] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:13:20,751] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:13:20,762] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0165 seconds
INFO [2022-12-06 18:13:45,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '220.80.223.144', 'timestamp': 1670343225.5949275, 'message': 'Dec 6 18:13:44 hqnl0246134 sshd[241442]: pam_imunify(sshd:auth): [IM360_RBL] The IP 220.80.223.144 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 18:13:45,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '141.11.37.50', 'timestamp': 1670343225.5954692, 'message': 'Dec 6 18:13:44 hqnl0246134 sshd[241445]: pam_imunify(sshd:auth): [IM360_RBL] The IP 141.11.37.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 18:13:45,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '220.80.223.144', 'timestamp': 1670343225.595308, 'message': 'Dec 6 18:13:44 hqnl0246134 sshd[241442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.80.223.144 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 18:13:45,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '141.11.37.50', 'timestamp': 1670343225.5955908, 'message': 'Dec 6 18:13:44 hqnl0246134 sshd[241445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.11.37.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 18:13:45,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '220.80.223.144', 'timestamp': 1670343225.5957367, 'message': 'Dec 6 18:13:45 hqnl0246134 sshd[241442]: Failed password for root from 220.80.223.144 port 34396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:13:47,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343227.596781, 'message': 'Dec 6 18:13:45 hqnl0246134 sshd[241447]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 18:13:47,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '141.11.37.50', 'timestamp': 1670343227.5971599, 'message': 'Dec 6 18:13:46 hqnl0246134 sshd[241445]: Failed password for root from 141.11.37.50 port 37996 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 18:13:47,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343227.5970309, 'message': 'Dec 6 18:13:45 hqnl0246134 sshd[241447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
WARNING [2022-12-06 18:13:47,826] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:13:47,827] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:13:49,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343229.5993276, 'message': 'Dec 6 18:13:48 hqnl0246134 sshd[241447]: Failed password for root from 61.177.173.18 port 20358 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 18:13:50,757] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 18:13:50,824] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 18:13:50,824] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 18:13:50,825] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 18:13:50,825] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 18:13:50,825] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 18:13:50,834] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 18:13:50,850] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0245 seconds
WARNING [2022-12-06 18:13:50,857] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 18:13:50,860] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:13:50,877] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0335 seconds
INFO [2022-12-06 18:13:50,878] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0307 seconds
INFO [2022-12-06 18:13:51,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343231.6011221, 'message': 'Dec 6 18:13:50 hqnl0246134 sshd[241447]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 18:13:51,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.110.197.126', 'timestamp': 1670343231.6013198, 'message': 'Dec 6 18:13:50 hqnl0246134 sshd[241449]: Invalid user admin from 202.110.197.126 port 57446', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 18:13:51,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.110.197.126', 'timestamp': 1670343231.601471, 'message': 'Dec 6 18:13:50 hqnl0246134 sshd[241449]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.110.197.126 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:13:51,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.110.197.126', 'timestamp': 1670343231.6016126, 'message': 'Dec 6 18:13:50 hqnl0246134 sshd[241449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.110.197.126 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 18:13:53,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343233.602135, 'message': 'Dec 6 18:13:51 hqnl0246134 sshd[241447]: Failed password for root from 61.177.173.18 port 20358 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 18:13:53,639] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.110.197.126', 'timestamp': 1670343233.6023836, 'message': 'Dec 6 18:13:51 hqnl0246134 sshd[241449]: Failed password for invalid user admin from 202.110.197.126 port 57446 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 18:13:53,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343233.6025255, 'message': 'Dec 6 18:13:52 hqnl0246134 sshd[241447]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 18:13:53,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.110.197.126', 'timestamp': 1670343233.602667, 'message': 'Dec 6 18:13:52 hqnl0246134 sshd[241449]: Disconnected from invalid user admin 202.110.197.126 port 57446 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 18:13:55,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343235.605316, 'message': 'Dec 6 18:13:54 hqnl0246134 sshd[241447]: Failed password for root from 61.177.173.18 port 20358 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:13:59,320] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:13:59,321] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:13:59,330] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:13:59,342] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
WARNING [2022-12-06 18:14:09,378] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:14:09,403] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0328 seconds
INFO [2022-12-06 18:14:17,797] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:14:17,797] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:14:17,805] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:14:17,818] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 18:14:20,560] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:14:20,561] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:14:20,569] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:14:20,581] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 18:14:20,953] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 18:14:20,954] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 18:14:20,954] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 18:14:27,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.212.233.50', 'timestamp': 1670343267.6917017, 'message': 'Dec 6 18:14:27 hqnl0246134 sshd[241509]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.212.233.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 18:14:27,735] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.212.233.50', 'timestamp': 1670343267.6921341, 'message': 'Dec 6 18:14:27 hqnl0246134 sshd[241509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.233.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:14:29,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '125.212.233.50', 'timestamp': 1670343269.69586, 'message': 'Dec 6 18:14:29 hqnl0246134 sshd[241509]: Failed password for root from 125.212.233.50 port 44536 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 18:14:31,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.30.249.87', 'timestamp': 1670343271.6983056, 'message': 'Dec 6 18:14:29 hqnl0246134 sshd[241519]: Invalid user zxin10 from 123.30.249.87 port 50624', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 18:14:31,740] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '123.30.249.87', 'timestamp': 1670343271.6986322, 'message': 'Dec 6 18:14:30 hqnl0246134 sshd[241519]: pam_imunify(sshd:auth): [IM360_RBL] The IP 123.30.249.87 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 18:14:31,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '123.30.249.87', 'timestamp': 1670343271.6987996, 'message': 'Dec 6 18:14:30 hqnl0246134 sshd[241519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.249.87 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:14:33,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.30.249.87', 'timestamp': 1670343273.700271, 'message': 'Dec 6 18:14:32 hqnl0246134 sshd[241519]: Failed password for invalid user zxin10 from 123.30.249.87 port 50624 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0458 seconds
INFO [2022-12-06 18:14:33,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '123.30.249.87', 'timestamp': 1670343273.7005172, 'message': 'Dec 6 18:14:33 hqnl0246134 sshd[241519]: Disconnected from invalid user zxin10 123.30.249.87 port 50624 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0638 seconds
INFO [2022-12-06 18:14:37,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343277.7089162, 'message': 'Dec 6 18:14:35 hqnl0246134 sshd[241533]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 18:14:37,758] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343277.7093112, 'message': 'Dec 6 18:14:35 hqnl0246134 sshd[241533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 18:14:37,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343277.7095547, 'message': 'Dec 6 18:14:37 hqnl0246134 sshd[241533]: Failed password for root from 61.177.173.18 port 63873 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 18:14:41,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343281.7161357, 'message': 'Dec 6 18:14:39 hqnl0246134 sshd[241533]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 18:14:43,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343283.7189147, 'message': 'Dec 6 18:14:41 hqnl0246134 sshd[241533]: Failed password for root from 61.177.173.18 port 63873 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:14:43,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343283.7191253, 'message': 'Dec 6 18:14:42 hqnl0246134 sshd[241533]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:14:43,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343283.719263, 'message': 'Dec 6 18:14:43 hqnl0246134 sshd[241533]: Failed password for root from 61.177.173.18 port 63873 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 18:14:47,832] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:14:47,833] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 18:15:09,397] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:15:09,440] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0601 seconds
INFO [2022-12-06 18:15:11,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343311.791074, 'message': 'Dec 6 18:15:11 hqnl0246134 sshd[241576]: Invalid user mosquitto from 122.164.86.17 port 29063', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 18:15:11,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343311.7913404, 'message': 'Dec 6 18:15:11 hqnl0246134 sshd[241576]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.164.86.17 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:15:11,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343311.7914822, 'message': 'Dec 6 18:15:11 hqnl0246134 sshd[241576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.164.86.17 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:15:13,814] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343313.7963653, 'message': 'Dec 6 18:15:13 hqnl0246134 sshd[241576]: Failed password for invalid user mosquitto from 122.164.86.17 port 29063 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:15:17,848] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:15:17,848] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:15:17,871] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:15:17,889] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0399 seconds
INFO [2022-12-06 18:15:17,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343317.8510666, 'message': 'Dec 6 18:15:15 hqnl0246134 sshd[241576]: Disconnected from invalid user mosquitto 122.164.86.17 port 29063 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 18:15:18,563] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:15:18,563] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:15:18,571] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:15:18,584] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 18:15:20,686] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:15:20,686] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:15:20,695] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:15:20,706] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 18:15:23,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343323.8189423, 'message': 'Dec 6 18:15:22 hqnl0246134 sshd[241601]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 18:15:23,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343323.819363, 'message': 'Dec 6 18:15:22 hqnl0246134 sshd[241601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 18:15:25,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343325.8208482, 'message': 'Dec 6 18:15:24 hqnl0246134 sshd[241601]: Failed password for root from 61.177.173.18 port 34739 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:15:25,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343325.821096, 'message': 'Dec 6 18:15:24 hqnl0246134 sshd[241601]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 18:15:25,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343325.8255875, 'message': 'Dec 6 18:15:25 hqnl0246134 sshd[241601]: Failed password for root from 61.177.173.18 port 34739 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:15:27,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343327.8236103, 'message': 'Dec 6 18:15:26 hqnl0246134 sshd[241601]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:15:29,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343329.826454, 'message': 'Dec 6 18:15:28 hqnl0246134 sshd[241604]: Invalid user adminuser from 134.209.109.149 port 53434', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 18:15:29,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343329.827652, 'message': 'Dec 6 18:15:28 hqnl0246134 sshd[241601]: Failed password for root from 61.177.173.18 port 34739 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 18:15:29,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343329.826792, 'message': 'Dec 6 18:15:28 hqnl0246134 sshd[241604]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.209.109.149 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:15:29,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343329.8269548, 'message': 'Dec 6 18:15:28 hqnl0246134 sshd[241604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.109.149 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 18:15:31,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343331.8324087, 'message': 'Dec 6 18:15:31 hqnl0246134 sshd[241604]: Failed password for invalid user adminuser from 134.209.109.149 port 53434 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 18:15:33,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343333.8339334, 'message': 'Dec 6 18:15:32 hqnl0246134 sshd[241604]: Disconnected from invalid user adminuser 134.209.109.149 port 53434 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-06 18:15:47,840] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:15:47,840] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:15:51,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343351.8700645, 'message': 'Dec 6 18:15:51 hqnl0246134 sshd[241619]: Invalid user jw from 43.153.72.25 port 47200', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 18:15:51,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343351.8702822, 'message': 'Dec 6 18:15:51 hqnl0246134 sshd[241619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.72.25 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:15:51,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343351.87043, 'message': 'Dec 6 18:15:51 hqnl0246134 sshd[241619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.72.25 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:15:53,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343353.8727517, 'message': 'Dec 6 18:15:53 hqnl0246134 sshd[241619]: Failed password for invalid user jw from 43.153.72.25 port 47200 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:15:55,894] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343355.8739398, 'message': 'Dec 6 18:15:55 hqnl0246134 sshd[241619]: Disconnected from invalid user jw 43.153.72.25 port 47200 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
WARNING [2022-12-06 18:16:09,393] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:16:09,419] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0354 seconds
INFO [2022-12-06 18:16:11,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343371.9055357, 'message': 'Dec 6 18:16:10 hqnl0246134 sshd[241642]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0456 seconds
INFO [2022-12-06 18:16:11,984] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343371.9058573, 'message': 'Dec 6 18:16:10 hqnl0246134 sshd[241642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 18:16:13,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343373.907692, 'message': 'Dec 6 18:16:12 hqnl0246134 sshd[241642]: Failed password for root from 61.177.173.18 port 63410 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 18:16:15,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343375.9100244, 'message': 'Dec 6 18:16:14 hqnl0246134 sshd[241642]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:16:17,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343377.9132674, 'message': 'Dec 6 18:16:16 hqnl0246134 sshd[241642]: Failed password for root from 61.177.173.18 port 63410 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 18:16:17,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343377.9135451, 'message': 'Dec 6 18:16:16 hqnl0246134 sshd[241642]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 18:16:18,515] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:16:18,516] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:16:18,525] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:16:18,538] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 18:16:19,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343379.9178724, 'message': 'Dec 6 18:16:19 hqnl0246134 sshd[241642]: Failed password for root from 61.177.173.18 port 63410 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 18:16:19,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343379.9181619, 'message': 'Dec 6 18:16:19 hqnl0246134 sshd[241646]: pam_imunify(sshd:auth): [IM360_RBL] The IP 96.43.99.83 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 18:16:19,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343379.9183238, 'message': 'Dec 6 18:16:19 hqnl0246134 sshd[241646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.43.99.83 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:16:21,253] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:16:21,254] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:16:21,267] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:16:21,287] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0316 seconds
INFO [2022-12-06 18:16:21,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343381.9191751, 'message': 'Dec 6 18:16:20 hqnl0246134 sshd[241654]: Invalid user rust from 14.161.12.119 port 55502', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0434 seconds
INFO [2022-12-06 18:16:21,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343381.9199095, 'message': 'Dec 6 18:16:21 hqnl0246134 sshd[241646]: Failed password for root from 96.43.99.83 port 60532 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 18:16:21,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343381.919488, 'message': 'Dec 6 18:16:20 hqnl0246134 sshd[241654]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.161.12.119 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 18:16:22,019] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343381.919714, 'message': 'Dec 6 18:16:20 hqnl0246134 sshd[241654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 18:16:23,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343383.9232104, 'message': 'Dec 6 18:16:22 hqnl0246134 sshd[241654]: Failed password for invalid user rust from 14.161.12.119 port 55502 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 18:16:23,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343383.9235778, 'message': 'Dec 6 18:16:23 hqnl0246134 sshd[241654]: Disconnected from invalid user rust 14.161.12.119 port 55502 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 18:16:47,852] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:16:47,853] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:17:02,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343422.036175, 'message': 'Dec 6 18:17:00 hqnl0246134 sshd[241681]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 18:17:02,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343422.0367444, 'message': 'Dec 6 18:17:00 hqnl0246134 sshd[241681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 18:17:04,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343424.0369043, 'message': 'Dec 6 18:17:02 hqnl0246134 sshd[241681]: Failed password for root from 61.177.173.18 port 39608 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 18:17:06,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343426.0463567, 'message': 'Dec 6 18:17:05 hqnl0246134 sshd[241681]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 18:17:08,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343428.0494766, 'message': 'Dec 6 18:17:07 hqnl0246134 sshd[241681]: Failed password for root from 61.177.173.18 port 39608 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 18:17:09,399] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:17:09,422] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0338 seconds
INFO [2022-12-06 18:17:10,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343430.051908, 'message': 'Dec 6 18:17:09 hqnl0246134 sshd[241681]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 18:17:12,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343432.0545728, 'message': 'Dec 6 18:17:11 hqnl0246134 sshd[241681]: Failed password for root from 61.177.173.18 port 39608 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 18:17:16,458] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:17:16,459] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:17:16,466] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:17:16,478] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 18:17:17,983] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:17:17,983] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:17:17,994] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:17:18,012] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0275 seconds
INFO [2022-12-06 18:17:20,943] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:17:20,943] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:17:20,955] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:17:20,968] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
WARNING [2022-12-06 18:17:47,860] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:17:47,861] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:17:50,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343470.1178038, 'message': 'Dec 6 18:17:49 hqnl0246134 sshd[241738]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 18:17:50,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343470.1186302, 'message': 'Dec 6 18:17:49 hqnl0246134 sshd[241738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 18:17:52,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343472.117842, 'message': 'Dec 6 18:17:51 hqnl0246134 sshd[241738]: Failed password for root from 61.177.173.18 port 14812 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 18:17:52,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343472.1180227, 'message': 'Dec 6 18:17:52 hqnl0246134 sshd[241738]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:17:56,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343476.1293917, 'message': 'Dec 6 18:17:54 hqnl0246134 sshd[241738]: Failed password for root from 61.177.173.18 port 14812 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 18:17:58,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343478.129857, 'message': 'Dec 6 18:17:56 hqnl0246134 sshd[241738]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:18:00,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343480.1319869, 'message': 'Dec 6 18:17:58 hqnl0246134 sshd[241738]: Failed password for root from 61.177.173.18 port 14812 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
WARNING [2022-12-06 18:18:09,405] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:18:09,431] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0371 seconds
INFO [2022-12-06 18:18:17,880] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:18:17,880] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:18:17,888] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:18:17,900] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 18:18:20,655] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:18:20,656] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:18:20,666] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:18:20,678] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 18:18:32,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343512.1851096, 'message': 'Dec 6 18:18:30 hqnl0246134 sshd[241805]: Invalid user utente from 84.46.253.201 port 56986', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0571 seconds
INFO [2022-12-06 18:18:32,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343512.1855416, 'message': 'Dec 6 18:18:30 hqnl0246134 sshd[241805]: pam_imunify(sshd:auth): [IM360_RBL] The IP 84.46.253.201 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0514 seconds
INFO [2022-12-06 18:18:32,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343512.1857138, 'message': 'Dec 6 18:18:30 hqnl0246134 sshd[241805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.46.253.201 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0629 seconds
INFO [2022-12-06 18:18:34,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343514.186829, 'message': 'Dec 6 18:18:32 hqnl0246134 sshd[241805]: Failed password for invalid user utente from 84.46.253.201 port 56986 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 18:18:34,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343514.1871524, 'message': 'Dec 6 18:18:33 hqnl0246134 sshd[241812]: Invalid user anjana from 122.164.86.17 port 1326', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 18:18:34,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343514.1873987, 'message': 'Dec 6 18:18:33 hqnl0246134 sshd[241805]: Disconnected from invalid user utente 84.46.253.201 port 56986 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 18:18:34,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343514.1876376, 'message': 'Dec 6 18:18:33 hqnl0246134 sshd[241812]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.164.86.17 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 18:18:34,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343514.1878295, 'message': 'Dec 6 18:18:33 hqnl0246134 sshd[241812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.164.86.17 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:18:36,208] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343516.1880875, 'message': 'Dec 6 18:18:35 hqnl0246134 sshd[241812]: Failed password for invalid user anjana from 122.164.86.17 port 1326 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:18:36,284] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:18:36,284] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:18:36,291] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:18:36,302] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 18:18:38,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343518.1935518, 'message': 'Dec 6 18:18:36 hqnl0246134 sshd[241812]: Disconnected from invalid user anjana 122.164.86.17 port 1326 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0360 seconds
INFO [2022-12-06 18:18:40,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343520.197634, 'message': 'Dec 6 18:18:38 hqnl0246134 sshd[241819]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 18:18:40,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343520.198042, 'message': 'Dec 6 18:18:38 hqnl0246134 sshd[241819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 18:18:42,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343522.199859, 'message': 'Dec 6 18:18:40 hqnl0246134 sshd[241819]: Failed password for root from 61.177.173.18 port 44101 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:18:44,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343524.2023244, 'message': 'Dec 6 18:18:43 hqnl0246134 sshd[241819]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:18:46,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343526.2052007, 'message': 'Dec 6 18:18:44 hqnl0246134 sshd[241819]: Failed password for root from 61.177.173.18 port 44101 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 18:18:46,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343526.2055726, 'message': 'Dec 6 18:18:45 hqnl0246134 sshd[241819]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 18:18:47,864] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:18:47,865] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:18:48,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343528.20898, 'message': 'Dec 6 18:18:47 hqnl0246134 sshd[241819]: Failed password for root from 61.177.173.18 port 44101 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 18:18:50,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343530.2115185, 'message': 'Dec 6 18:18:48 hqnl0246134 sshd[241824]: Invalid user operator from 43.153.72.25 port 52030', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 18:18:50,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343530.2118056, 'message': 'Dec 6 18:18:48 hqnl0246134 sshd[241824]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.72.25 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 18:18:50,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343530.2119765, 'message': 'Dec 6 18:18:48 hqnl0246134 sshd[241824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.72.25 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:18:52,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343532.213527, 'message': 'Dec 6 18:18:50 hqnl0246134 sshd[241824]: Failed password for invalid user operator from 43.153.72.25 port 52030 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0408 seconds
INFO [2022-12-06 18:18:52,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343532.2138793, 'message': 'Dec 6 18:18:51 hqnl0246134 sshd[241824]: Disconnected from invalid user operator 43.153.72.25 port 52030 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 18:18:54,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343534.2141519, 'message': 'Dec 6 18:18:52 hqnl0246134 sshd[241826]: Invalid user lhy from 103.27.236.73 port 39752', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 18:18:54,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343534.2144632, 'message': 'Dec 6 18:18:52 hqnl0246134 sshd[241826]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.27.236.73 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:18:54,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343534.2146409, 'message': 'Dec 6 18:18:52 hqnl0246134 sshd[241826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.236.73 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 18:18:56,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343536.2169654, 'message': 'Dec 6 18:18:54 hqnl0246134 sshd[241826]: Failed password for invalid user lhy from 103.27.236.73 port 39752 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 18:18:56,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343536.2171745, 'message': 'Dec 6 18:18:55 hqnl0246134 sshd[241826]: Disconnected from invalid user lhy 103.27.236.73 port 39752 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:19:04,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343544.2278273, 'message': 'Dec 6 18:19:03 hqnl0246134 sshd[241852]: Invalid user test from 161.35.24.244 port 56224', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 18:19:04,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343544.228205, 'message': 'Dec 6 18:19:03 hqnl0246134 sshd[241852]: pam_imunify(sshd:auth): [IM360_RBL] The IP 161.35.24.244 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 18:19:04,314] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343544.228491, 'message': 'Dec 6 18:19:03 hqnl0246134 sshd[241852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.24.244 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 18:19:06,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343546.2309504, 'message': 'Dec 6 18:19:05 hqnl0246134 sshd[241852]: Failed password for invalid user test from 161.35.24.244 port 56224 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 18:19:06,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343546.2311997, 'message': 'Dec 6 18:19:05 hqnl0246134 sshd[241852]: Disconnected from invalid user test 161.35.24.244 port 56224 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 18:19:09,415] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:19:09,448] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0484 seconds
INFO [2022-12-06 18:19:18,014] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:19:18,015] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:19:18,024] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:19:18,039] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0238 seconds
INFO [2022-12-06 18:19:20,606] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:19:20,607] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:19:20,615] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:19:20,627] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 18:19:24,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.219.33.178', 'timestamp': 1670343564.2632003, 'message': 'Dec 6 18:19:22 hqnl0246134 sshd[241834]: Invalid user fuckyou from 102.219.33.178 port 33090', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 18:19:24,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '102.219.33.178', 'timestamp': 1670343564.2635543, 'message': 'Dec 6 18:19:23 hqnl0246134 sshd[241834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 102.219.33.178 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 18:19:24,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '102.219.33.178', 'timestamp': 1670343564.2637653, 'message': 'Dec 6 18:19:23 hqnl0246134 sshd[241834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.219.33.178 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:19:26,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.219.33.178', 'timestamp': 1670343566.2648053, 'message': 'Dec 6 18:19:24 hqnl0246134 sshd[241834]: Failed password for invalid user fuckyou from 102.219.33.178 port 33090 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:19:26,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.219.33.178', 'timestamp': 1670343566.2650497, 'message': 'Dec 6 18:19:25 hqnl0246134 sshd[241834]: Disconnected from invalid user fuckyou 102.219.33.178 port 33090 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:19:30,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343570.2724164, 'message': 'Dec 6 18:19:29 hqnl0246134 sshd[241865]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0680 seconds
INFO [2022-12-06 18:19:30,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343570.2728798, 'message': 'Dec 6 18:19:29 hqnl0246134 sshd[241865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 18:19:32,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343572.2733097, 'message': 'Dec 6 18:19:31 hqnl0246134 sshd[241865]: Failed password for root from 61.177.173.18 port 28783 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 18:19:32,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343572.2736385, 'message': 'Dec 6 18:19:32 hqnl0246134 sshd[241865]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:19:34,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343574.2741914, 'message': 'Dec 6 18:19:33 hqnl0246134 sshd[241865]: Failed password for root from 61.177.173.18 port 28783 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 18:19:34,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343574.274502, 'message': 'Dec 6 18:19:34 hqnl0246134 sshd[241868]: Invalid user sergey from 96.43.99.83 port 59248', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 18:19:34,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343574.274657, 'message': 'Dec 6 18:19:34 hqnl0246134 sshd[241868]: pam_imunify(sshd:auth): [IM360_RBL] The IP 96.43.99.83 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:19:34,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343574.2748497, 'message': 'Dec 6 18:19:34 hqnl0246134 sshd[241868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.43.99.83 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:19:36,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343576.2768118, 'message': 'Dec 6 18:19:34 hqnl0246134 sshd[241865]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 18:19:36,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343576.2770483, 'message': 'Dec 6 18:19:35 hqnl0246134 sshd[241868]: Failed password for invalid user sergey from 96.43.99.83 port 59248 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 18:19:36,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343576.2771788, 'message': 'Dec 6 18:19:35 hqnl0246134 sshd[241865]: Failed password for root from 61.177.173.18 port 28783 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 18:19:38,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '96.43.99.83', 'timestamp': 1670343578.281261, 'message': 'Dec 6 18:19:36 hqnl0246134 sshd[241868]: Disconnected from invalid user sergey 96.43.99.83 port 59248 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 18:19:38,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '98.40.14.28', 'timestamp': 1670343578.2815425, 'message': 'Dec 6 18:19:37 hqnl0246134 sshd[241878]: Invalid user pi from 98.40.14.28 port 37170', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 18:19:38,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '98.40.14.28', 'timestamp': 1670343578.2816944, 'message': 'Dec 6 18:19:37 hqnl0246134 sshd[241879]: Invalid user pi from 98.40.14.28 port 37172', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 18:19:38,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '98.40.14.28', 'timestamp': 1670343578.2818055, 'message': 'Dec 6 18:19:37 hqnl0246134 sshd[241878]: pam_imunify(sshd:auth): [IM360_RBL] The IP 98.40.14.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 18:19:38,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '98.40.14.28', 'timestamp': 1670343578.2819583, 'message': 'Dec 6 18:19:37 hqnl0246134 sshd[241879]: pam_imunify(sshd:auth): [IM360_RBL] The IP 98.40.14.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 18:19:38,392] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '98.40.14.28', 'timestamp': 1670343578.2820873, 'message': 'Dec 6 18:19:37 hqnl0246134 sshd[241878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.40.14.28 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:19:38,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '98.40.14.28', 'timestamp': 1670343578.2822013, 'message': 'Dec 6 18:19:37 hqnl0246134 sshd[241879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.40.14.28 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:19:40,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '98.40.14.28', 'timestamp': 1670343580.2824998, 'message': 'Dec 6 18:19:39 hqnl0246134 sshd[241878]: Failed password for invalid user pi from 98.40.14.28 port 37170 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 18:19:40,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '98.40.14.28', 'timestamp': 1670343580.2827978, 'message': 'Dec 6 18:19:39 hqnl0246134 sshd[241879]: Failed password for invalid user pi from 98.40.14.28 port 37172 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:19:42,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343582.284581, 'message': 'Dec 6 18:19:41 hqnl0246134 sshd[241882]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.161.12.119 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:19:42,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343582.2848506, 'message': 'Dec 6 18:19:41 hqnl0246134 sshd[241882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 18:19:42,722] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:19:42,722] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:19:42,732] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:19:42,745] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-06 18:19:44,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343584.287272, 'message': 'Dec 6 18:19:43 hqnl0246134 sshd[241882]: Failed password for root from 14.161.12.119 port 44952 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 18:19:47,920] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:19:47,921] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:20:00,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343600.3696601, 'message': 'Dec 6 18:19:59 hqnl0246134 sshd[241892]: Invalid user cubrid from 134.209.109.149 port 54500', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0982 seconds
INFO [2022-12-06 18:20:00,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343600.3700705, 'message': 'Dec 6 18:19:59 hqnl0246134 sshd[241892]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.209.109.149 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:20:00,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343600.3702366, 'message': 'Dec 6 18:19:59 hqnl0246134 sshd[241892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.109.149 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:20:02,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343602.3469744, 'message': 'Dec 6 18:20:02 hqnl0246134 sshd[241892]: Failed password for invalid user cubrid from 134.209.109.149 port 54500 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-06 18:20:02,550] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 18:20:02,652] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 18:20:02,653] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 18:20:02,654] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 18:20:02,654] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 18:20:02,654] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 18:20:02,668] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 18:20:02,692] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0376 seconds
WARNING [2022-12-06 18:20:02,705] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 18:20:02,708] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:20:02,736] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0523 seconds
INFO [2022-12-06 18:20:02,738] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0494 seconds
INFO [2022-12-06 18:20:04,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343604.3492613, 'message': 'Dec 6 18:20:04 hqnl0246134 sshd[241892]: Disconnected from invalid user cubrid 134.209.109.149 port 54500 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 18:20:09,411] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:20:09,445] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0406 seconds
INFO [2022-12-06 18:20:18,199] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:20:18,200] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:20:18,210] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:20:18,223] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 18:20:18,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343618.3661897, 'message': 'Dec 6 18:20:17 hqnl0246134 sshd[241932]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 18:20:18,406] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343618.366493, 'message': 'Dec 6 18:20:17 hqnl0246134 sshd[241932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:20:20,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343620.3696053, 'message': 'Dec 6 18:20:19 hqnl0246134 sshd[241932]: Failed password for root from 61.177.173.18 port 54440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 18:20:20,944] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:20:20,944] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:20:20,952] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:20:20,964] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 18:20:22,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343622.3737218, 'message': 'Dec 6 18:20:22 hqnl0246134 sshd[241932]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 18:20:26,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343626.3828025, 'message': 'Dec 6 18:20:24 hqnl0246134 sshd[241932]: Failed password for root from 61.177.173.18 port 54440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 18:20:28,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343628.3835, 'message': 'Dec 6 18:20:26 hqnl0246134 sshd[241932]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:20:28,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343628.3837497, 'message': 'Dec 6 18:20:28 hqnl0246134 sshd[241932]: Failed password for root from 61.177.173.18 port 54440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 18:20:33,442] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 18:20:33,443] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 18:20:33,444] im360.plugins.client360: Waiting 6 minutes before retry...
WARNING [2022-12-06 18:20:47,923] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:20:47,924] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:21:00,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.152.214.252', 'timestamp': 1670343660.4658453, 'message': 'Dec 6 18:21:00 hqnl0246134 sshd[241961]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.152.214.252 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 18:21:00,512] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.152.214.252', 'timestamp': 1670343660.4666147, 'message': 'Dec 6 18:21:00 hqnl0246134 sshd[241961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.214.252 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 18:21:02,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '194.152.214.252', 'timestamp': 1670343662.4679422, 'message': 'Dec 6 18:21:02 hqnl0246134 sshd[241961]: Failed password for root from 194.152.214.252 port 54765 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 18:21:04,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343664.472527, 'message': 'Dec 6 18:21:03 hqnl0246134 sshd[241978]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 18:21:04,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343664.4728043, 'message': 'Dec 6 18:21:03 hqnl0246134 sshd[241978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:21:06,502] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343666.4750943, 'message': 'Dec 6 18:21:05 hqnl0246134 sshd[241978]: Failed password for root from 61.177.173.18 port 20940 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 18:21:07,015] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:21:07,016] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:21:07,025] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:21:07,045] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0282 seconds
INFO [2022-12-06 18:21:08,509] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343668.4777606, 'message': 'Dec 6 18:21:08 hqnl0246134 sshd[241978]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
WARNING [2022-12-06 18:21:09,421] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:21:09,455] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0484 seconds
INFO [2022-12-06 18:21:10,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343670.4803698, 'message': 'Dec 6 18:21:10 hqnl0246134 sshd[241978]: Failed password for root from 61.177.173.18 port 20940 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 18:21:14,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343674.482961, 'message': 'Dec 6 18:21:12 hqnl0246134 sshd[241978]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 18:21:14,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343674.4832578, 'message': 'Dec 6 18:21:13 hqnl0246134 sshd[241986]: Invalid user admin from 124.154.86.134 port 60011', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 18:21:14,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343674.483472, 'message': 'Dec 6 18:21:13 hqnl0246134 sshd[241986]: Failed none for invalid user admin from 124.154.86.134 port 60011 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 18:21:14,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343674.4840918, 'message': 'Dec 6 18:21:14 hqnl0246134 sshd[241978]: Failed password for root from 61.177.173.18 port 20940 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 18:21:14,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343674.4837143, 'message': 'Dec 6 18:21:14 hqnl0246134 sshd[241986]: pam_imunify(sshd:auth): [IM360_RBL] The IP 124.154.86.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:21:14,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343674.483914, 'message': 'Dec 6 18:21:14 hqnl0246134 sshd[241986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.154.86.134 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:21:16,506] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343676.4875684, 'message': 'Dec 6 18:21:15 hqnl0246134 sshd[241986]: Failed password for invalid user admin from 124.154.86.134 port 60011 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 18:21:16,524] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343676.4878051, 'message': 'Dec 6 18:21:16 hqnl0246134 sshd[241986]: pam_imunify(sshd:auth): [IM360_RBL] The IP 124.154.86.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:21:17,836] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:21:17,836] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:21:17,845] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:21:17,858] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 18:21:18,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343678.4895897, 'message': 'Dec 6 18:21:17 hqnl0246134 sshd[241986]: Failed password for invalid user admin from 124.154.86.134 port 60011 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:21:18,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343678.4898422, 'message': 'Dec 6 18:21:18 hqnl0246134 sshd[241986]: pam_imunify(sshd:auth): [IM360_RBL] The IP 124.154.86.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 18:21:20,511] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343680.492043, 'message': 'Dec 6 18:21:19 hqnl0246134 sshd[241986]: Failed password for invalid user admin from 124.154.86.134 port 60011 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 18:21:20,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343680.492239, 'message': 'Dec 6 18:21:20 hqnl0246134 sshd[241986]: pam_imunify(sshd:auth): [IM360_RBL] The IP 124.154.86.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 18:21:20,743] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:21:20,744] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:21:20,752] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:21:20,764] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 18:21:22,513] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343682.4943523, 'message': 'Dec 6 18:21:22 hqnl0246134 sshd[241986]: Failed password for invalid user admin from 124.154.86.134 port 60011 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 18:21:24,515] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343684.497886, 'message': 'Dec 6 18:21:22 hqnl0246134 sshd[241986]: pam_imunify(sshd:auth): [IM360_RBL] The IP 124.154.86.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:21:26,533] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343686.5022998, 'message': 'Dec 6 18:21:24 hqnl0246134 sshd[241986]: Failed password for invalid user admin from 124.154.86.134 port 60011 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 18:21:26,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343686.5025816, 'message': 'Dec 6 18:21:26 hqnl0246134 sshd[241986]: error: maximum authentication attempts exceeded for invalid user admin from 124.154.86.134 port 60011 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:21:26,571] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '124.154.86.134', 'timestamp': 1670343686.5028048, 'message': 'Dec 6 18:21:26 hqnl0246134 sshd[241986]: Disconnecting invalid user admin 124.154.86.134 port 60011: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:21:32,534] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343692.5101092, 'message': 'Dec 6 18:21:31 hqnl0246134 sshd[242014]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.72.25 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 18:21:32,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343692.5104597, 'message': 'Dec 6 18:21:31 hqnl0246134 sshd[242014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.72.25 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:21:34,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.72.25', 'timestamp': 1670343694.5132732, 'message': 'Dec 6 18:21:33 hqnl0246134 sshd[242014]: Failed password for root from 43.153.72.25 port 41254 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 18:21:42,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343702.5224664, 'message': 'Dec 6 18:21:41 hqnl0246134 sshd[242021]: Invalid user zte from 84.46.253.201 port 51274', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:21:42,561] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343702.5228467, 'message': 'Dec 6 18:21:41 hqnl0246134 sshd[242021]: pam_imunify(sshd:auth): [IM360_RBL] The IP 84.46.253.201 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:21:42,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343702.522989, 'message': 'Dec 6 18:21:41 hqnl0246134 sshd[242021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.46.253.201 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 18:21:44,548] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343704.5282161, 'message': 'Dec 6 18:21:43 hqnl0246134 sshd[242021]: Failed password for invalid user zte from 84.46.253.201 port 51274 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 18:21:46,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343706.5336385, 'message': 'Dec 6 18:21:45 hqnl0246134 sshd[242021]: Disconnected from invalid user zte 84.46.253.201 port 51274 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0302 seconds
WARNING [2022-12-06 18:21:47,928] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:21:47,928] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:21:48,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343708.6250072, 'message': 'Dec 6 18:21:48 hqnl0246134 sshd[242024]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.88.244 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0704 seconds
INFO [2022-12-06 18:21:48,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343708.625345, 'message': 'Dec 6 18:21:48 hqnl0246134 sshd[242024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.88.244 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-06 18:21:50,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343710.540892, 'message': 'Dec 6 18:21:49 hqnl0246134 sshd[242024]: Failed password for root from 178.128.88.244 port 32790 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 18:21:52,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343712.5463684, 'message': 'Dec 6 18:21:51 hqnl0246134 sshd[242035]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 18:21:52,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343712.5465827, 'message': 'Dec 6 18:21:51 hqnl0246134 sshd[242035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 18:21:53,381] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 18:21:54,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343714.5535254, 'message': 'Dec 6 18:21:53 hqnl0246134 sshd[242035]: Failed password for root from 61.177.173.18 port 57669 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 18:21:54,598] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343714.5539925, 'message': 'Dec 6 18:21:53 hqnl0246134 sshd[242035]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 18:21:56,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343716.5575948, 'message': 'Dec 6 18:21:55 hqnl0246134 sshd[242035]: Failed password for root from 61.177.173.18 port 57669 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 18:21:56,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343716.5582542, 'message': 'Dec 6 18:21:56 hqnl0246134 sshd[242035]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:21:58,597] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343718.561405, 'message': 'Dec 6 18:21:57 hqnl0246134 sshd[242068]: Invalid user localhost from 161.35.24.244 port 46138', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 18:21:58,599] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343718.5625412, 'message': 'Dec 6 18:21:57 hqnl0246134 sshd[242035]: Failed password for root from 61.177.173.18 port 57669 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 18:21:58,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343718.5616817, 'message': 'Dec 6 18:21:57 hqnl0246134 sshd[242068]: pam_imunify(sshd:auth): [IM360_RBL] The IP 161.35.24.244 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 18:21:58,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343718.5624018, 'message': 'Dec 6 18:21:57 hqnl0246134 sshd[242068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.24.244 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:22:00,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343720.5659316, 'message': 'Dec 6 18:21:59 hqnl0246134 sshd[242068]: Failed password for invalid user localhost from 161.35.24.244 port 46138 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 18:22:00,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343720.566211, 'message': 'Dec 6 18:21:59 hqnl0246134 sshd[242068]: Disconnected from invalid user localhost 161.35.24.244 port 46138 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 18:22:06,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343726.5860598, 'message': 'Dec 6 18:22:04 hqnl0246134 sshd[242086]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.164.86.17 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 18:22:06,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343726.5865161, 'message': 'Dec 6 18:22:04 hqnl0246134 sshd[242086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.164.86.17 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:22:08,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '122.164.86.17', 'timestamp': 1670343728.595517, 'message': 'Dec 6 18:22:07 hqnl0246134 sshd[242086]: Failed password for root from 122.164.86.17 port 6198 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 18:22:09,421] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:22:09,451] defence360agent.internals.the_sink: SensorIncidentList(<22 item(s)>) processed in 0.0391 seconds
INFO [2022-12-06 18:22:19,654] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:22:19,655] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:22:19,700] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:22:19,777] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1020 seconds
INFO [2022-12-06 18:22:24,629] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:22:24,630] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:22:24,637] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:22:24,648] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 18:22:30,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.33.182.8', 'timestamp': 1670343750.6367228, 'message': 'Dec 6 18:22:30 hqnl0246134 sshd[242120]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.33.182.8 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:22:30,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.33.182.8', 'timestamp': 1670343750.6370008, 'message': 'Dec 6 18:22:30 hqnl0246134 sshd[242120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.182.8 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 18:22:32,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.33.182.8', 'timestamp': 1670343752.6404548, 'message': 'Dec 6 18:22:31 hqnl0246134 sshd[242120]: Failed password for root from 178.33.182.8 port 59320 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 18:22:36,529] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:22:36,529] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:22:36,537] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:22:36,548] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 18:22:40,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343760.659525, 'message': 'Dec 6 18:22:40 hqnl0246134 sshd[242135]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 18:22:40,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343760.659835, 'message': 'Dec 6 18:22:40 hqnl0246134 sshd[242135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:22:42,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343762.6618848, 'message': 'Dec 6 18:22:42 hqnl0246134 sshd[242135]: Failed password for root from 61.177.173.18 port 41113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 18:22:46,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343766.6724038, 'message': 'Dec 6 18:22:44 hqnl0246134 sshd[242135]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
WARNING [2022-12-06 18:22:47,934] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:22:47,934] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:22:48,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343768.6771982, 'message': 'Dec 6 18:22:47 hqnl0246134 sshd[242135]: Failed password for root from 61.177.173.18 port 41113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 18:22:48,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343768.677453, 'message': 'Dec 6 18:22:48 hqnl0246134 sshd[242140]: Invalid user g from 14.161.12.119 port 34416', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 18:22:48,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343768.6775694, 'message': 'Dec 6 18:22:48 hqnl0246134 sshd[242140]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.161.12.119 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 18:22:48,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343768.6777334, 'message': 'Dec 6 18:22:48 hqnl0246134 sshd[242140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:22:50,708] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343770.677741, 'message': 'Dec 6 18:22:49 hqnl0246134 sshd[242135]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 18:22:50,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343770.6814923, 'message': 'Dec 6 18:22:50 hqnl0246134 sshd[242140]: Failed password for invalid user g from 14.161.12.119 port 34416 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 18:22:52,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343772.6806095, 'message': 'Dec 6 18:22:51 hqnl0246134 sshd[242135]: Failed password for root from 61.177.173.18 port 41113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 18:22:52,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.161.12.119', 'timestamp': 1670343772.6857228, 'message': 'Dec 6 18:22:52 hqnl0246134 sshd[242140]: Disconnected from invalid user g 14.161.12.119 port 34416 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 18:22:54,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343774.6845508, 'message': 'Dec 6 18:22:53 hqnl0246134 sshd[242142]: Invalid user uftp from 103.27.236.73 port 57432', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 18:22:54,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343774.686423, 'message': 'Dec 6 18:22:54 hqnl0246134 sshd[242142]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.27.236.73 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:22:54,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343774.6865969, 'message': 'Dec 6 18:22:54 hqnl0246134 sshd[242142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.236.73 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:22:56,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343776.6884792, 'message': 'Dec 6 18:22:55 hqnl0246134 sshd[242142]: Failed password for invalid user uftp from 103.27.236.73 port 57432 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 18:22:58,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343778.6912165, 'message': 'Dec 6 18:22:57 hqnl0246134 sshd[242142]: Disconnected from invalid user uftp 103.27.236.73 port 57432 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:23:02,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343782.7012289, 'message': 'Dec 6 18:23:02 hqnl0246134 sshd[242154]: Invalid user test from 134.209.109.149 port 42844', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 18:23:02,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343782.7017426, 'message': 'Dec 6 18:23:02 hqnl0246134 sshd[242154]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.209.109.149 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 18:23:02,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343782.7019148, 'message': 'Dec 6 18:23:02 hqnl0246134 sshd[242154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.109.149 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 18:23:06,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343786.7289882, 'message': 'Dec 6 18:23:05 hqnl0246134 sshd[242154]: Failed password for invalid user test from 134.209.109.149 port 42844 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 18:23:08,758] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343788.7375546, 'message': 'Dec 6 18:23:07 hqnl0246134 sshd[242154]: Disconnected from invalid user test 134.209.109.149 port 42844 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
WARNING [2022-12-06 18:23:09,429] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:23:09,457] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0385 seconds
INFO [2022-12-06 18:23:10,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.212.233.50', 'timestamp': 1670343790.7384682, 'message': 'Dec 6 18:23:09 hqnl0246134 sshd[242166]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.212.233.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 18:23:10,777] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.212.233.50', 'timestamp': 1670343790.7386851, 'message': 'Dec 6 18:23:09 hqnl0246134 sshd[242166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.233.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:23:12,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '125.212.233.50', 'timestamp': 1670343792.7517874, 'message': 'Dec 6 18:23:11 hqnl0246134 sshd[242166]: Failed password for root from 125.212.233.50 port 41504 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 18:23:17,940] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:23:17,940] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:23:17,948] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:23:17,959] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 18:23:22,821] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:23:22,821] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:23:22,829] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:23:22,841] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 18:23:30,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343810.7747605, 'message': 'Dec 6 18:23:28 hqnl0246134 sshd[242185]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 18:23:30,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343810.775036, 'message': 'Dec 6 18:23:28 hqnl0246134 sshd[242185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 18:23:30,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343810.7751865, 'message': 'Dec 6 18:23:30 hqnl0246134 sshd[242185]: Failed password for root from 61.177.173.18 port 15841 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:23:32,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343812.7755084, 'message': 'Dec 6 18:23:31 hqnl0246134 sshd[242185]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 18:23:34,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343814.7766123, 'message': 'Dec 6 18:23:33 hqnl0246134 sshd[242185]: Failed password for root from 61.177.173.18 port 15841 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 18:23:36,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343816.7781017, 'message': 'Dec 6 18:23:35 hqnl0246134 sshd[242185]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 18:23:38,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343818.7794778, 'message': 'Dec 6 18:23:37 hqnl0246134 sshd[242185]: Failed password for root from 61.177.173.18 port 15841 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
WARNING [2022-12-06 18:23:47,939] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:23:47,940] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 18:24:09,438] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:24:09,465] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0401 seconds
INFO [2022-12-06 18:24:18,468] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:24:18,468] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:24:18,484] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:24:18,497] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0241 seconds
INFO [2022-12-06 18:24:20,855] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343860.8267267, 'message': 'Dec 6 18:24:18 hqnl0246134 sshd[242235]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 18:24:20,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343860.8270216, 'message': 'Dec 6 18:24:18 hqnl0246134 sshd[242235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 18:24:21,431] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:24:21,431] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:24:21,438] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:24:21,449] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 18:24:22,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343862.8288581, 'message': 'Dec 6 18:24:21 hqnl0246134 sshd[242235]: Failed password for root from 61.177.173.18 port 50004 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 18:24:24,854] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343864.8299236, 'message': 'Dec 6 18:24:23 hqnl0246134 sshd[242235]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 18:24:26,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343866.8326027, 'message': 'Dec 6 18:24:25 hqnl0246134 sshd[242235]: Failed password for root from 61.177.173.18 port 50004 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:24:28,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343868.8341112, 'message': 'Dec 6 18:24:27 hqnl0246134 sshd[242235]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 18:24:30,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343870.837429, 'message': 'Dec 6 18:24:29 hqnl0246134 sshd[242235]: Failed password for root from 61.177.173.18 port 50004 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 18:24:30,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.11.37.50', 'timestamp': 1670343870.8377552, 'message': 'Dec 6 18:24:30 hqnl0246134 sshd[242246]: Invalid user openbravo from 141.11.37.50 port 47344', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 18:24:30,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '141.11.37.50', 'timestamp': 1670343870.837898, 'message': 'Dec 6 18:24:30 hqnl0246134 sshd[242246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 141.11.37.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:24:30,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '141.11.37.50', 'timestamp': 1670343870.8380046, 'message': 'Dec 6 18:24:30 hqnl0246134 sshd[242246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.11.37.50 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 18:24:34,503] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:24:34,504] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:24:34,514] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:24:34,538] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0325 seconds
INFO [2022-12-06 18:24:34,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.11.37.50', 'timestamp': 1670343874.8411727, 'message': 'Dec 6 18:24:33 hqnl0246134 sshd[242246]: Failed password for invalid user openbravo from 141.11.37.50 port 47344 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 18:24:34,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.11.37.50', 'timestamp': 1670343874.8415046, 'message': 'Dec 6 18:24:33 hqnl0246134 sshd[242246]: Disconnected from invalid user openbravo 141.11.37.50 port 47344 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:24:38,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343878.8454616, 'message': 'Dec 6 18:24:36 hqnl0246134 sshd[242261]: Invalid user apple from 84.46.253.201 port 41364', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 18:24:38,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343878.8459322, 'message': 'Dec 6 18:24:36 hqnl0246134 sshd[242261]: pam_imunify(sshd:auth): [IM360_RBL] The IP 84.46.253.201 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 18:24:38,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343878.8461232, 'message': 'Dec 6 18:24:36 hqnl0246134 sshd[242261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.46.253.201 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 18:24:40,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343880.8469036, 'message': 'Dec 6 18:24:38 hqnl0246134 sshd[242261]: Failed password for invalid user apple from 84.46.253.201 port 41364 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 18:24:40,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.46.253.201', 'timestamp': 1670343880.847303, 'message': 'Dec 6 18:24:40 hqnl0246134 sshd[242261]: Disconnected from invalid user apple 84.46.253.201 port 41364 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 18:24:44,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343884.8516006, 'message': 'Dec 6 18:24:43 hqnl0246134 sshd[242263]: Invalid user travis from 161.35.24.244 port 36050', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 18:24:44,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343884.8518717, 'message': 'Dec 6 18:24:43 hqnl0246134 sshd[242263]: pam_imunify(sshd:auth): [IM360_RBL] The IP 161.35.24.244 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:24:44,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343884.8520107, 'message': 'Dec 6 18:24:43 hqnl0246134 sshd[242263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.24.244 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:24:46,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343886.85453, 'message': 'Dec 6 18:24:45 hqnl0246134 sshd[242263]: Failed password for invalid user travis from 161.35.24.244 port 36050 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 18:24:47,943] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:24:47,944] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:24:48,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '161.35.24.244', 'timestamp': 1670343888.8583622, 'message': 'Dec 6 18:24:47 hqnl0246134 sshd[242263]: Disconnected from invalid user travis 161.35.24.244 port 36050 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 18:25:04,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.154.12.139', 'timestamp': 1670343904.8747551, 'message': 'Dec 6 18:25:03 hqnl0246134 sshd[242270]: Invalid user ben from 45.154.12.139 port 59942', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0394 seconds
INFO [2022-12-06 18:25:04,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.154.12.139', 'timestamp': 1670343904.8753915, 'message': 'Dec 6 18:25:03 hqnl0246134 sshd[242270]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.154.12.139 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 18:25:04,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.154.12.139', 'timestamp': 1670343904.8756382, 'message': 'Dec 6 18:25:03 hqnl0246134 sshd[242270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.154.12.139 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 18:25:06,920] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.154.12.139', 'timestamp': 1670343906.8763945, 'message': 'Dec 6 18:25:06 hqnl0246134 sshd[242270]: Failed password for invalid user ben from 45.154.12.139 port 59942 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 18:25:08,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343908.8811095, 'message': 'Dec 6 18:25:08 hqnl0246134 sshd[242298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 18:25:08,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343908.8815181, 'message': 'Dec 6 18:25:08 hqnl0246134 sshd[242298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 18:25:09,437] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:25:09,464] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0358 seconds
INFO [2022-12-06 18:25:10,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.154.12.139', 'timestamp': 1670343910.8849862, 'message': 'Dec 6 18:25:09 hqnl0246134 sshd[242270]: Disconnected from invalid user ben 45.154.12.139 port 59942 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 18:25:12,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343912.886941, 'message': 'Dec 6 18:25:10 hqnl0246134 sshd[242298]: Failed password for root from 61.177.173.18 port 24214 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:25:14,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343914.8909457, 'message': 'Dec 6 18:25:12 hqnl0246134 sshd[242298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:25:16,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343916.8935728, 'message': 'Dec 6 18:25:14 hqnl0246134 sshd[242298]: Failed password for root from 61.177.173.18 port 24214 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 18:25:16,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343916.893889, 'message': 'Dec 6 18:25:15 hqnl0246134 sshd[242308]: Invalid user rahul from 178.128.88.244 port 49936', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 18:25:16,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343916.8937757, 'message': 'Dec 6 18:25:15 hqnl0246134 sshd[242298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0504 seconds
INFO [2022-12-06 18:25:16,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343916.894003, 'message': 'Dec 6 18:25:15 hqnl0246134 sshd[242308]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.88.244 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0502 seconds
INFO [2022-12-06 18:25:16,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343916.8941054, 'message': 'Dec 6 18:25:15 hqnl0246134 sshd[242308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.88.244 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:25:17,985] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:25:17,985] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:25:17,993] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:25:18,004] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-06 18:25:18,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343918.8949711, 'message': 'Dec 6 18:25:17 hqnl0246134 sshd[242298]: Failed password for root from 61.177.173.18 port 24214 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 18:25:18,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343918.895232, 'message': 'Dec 6 18:25:17 hqnl0246134 sshd[242308]: Failed password for invalid user rahul from 178.128.88.244 port 49936 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 18:25:20,711] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:25:20,712] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:25:20,720] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:25:20,731] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 18:25:20,927] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.88.244', 'timestamp': 1670343920.8972855, 'message': 'Dec 6 18:25:19 hqnl0246134 sshd[242308]: Disconnected from invalid user rahul 178.128.88.244 port 49936 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 18:25:26,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.33.182.8', 'timestamp': 1670343926.9023054, 'message': 'Dec 6 18:25:26 hqnl0246134 sshd[242326]: Invalid user tom from 178.33.182.8 port 59788', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 18:25:26,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.33.182.8', 'timestamp': 1670343926.9025912, 'message': 'Dec 6 18:25:26 hqnl0246134 sshd[242326]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.33.182.8 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:25:26,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.33.182.8', 'timestamp': 1670343926.9028232, 'message': 'Dec 6 18:25:26 hqnl0246134 sshd[242326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.182.8 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 18:25:30,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.33.182.8', 'timestamp': 1670343930.9059622, 'message': 'Dec 6 18:25:29 hqnl0246134 sshd[242326]: Failed password for invalid user tom from 178.33.182.8 port 59788 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 18:25:30,950] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.33.182.8', 'timestamp': 1670343930.9062507, 'message': 'Dec 6 18:25:30 hqnl0246134 sshd[242326]: Disconnected from invalid user tom 178.33.182.8 port 59788 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 18:25:47,947] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:25:47,950] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:25:59,013] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343958.9505877, 'message': 'Dec 6 18:25:58 hqnl0246134 sshd[242343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0596 seconds
INFO [2022-12-06 18:25:59,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343958.9515955, 'message': 'Dec 6 18:25:58 hqnl0246134 sshd[242343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 18:26:00,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343960.9536633, 'message': 'Dec 6 18:25:59 hqnl0246134 sshd[242343]: Failed password for root from 61.177.173.18 port 54331 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 18:26:00,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343960.9540162, 'message': 'Dec 6 18:26:00 hqnl0246134 sshd[242343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:26:02,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343962.9539726, 'message': 'Dec 6 18:26:02 hqnl0246134 sshd[242343]: Failed password for root from 61.177.173.18 port 54331 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0449 seconds
INFO [2022-12-06 18:26:04,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343964.9586189, 'message': 'Dec 6 18:26:03 hqnl0246134 sshd[242343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 18:26:06,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670343966.964738, 'message': 'Dec 6 18:26:05 hqnl0246134 sshd[242343]: Failed password for root from 61.177.173.18 port 54331 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 18:26:08,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343968.9677498, 'message': 'Dec 6 18:26:08 hqnl0246134 sshd[242364]: Invalid user jacky from 134.209.109.149 port 59420', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 18:26:09,027] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343968.9680457, 'message': 'Dec 6 18:26:08 hqnl0246134 sshd[242364]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.209.109.149 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 18:26:09,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343968.968251, 'message': 'Dec 6 18:26:08 hqnl0246134 sshd[242364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.109.149 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0212 seconds
WARNING [2022-12-06 18:26:09,446] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:26:09,485] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0529 seconds
INFO [2022-12-06 18:26:10,028] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:26:10,029] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:26:10,037] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:26:10,049] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 18:26:10,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343970.9698594, 'message': 'Dec 6 18:26:10 hqnl0246134 sshd[242364]: Failed password for invalid user jacky from 134.209.109.149 port 59420 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:26:12,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.109.149', 'timestamp': 1670343972.9730544, 'message': 'Dec 6 18:26:12 hqnl0246134 sshd[242364]: Disconnected from invalid user jacky 134.209.109.149 port 59420 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 18:26:17,911] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:26:17,911] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:26:17,919] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:26:17,933] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 18:26:20,811] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:26:20,812] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:26:20,821] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:26:20,834] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-06 18:26:31,021] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343990.9962924, 'message': 'Dec 6 18:26:29 hqnl0246134 sshd[242406]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.27.236.73 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 18:26:31,047] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343990.9969044, 'message': 'Dec 6 18:26:29 hqnl0246134 sshd[242406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.236.73 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 18:26:31,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.27.236.73', 'timestamp': 1670343990.9970884, 'message': 'Dec 6 18:26:30 hqnl0246134 sshd[242406]: Failed password for root from 103.27.236.73 port 46878 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:26:47,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344007.0118332, 'message': 'Dec 6 18:26:46 hqnl0246134 sshd[242421]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 18:26:47,057] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344007.0126345, 'message': 'Dec 6 18:26:46 hqnl0246134 sshd[242421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 18:26:47,958] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:26:47,958] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:26:49,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344009.0110612, 'message': 'Dec 6 18:26:48 hqnl0246134 sshd[242421]: Failed password for root from 61.177.173.18 port 29815 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 18:26:49,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344009.0112727, 'message': 'Dec 6 18:26:48 hqnl0246134 sshd[242421]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 18:26:51,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344011.01324, 'message': 'Dec 6 18:26:50 hqnl0246134 sshd[242421]: Failed password for root from 61.177.173.18 port 29815 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:26:55,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344015.0183322, 'message': 'Dec 6 18:26:53 hqnl0246134 sshd[242421]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 18:26:55,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344015.0186794, 'message': 'Dec 6 18:26:55 hqnl0246134 sshd[242421]: Failed password for root from 61.177.173.18 port 29815 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
WARNING [2022-12-06 18:27:09,446] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:27:09,474] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0376 seconds
INFO [2022-12-06 18:27:17,872] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:27:17,873] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:27:17,880] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:27:17,892] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 18:27:19,222] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 18:27:19,293] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 18:27:19,294] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 18:27:19,294] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 18:27:19,294] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 18:27:19,294] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 18:27:19,303] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 18:27:19,318] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0234 seconds
WARNING [2022-12-06 18:27:19,325] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 18:27:19,327] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:27:19,345] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0319 seconds
INFO [2022-12-06 18:27:19,347] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0314 seconds
INFO [2022-12-06 18:27:20,728] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:27:20,729] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:27:20,735] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:27:20,747] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 18:27:25,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344045.0649638, 'message': 'Dec 6 18:27:23 hqnl0246134 sshd[242465]: Invalid user tang from 194.152.214.252 port 15717', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 18:27:25,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.46.253.201', 'timestamp': 1670344045.0658457, 'message': 'Dec 6 18:27:25 hqnl0246134 sshd[242468]: Invalid user zs from 84.46.253.201 port 59696', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 18:27:25,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344045.0655112, 'message': 'Dec 6 18:27:23 hqnl0246134 sshd[242465]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.152.214.252 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 18:27:25,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '84.46.253.201', 'timestamp': 1670344045.0660088, 'message': 'Dec 6 18:27:25 hqnl0246134 sshd[242468]: pam_imunify(sshd:auth): [IM360_RBL] The IP 84.46.253.201 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 18:27:25,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344045.0656402, 'message': 'Dec 6 18:27:23 hqnl0246134 sshd[242465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.214.252 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 18:27:25,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '84.46.253.201', 'timestamp': 1670344045.066202, 'message': 'Dec 6 18:27:25 hqnl0246134 sshd[242468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.46.253.201 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 18:27:27,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344047.0661342, 'message': 'Dec 6 18:27:25 hqnl0246134 sshd[242465]: Failed password for invalid user tang from 194.152.214.252 port 15717 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 18:27:27,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.46.253.201', 'timestamp': 1670344047.0664701, 'message': 'Dec 6 18:27:26 hqnl0246134 sshd[242468]: Failed password for invalid user zs from 84.46.253.201 port 59696 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 18:27:27,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344047.0663452, 'message': 'Dec 6 18:27:25 hqnl0246134 sshd[242465]: Disconnected from invalid user tang 194.152.214.252 port 15717 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 18:27:28,893] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:27:28,894] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:27:28,939] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:27:28,999] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0902 seconds
INFO [2022-12-06 18:27:29,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.46.253.201', 'timestamp': 1670344049.0692508, 'message': 'Dec 6 18:27:28 hqnl0246134 sshd[242468]: Disconnected from invalid user zs 84.46.253.201 port 59696 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0785 seconds
INFO [2022-12-06 18:27:35,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.154.12.139', 'timestamp': 1670344055.0788865, 'message': 'Dec 6 18:27:33 hqnl0246134 sshd[242483]: Invalid user antoine from 45.154.12.139 port 40040', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 18:27:35,120] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344055.079712, 'message': 'Dec 6 18:27:33 hqnl0246134 sshd[242493]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 18:27:35,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.154.12.139', 'timestamp': 1670344055.0794227, 'message': 'Dec 6 18:27:33 hqnl0246134 sshd[242483]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.154.12.139 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 18:27:35,153] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344055.0798457, 'message': 'Dec 6 18:27:33 hqnl0246134 sshd[242493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 18:27:35,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.154.12.139', 'timestamp': 1670344055.0795853, 'message': 'Dec 6 18:27:33 hqnl0246134 sshd[242483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.154.12.139 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:27:37,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.154.12.139', 'timestamp': 1670344057.081171, 'message': 'Dec 6 18:27:35 hqnl0246134 sshd[242483]: Failed password for invalid user antoine from 45.154.12.139 port 40040 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 18:27:37,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344057.081403, 'message': 'Dec 6 18:27:36 hqnl0246134 sshd[242493]: Failed password for root from 61.177.173.18 port 58694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 18:27:39,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.154.12.139', 'timestamp': 1670344059.0841413, 'message': 'Dec 6 18:27:37 hqnl0246134 sshd[242483]: Disconnected from invalid user antoine 45.154.12.139 port 40040 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 18:27:39,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344059.0858119, 'message': 'Dec 6 18:27:38 hqnl0246134 sshd[242493]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 18:27:41,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344061.0868697, 'message': 'Dec 6 18:27:40 hqnl0246134 sshd[242493]: Failed password for root from 61.177.173.18 port 58694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 18:27:41,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344061.0872564, 'message': 'Dec 6 18:27:40 hqnl0246134 sshd[242493]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 18:27:43,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344063.089145, 'message': 'Dec 6 18:27:42 hqnl0246134 sshd[242493]: Failed password for root from 61.177.173.18 port 58694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 18:27:47,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.11.37.50', 'timestamp': 1670344067.0941932, 'message': 'Dec 6 18:27:46 hqnl0246134 sshd[242497]: Invalid user tom from 141.11.37.50 port 34568', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:27:47,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '141.11.37.50', 'timestamp': 1670344067.0944793, 'message': 'Dec 6 18:27:46 hqnl0246134 sshd[242497]: pam_imunify(sshd:auth): [IM360_RBL] The IP 141.11.37.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:27:47,153] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '141.11.37.50', 'timestamp': 1670344067.0947106, 'message': 'Dec 6 18:27:46 hqnl0246134 sshd[242497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.11.37.50 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
WARNING [2022-12-06 18:27:47,964] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:27:47,965] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:27:49,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.11.37.50', 'timestamp': 1670344069.0957968, 'message': 'Dec 6 18:27:47 hqnl0246134 sshd[242497]: Failed password for invalid user tom from 141.11.37.50 port 34568 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:27:49,133] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.11.37.50', 'timestamp': 1670344069.095969, 'message': 'Dec 6 18:27:48 hqnl0246134 sshd[242497]: Disconnected from invalid user tom 141.11.37.50 port 34568 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 18:27:52,385] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 18:27:52,386] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 18:27:52,387] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 18:27:53,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '188.32.176.34', 'timestamp': 1670344073.0998445, 'message': 'Dec 6 18:27:52 hqnl0246134 sshd[242502]: Accepted publickey for root from 188.32.176.34 port 37220 ssh2: RSA SHA256:M5XvbkooZmQvvjfo3fKHU5lbqUaXL4LET3qhCF0FT28', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 18:27:59,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.212.233.50', 'timestamp': 1670344079.1061635, 'message': 'Dec 6 18:27:58 hqnl0246134 sshd[242554]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.212.233.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 18:27:59,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.212.233.50', 'timestamp': 1670344079.10641, 'message': 'Dec 6 18:27:58 hqnl0246134 sshd[242554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.233.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 18:28:01,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '125.212.233.50', 'timestamp': 1670344081.1064446, 'message': 'Dec 6 18:28:00 hqnl0246134 sshd[242554]: Failed password for root from 125.212.233.50 port 58682 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
WARNING [2022-12-06 18:28:09,452] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:28:09,498] defence360agent.internals.the_sink: SensorIncidentList(<19 item(s)>) processed in 0.0557 seconds
INFO [2022-12-06 18:28:11,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '110.141.212.12', 'timestamp': 1670344091.1222856, 'message': 'Dec 6 18:28:10 hqnl0246134 sshd[242601]: pam_imunify(sshd:auth): [IM360_RBL] The IP 110.141.212.12 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 18:28:11,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '110.141.212.12', 'timestamp': 1670344091.1226568, 'message': 'Dec 6 18:28:10 hqnl0246134 sshd[242601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.141.212.12 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 18:28:13,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '110.141.212.12', 'timestamp': 1670344093.1286418, 'message': 'Dec 6 18:28:12 hqnl0246134 sshd[242601]: Failed password for root from 110.141.212.12 port 52164 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 18:28:15,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.33.182.8', 'timestamp': 1670344095.129899, 'message': 'Dec 6 18:28:14 hqnl0246134 sshd[242609]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.33.182.8 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:28:15,167] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.33.182.8', 'timestamp': 1670344095.13216, 'message': 'Dec 6 18:28:14 hqnl0246134 sshd[242609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.182.8 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:28:17,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.33.182.8', 'timestamp': 1670344097.1326652, 'message': 'Dec 6 18:28:15 hqnl0246134 sshd[242609]: Failed password for root from 178.33.182.8 port 60294 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 18:28:18,115] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:28:18,115] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:28:18,124] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:28:18,138] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-06 18:28:20,873] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:28:20,873] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:28:20,881] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:28:20,894] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 18:28:23,159] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344103.1381273, 'message': 'Dec 6 18:28:23 hqnl0246134 sshd[242621]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 18:28:23,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344103.1385136, 'message': 'Dec 6 18:28:23 hqnl0246134 sshd[242621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 18:28:25,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344105.1438127, 'message': 'Dec 6 18:28:24 hqnl0246134 sshd[242621]: Failed password for root from 61.177.173.18 port 33374 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 18:28:27,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344107.1491125, 'message': 'Dec 6 18:28:25 hqnl0246134 sshd[242621]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 18:28:29,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344109.1531353, 'message': 'Dec 6 18:28:27 hqnl0246134 sshd[242621]: Failed password for root from 61.177.173.18 port 33374 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:28:31,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344111.1566486, 'message': 'Dec 6 18:28:29 hqnl0246134 sshd[242621]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:28:33,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344113.1582854, 'message': 'Dec 6 18:28:31 hqnl0246134 sshd[242621]: Failed password for root from 61.177.173.18 port 33374 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 18:28:33,766] defence360agent.files: Updating all files
INFO [2022-12-06 18:28:34,045] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 18:28:34,046] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 18:28:34,334] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 18:28:34,334] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 18:28:34,411] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:28:34,412] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:28:34,424] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:28:34,441] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0279 seconds
INFO [2022-12-06 18:28:34,605] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 18:28:34,606] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 18:28:34,949] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 18:28:34,949] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 18:28:34,949] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 18:28:35,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.88.244', 'timestamp': 1670344115.160856, 'message': 'Dec 6 18:28:34 hqnl0246134 sshd[242639]: Invalid user ubuntu from 178.128.88.244 port 38858', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 18:28:35,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.88.244', 'timestamp': 1670344115.161119, 'message': 'Dec 6 18:28:34 hqnl0246134 sshd[242639]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.88.244 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 18:28:35,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.88.244', 'timestamp': 1670344115.16125, 'message': 'Dec 6 18:28:34 hqnl0246134 sshd[242639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.88.244 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:28:35,270] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 16:28:35 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E411F7976460F'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 18:28:35,272] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 18:28:35,272] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 18:28:35,843] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 18:28:35,843] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 18:28:36,107] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 18:28:36,108] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 18:28:36,360] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 18:28:36,361] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 18:28:36,758] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 18:28:36,759] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 18:28:37,149] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 18:28:37,151] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 18:28:37,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.88.244', 'timestamp': 1670344117.1614132, 'message': 'Dec 6 18:28:36 hqnl0246134 sshd[242639]: Failed password for invalid user ubuntu from 178.128.88.244 port 38858 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 18:28:39,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670344119.1665852, 'message': 'Dec 6 18:28:37 hqnl0246134 sshd[242624]: Accepted password for supportwwwuser from 212.58.119.251 port 10749 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0518 seconds
INFO [2022-12-06 18:28:39,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.88.244', 'timestamp': 1670344119.1736293, 'message': 'Dec 6 18:28:37 hqnl0246134 sshd[242639]: Disconnected from invalid user ubuntu 178.128.88.244 port 38858 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0468 seconds
INFO [2022-12-06 18:28:47,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '212.58.119.251', 'timestamp': 1670344127.1813784, 'message': 'Dec 6 18:28:46 hqnl0246134 sshd[242697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.58.119.251 user=supportwwwuser', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0212 seconds
WARNING [2022-12-06 18:28:47,968] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:28:47,969] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:28:49,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '212.58.119.251', 'timestamp': 1670344129.1815917, 'message': 'Dec 6 18:28:48 hqnl0246134 sshd[242697]: Failed password for supportwwwuser from 212.58.119.251 port 10750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 18:28:51,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670344131.1836424, 'message': 'Dec 6 18:28:50 hqnl0246134 sshd[242697]: Accepted password for supportwwwuser from 212.58.119.251 port 10750 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 18:29:05,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '212.58.119.251', 'timestamp': 1670344145.1976378, 'message': 'Dec 6 18:29:04 hqnl0246134 sshd[242747]: Accepted password for supportwwwuser from 212.58.119.251 port 10497 ssh2', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0272 seconds
WARNING [2022-12-06 18:29:09,459] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:29:09,492] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0442 seconds
INFO [2022-12-06 18:29:13,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344153.2045126, 'message': 'Dec 6 18:29:12 hqnl0246134 sshd[242798]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1334 seconds
INFO [2022-12-06 18:29:13,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344153.211073, 'message': 'Dec 6 18:29:12 hqnl0246134 sshd[242798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1250 seconds
INFO [2022-12-06 18:29:15,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344155.2090738, 'message': 'Dec 6 18:29:14 hqnl0246134 sshd[242798]: Failed password for root from 61.177.173.18 port 64679 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0814 seconds
INFO [2022-12-06 18:29:15,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344155.2093961, 'message': 'Dec 6 18:29:14 hqnl0246134 sshd[242798]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0741 seconds
INFO [2022-12-06 18:29:17,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344157.2099392, 'message': 'Dec 6 18:29:16 hqnl0246134 sshd[242798]: Failed password for root from 61.177.173.18 port 64679 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1532 seconds
INFO [2022-12-06 18:29:19,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344159.2114296, 'message': 'Dec 6 18:29:19 hqnl0246134 sshd[242798]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1291 seconds
INFO [2022-12-06 18:29:23,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344163.2161682, 'message': 'Dec 6 18:29:21 hqnl0246134 sshd[242798]: Failed password for root from 61.177.173.18 port 64679 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0810 seconds
INFO [2022-12-06 18:29:25,325] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:29:25,325] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:29:25,437] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:29:25,539] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1850 seconds
INFO [2022-12-06 18:29:27,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344167.2249439, 'message': 'Dec 6 18:29:25 hqnl0246134 sshd[242807]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.137.5.196 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0525 seconds
INFO [2022-12-06 18:29:27,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344167.2253377, 'message': 'Dec 6 18:29:25 hqnl0246134 sshd[242807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.137.5.196 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 18:29:29,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344169.2282834, 'message': 'Dec 6 18:29:27 hqnl0246134 sshd[242807]: Failed password for root from 200.137.5.196 port 50371 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.2343 seconds
INFO [2022-12-06 18:29:32,863] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:29:32,866] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:29:32,929] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:29:32,996] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1188 seconds
WARNING [2022-12-06 18:29:47,974] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:29:47,979] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:30:05,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344205.2746024, 'message': 'Dec 6 18:30:03 hqnl0246134 sshd[242864]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1146 seconds
INFO [2022-12-06 18:30:05,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.154.12.139', 'timestamp': 1670344205.2756786, 'message': 'Dec 6 18:30:03 hqnl0246134 sshd[242866]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.154.12.139 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1149 seconds
INFO [2022-12-06 18:30:05,428] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344205.2754471, 'message': 'Dec 6 18:30:03 hqnl0246134 sshd[242864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 18:30:05,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.154.12.139', 'timestamp': 1670344205.2758324, 'message': 'Dec 6 18:30:03 hqnl0246134 sshd[242866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.154.12.139 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 18:30:07,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344207.2747023, 'message': 'Dec 6 18:30:05 hqnl0246134 sshd[242864]: Failed password for root from 61.177.173.18 port 43269 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 18:30:07,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.154.12.139', 'timestamp': 1670344207.275003, 'message': 'Dec 6 18:30:06 hqnl0246134 sshd[242866]: Failed password for root from 45.154.12.139 port 48370 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 18:30:09,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344209.2776854, 'message': 'Dec 6 18:30:07 hqnl0246134 sshd[242864]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
WARNING [2022-12-06 18:30:09,461] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:30:09,527] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0766 seconds
INFO [2022-12-06 18:30:11,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344211.2792714, 'message': 'Dec 6 18:30:09 hqnl0246134 sshd[242864]: Failed password for root from 61.177.173.18 port 43269 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 18:30:11,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344211.2795975, 'message': 'Dec 6 18:30:09 hqnl0246134 sshd[242864]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 18:30:11,832] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:30:11,833] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:30:11,841] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:30:11,855] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 18:30:13,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344213.2813158, 'message': 'Dec 6 18:30:12 hqnl0246134 sshd[242864]: Failed password for root from 61.177.173.18 port 43269 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 18:30:18,821] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:30:18,822] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:30:18,831] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:30:18,846] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0233 seconds
INFO [2022-12-06 18:30:23,909] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:30:23,910] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:30:23,921] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:30:23,933] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 18:30:47,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670344247.3238366, 'message': 'Dec 6 18:30:47 hqnl0246134 sshd[242951]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 18:30:47,392] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670344247.3251376, 'message': 'Dec 6 18:30:47 hqnl0246134 sshd[242951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0257 seconds
WARNING [2022-12-06 18:30:47,982] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:30:47,991] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:30:49,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344249.326166, 'message': 'Dec 6 18:30:47 hqnl0246134 sshd[242949]: Invalid user jeremy from 210.16.201.188 port 40480', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.2410 seconds
INFO [2022-12-06 18:30:49,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '152.89.196.220', 'timestamp': 1670344249.3275704, 'message': 'Dec 6 18:30:48 hqnl0246134 sshd[242951]: Failed password for root from 152.89.196.220 port 23880 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.2232 seconds
INFO [2022-12-06 18:30:49,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344249.3270988, 'message': 'Dec 6 18:30:48 hqnl0246134 sshd[242949]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.16.201.188 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0418 seconds
INFO [2022-12-06 18:30:49,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344249.327376, 'message': 'Dec 6 18:30:48 hqnl0246134 sshd[242949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.16.201.188 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1188 seconds
INFO [2022-12-06 18:30:52,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344252.2447534, 'message': 'Dec 6 18:30:50 hqnl0246134 sshd[242949]: Failed password for invalid user jeremy from 210.16.201.188 port 40480 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1592 seconds
INFO [2022-12-06 18:30:52,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344252.24672, 'message': 'Dec 6 18:30:51 hqnl0246134 sshd[242949]: Disconnected from invalid user jeremy 210.16.201.188 port 40480 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0746 seconds
INFO [2022-12-06 18:30:53,362] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344253.331543, 'message': 'Dec 6 18:30:52 hqnl0246134 sshd[242956]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 18:30:53,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344253.3317773, 'message': 'Dec 6 18:30:52 hqnl0246134 sshd[242956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 18:30:55,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344255.3477278, 'message': 'Dec 6 18:30:53 hqnl0246134 sshd[242956]: Failed password for root from 61.177.173.18 port 14091 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0396 seconds
INFO [2022-12-06 18:30:55,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344255.3480031, 'message': 'Dec 6 18:30:54 hqnl0246134 sshd[242956]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 18:30:57,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '141.11.37.50', 'timestamp': 1670344257.3502614, 'message': 'Dec 6 18:30:56 hqnl0246134 sshd[242958]: pam_imunify(sshd:auth): [IM360_RBL] The IP 141.11.37.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0637 seconds
INFO [2022-12-06 18:30:57,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344257.3507192, 'message': 'Dec 6 18:30:57 hqnl0246134 sshd[242956]: Failed password for root from 61.177.173.18 port 14091 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0610 seconds
INFO [2022-12-06 18:30:57,455] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '141.11.37.50', 'timestamp': 1670344257.350579, 'message': 'Dec 6 18:30:56 hqnl0246134 sshd[242958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.11.37.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0399 seconds
INFO [2022-12-06 18:30:59,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344259.3627338, 'message': 'Dec 6 18:30:58 hqnl0246134 sshd[242956]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 18:31:01,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '141.11.37.50', 'timestamp': 1670344261.3632407, 'message': 'Dec 6 18:30:59 hqnl0246134 sshd[242958]: Failed password for root from 141.11.37.50 port 50008 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1027 seconds
INFO [2022-12-06 18:31:01,468] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344261.36355, 'message': 'Dec 6 18:31:00 hqnl0246134 sshd[242956]: Failed password for root from 61.177.173.18 port 14091 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1038 seconds
WARNING [2022-12-06 18:31:09,468] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:31:09,525] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0698 seconds
INFO [2022-12-06 18:31:19,740] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:31:19,743] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:31:19,758] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:31:19,775] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0301 seconds
INFO [2022-12-06 18:31:23,027] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:31:23,028] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:31:23,036] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:31:23,048] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 18:31:42,611] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 18:31:42,705] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 18:31:42,705] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 18:31:42,706] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 18:31:42,706] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 18:31:42,708] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 18:31:42,759] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 18:31:42,787] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0775 seconds
WARNING [2022-12-06 18:31:42,821] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 18:31:42,830] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:31:42,855] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0776 seconds
INFO [2022-12-06 18:31:42,857] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0729 seconds
INFO [2022-12-06 18:31:43,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344303.425131, 'message': 'Dec 6 18:31:42 hqnl0246134 sshd[243001]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 18:31:43,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344303.4255185, 'message': 'Dec 6 18:31:42 hqnl0246134 sshd[243001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 18:31:45,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344305.4134648, 'message': 'Dec 6 18:31:45 hqnl0246134 sshd[243001]: Failed password for root from 61.177.173.18 port 48790 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 18:31:47,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344307.4156456, 'message': 'Dec 6 18:31:47 hqnl0246134 sshd[243001]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0480 seconds
WARNING [2022-12-06 18:31:47,994] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:31:47,995] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:31:49,672] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344309.4392447, 'message': 'Dec 6 18:31:48 hqnl0246134 sshd[243001]: Failed password for root from 61.177.173.18 port 48790 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.2051 seconds
INFO [2022-12-06 18:31:51,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344311.433895, 'message': 'Dec 6 18:31:49 hqnl0246134 sshd[243001]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1208 seconds
WARNING [2022-12-06 18:31:53,801] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 18:31:53,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344313.805157, 'message': 'Dec 6 18:31:51 hqnl0246134 sshd[243001]: Failed password for root from 61.177.173.18 port 48790 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0775 seconds
INFO [2022-12-06 18:32:06,945] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:32:06,953] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:32:06,968] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:32:06,995] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0411 seconds
WARNING [2022-12-06 18:32:09,472] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:32:09,527] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0671 seconds
INFO [2022-12-06 18:32:12,844] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 18:32:12,846] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 18:32:12,852] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 18:32:21,924] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:32:21,933] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:32:21,954] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:32:21,968] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0299 seconds
INFO [2022-12-06 18:32:27,647] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:32:27,649] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:32:27,683] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:32:27,715] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0545 seconds
INFO [2022-12-06 18:32:31,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344351.5211058, 'message': 'Dec 6 18:32:30 hqnl0246134 sshd[243064]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0666 seconds
INFO [2022-12-06 18:32:31,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344351.521644, 'message': 'Dec 6 18:32:30 hqnl0246134 sshd[243064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 18:32:33,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344353.5193372, 'message': 'Dec 6 18:32:32 hqnl0246134 sshd[243064]: Failed password for root from 61.177.173.18 port 16842 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 18:32:35,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344355.5193317, 'message': 'Dec 6 18:32:34 hqnl0246134 sshd[243064]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0626 seconds
INFO [2022-12-06 18:32:37,561] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344357.5252564, 'message': 'Dec 6 18:32:35 hqnl0246134 sshd[243064]: Failed password for root from 61.177.173.18 port 16842 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 18:32:37,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344357.5256615, 'message': 'Dec 6 18:32:36 hqnl0246134 sshd[243064]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 18:32:39,554] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344359.5275, 'message': 'Dec 6 18:32:38 hqnl0246134 sshd[243064]: Failed password for root from 61.177.173.18 port 16842 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 18:32:47,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.212.233.50', 'timestamp': 1670344367.5444078, 'message': 'Dec 6 18:32:47 hqnl0246134 sshd[243074]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.212.233.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0547 seconds
INFO [2022-12-06 18:32:47,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.212.233.50', 'timestamp': 1670344367.5456676, 'message': 'Dec 6 18:32:47 hqnl0246134 sshd[243074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.233.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0217 seconds
WARNING [2022-12-06 18:32:48,013] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:32:48,014] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:32:49,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '125.212.233.50', 'timestamp': 1670344369.5414538, 'message': 'Dec 6 18:32:49 hqnl0246134 sshd[243074]: Failed password for root from 125.212.233.50 port 47638 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 18:33:05,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '42.200.159.37', 'timestamp': 1670344385.555425, 'message': 'Dec 6 18:33:04 hqnl0246134 sshd[243096]: pam_imunify(sshd:auth): [IM360_RBL] The IP 42.200.159.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0458 seconds
INFO [2022-12-06 18:33:05,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '42.200.159.37', 'timestamp': 1670344385.5561755, 'message': 'Dec 6 18:33:04 hqnl0246134 sshd[243096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.159.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0503 seconds
INFO [2022-12-06 18:33:07,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '42.200.159.37', 'timestamp': 1670344387.5619907, 'message': 'Dec 6 18:33:06 hqnl0246134 sshd[243096]: Failed password for root from 42.200.159.37 port 42210 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1994 seconds
WARNING [2022-12-06 18:33:09,502] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:33:09,585] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.1160 seconds
INFO [2022-12-06 18:33:11,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.219.33.178', 'timestamp': 1670344391.564493, 'message': 'Dec 6 18:33:09 hqnl0246134 sshd[243076]: Invalid user user0 from 102.219.33.178 port 49040', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0821 seconds
INFO [2022-12-06 18:33:11,740] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '102.219.33.178', 'timestamp': 1670344391.5666358, 'message': 'Dec 6 18:33:09 hqnl0246134 sshd[243076]: pam_imunify(sshd:auth): [IM360_RBL] The IP 102.219.33.178 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0920 seconds
INFO [2022-12-06 18:33:11,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '102.219.33.178', 'timestamp': 1670344391.5669274, 'message': 'Dec 6 18:33:09 hqnl0246134 sshd[243076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.219.33.178 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0811 seconds
INFO [2022-12-06 18:33:12,728] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:33:12,729] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:33:12,755] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:33:12,767] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0265 seconds
INFO [2022-12-06 18:33:13,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.219.33.178', 'timestamp': 1670344393.5652456, 'message': 'Dec 6 18:33:11 hqnl0246134 sshd[243076]: Failed password for invalid user user0 from 102.219.33.178 port 49040 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 18:33:13,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.219.33.178', 'timestamp': 1670344393.566305, 'message': 'Dec 6 18:33:13 hqnl0246134 sshd[243076]: Disconnected from invalid user user0 102.219.33.178 port 49040 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 18:33:15,639] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344395.5833182, 'message': 'Dec 6 18:33:15 hqnl0246134 sshd[243112]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.152.214.252 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0538 seconds
INFO [2022-12-06 18:33:15,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344395.584404, 'message': 'Dec 6 18:33:15 hqnl0246134 sshd[243112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.214.252 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 18:33:18,154] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:33:18,155] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:33:18,164] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:33:18,176] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 18:33:19,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344399.5706713, 'message': 'Dec 6 18:33:17 hqnl0246134 sshd[243112]: Failed password for root from 194.152.214.252 port 42414 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0471 seconds
INFO [2022-12-06 18:33:19,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344399.5709584, 'message': 'Dec 6 18:33:18 hqnl0246134 sshd[243116]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 18:33:19,637] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344399.571129, 'message': 'Dec 6 18:33:18 hqnl0246134 sshd[243116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:33:21,370] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:33:21,370] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:33:21,386] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:33:21,410] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0375 seconds
INFO [2022-12-06 18:33:21,624] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344401.5721936, 'message': 'Dec 6 18:33:20 hqnl0246134 sshd[243116]: Failed password for root from 61.177.173.18 port 45215 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0511 seconds
INFO [2022-12-06 18:33:21,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344401.5731387, 'message': 'Dec 6 18:33:20 hqnl0246134 sshd[243116]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 18:33:23,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344403.5755334, 'message': 'Dec 6 18:33:22 hqnl0246134 sshd[243116]: Failed password for root from 61.177.173.18 port 45215 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:33:25,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344405.5773544, 'message': 'Dec 6 18:33:24 hqnl0246134 sshd[243116]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 18:33:27,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344407.5800436, 'message': 'Dec 6 18:33:26 hqnl0246134 sshd[243116]: Failed password for root from 61.177.173.18 port 45215 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
WARNING [2022-12-06 18:33:48,019] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:33:48,023] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:34:07,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344447.642147, 'message': 'Dec 6 18:34:06 hqnl0246134 sshd[243162]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-06 18:34:07,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344447.6432686, 'message': 'Dec 6 18:34:06 hqnl0246134 sshd[243162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0319 seconds
WARNING [2022-12-06 18:34:09,481] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:34:09,511] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0389 seconds
INFO [2022-12-06 18:34:09,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344449.6432376, 'message': 'Dec 6 18:34:08 hqnl0246134 sshd[243162]: Failed password for root from 61.177.173.18 port 25553 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 18:34:09,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344449.6434216, 'message': 'Dec 6 18:34:09 hqnl0246134 sshd[243162]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 18:34:11,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344451.6452935, 'message': 'Dec 6 18:34:11 hqnl0246134 sshd[243162]: Failed password for root from 61.177.173.18 port 25553 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:34:11,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344451.6454723, 'message': 'Dec 6 18:34:11 hqnl0246134 sshd[243162]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 18:34:13,676] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344453.647886, 'message': 'Dec 6 18:34:13 hqnl0246134 sshd[243162]: Failed password for root from 61.177.173.18 port 25553 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 18:34:16,279] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:34:16,280] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:34:16,289] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:34:16,303] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 18:34:17,810] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:34:17,811] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:34:17,818] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:34:17,828] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 18:34:20,522] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:34:20,523] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:34:20,530] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:34:20,542] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
WARNING [2022-12-06 18:34:48,026] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:34:48,028] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:34:55,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344495.7016141, 'message': 'Dec 6 18:34:55 hqnl0246134 sshd[243219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 18:34:55,752] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344495.7021253, 'message': 'Dec 6 18:34:55 hqnl0246134 sshd[243219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 18:34:57,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344497.7022128, 'message': 'Dec 6 18:34:57 hqnl0246134 sshd[243219]: Failed password for root from 61.177.173.18 port 59778 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 18:34:57,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344497.7024102, 'message': 'Dec 6 18:34:57 hqnl0246134 sshd[243219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 18:35:01,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344501.7064211, 'message': 'Dec 6 18:35:00 hqnl0246134 sshd[243219]: Failed password for root from 61.177.173.18 port 59778 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 18:35:03,735] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344503.708887, 'message': 'Dec 6 18:35:01 hqnl0246134 sshd[243219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 18:35:05,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344505.7205815, 'message': 'Dec 6 18:35:03 hqnl0246134 sshd[243219]: Failed password for root from 61.177.173.18 port 59778 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0415 seconds
WARNING [2022-12-06 18:35:09,486] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:35:09,510] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0350 seconds
INFO [2022-12-06 18:35:17,798] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:35:17,799] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:35:17,807] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:35:17,818] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 18:35:19,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.247.213.54', 'timestamp': 1670344519.7253022, 'message': 'Dec 6 18:35:18 hqnl0246134 sshd[243269]: Invalid user freeswitch from 115.247.213.54 port 57820', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 18:35:19,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.247.213.54', 'timestamp': 1670344519.725557, 'message': 'Dec 6 18:35:18 hqnl0246134 sshd[243269]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.247.213.54 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 18:35:19,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.247.213.54', 'timestamp': 1670344519.7257102, 'message': 'Dec 6 18:35:18 hqnl0246134 sshd[243269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.247.213.54 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 18:35:20,573] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:35:20,574] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:35:20,581] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:35:20,591] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 18:35:21,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.247.213.54', 'timestamp': 1670344521.728168, 'message': 'Dec 6 18:35:20 hqnl0246134 sshd[243269]: Failed password for invalid user freeswitch from 115.247.213.54 port 57820 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 18:35:23,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.247.213.54', 'timestamp': 1670344523.7303884, 'message': 'Dec 6 18:35:22 hqnl0246134 sshd[243269]: Disconnected from invalid user freeswitch 115.247.213.54 port 57820 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 18:35:24,717] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:35:24,718] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:35:24,725] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:35:24,736] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 18:35:45,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344545.7538936, 'message': 'Dec 6 18:35:43 hqnl0246134 sshd[243298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 18:35:45,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344545.7544081, 'message': 'Dec 6 18:35:43 hqnl0246134 sshd[243298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:35:47,783] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344547.754106, 'message': 'Dec 6 18:35:46 hqnl0246134 sshd[243298]: Failed password for root from 61.177.173.18 port 32922 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 18:35:47,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.179.127', 'timestamp': 1670344547.7542841, 'message': 'Dec 6 18:35:47 hqnl0246134 sshd[243301]: Invalid user user3 from 46.101.179.127 port 34376', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 18:35:47,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.179.127', 'timestamp': 1670344547.7543979, 'message': 'Dec 6 18:35:47 hqnl0246134 sshd[243301]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.179.127 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:35:47,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.179.127', 'timestamp': 1670344547.754529, 'message': 'Dec 6 18:35:47 hqnl0246134 sshd[243301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.179.127 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 18:35:48,030] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:35:48,031] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:35:49,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344549.7565484, 'message': 'Dec 6 18:35:47 hqnl0246134 sshd[243298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-06 18:35:49,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.179.127', 'timestamp': 1670344549.7567828, 'message': 'Dec 6 18:35:49 hqnl0246134 sshd[243301]: Failed password for invalid user user3 from 46.101.179.127 port 34376 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0413 seconds
INFO [2022-12-06 18:35:49,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.204.243', 'timestamp': 1670344549.7570546, 'message': 'Dec 6 18:35:49 hqnl0246134 sshd[243303]: Invalid user copy from 217.182.204.243 port 45694', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0411 seconds
INFO [2022-12-06 18:35:49,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344549.756921, 'message': 'Dec 6 18:35:49 hqnl0246134 sshd[243298]: Failed password for root from 61.177.173.18 port 32922 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 18:35:51,802] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.182.204.243', 'timestamp': 1670344551.7578163, 'message': 'Dec 6 18:35:49 hqnl0246134 sshd[243303]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.182.204.243 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0441 seconds
INFO [2022-12-06 18:35:51,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.179.127', 'timestamp': 1670344551.758125, 'message': 'Dec 6 18:35:50 hqnl0246134 sshd[243301]: Disconnected from invalid user user3 46.101.179.127 port 34376 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0449 seconds
INFO [2022-12-06 18:35:51,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344551.7582629, 'message': 'Dec 6 18:35:50 hqnl0246134 sshd[243298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-06 18:35:51,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.182.204.243', 'timestamp': 1670344551.7579913, 'message': 'Dec 6 18:35:49 hqnl0246134 sshd[243303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.204.243 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:35:51,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.204.243', 'timestamp': 1670344551.7585037, 'message': 'Dec 6 18:35:51 hqnl0246134 sshd[243303]: Failed password for invalid user copy from 217.182.204.243 port 45694 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 18:35:53,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344553.7603536, 'message': 'Dec 6 18:35:52 hqnl0246134 sshd[243298]: Failed password for root from 61.177.173.18 port 32922 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 18:35:53,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.204.243', 'timestamp': 1670344553.760587, 'message': 'Dec 6 18:35:53 hqnl0246134 sshd[243303]: Disconnected from invalid user copy 217.182.204.243 port 45694 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 18:36:03,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344563.7739742, 'message': 'Dec 6 18:36:02 hqnl0246134 sshd[243315]: Invalid user marvin from 43.130.200.181 port 57774', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 18:36:03,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344563.7742665, 'message': 'Dec 6 18:36:02 hqnl0246134 sshd[243315]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.130.200.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0506 seconds
INFO [2022-12-06 18:36:03,894] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344563.7743804, 'message': 'Dec 6 18:36:02 hqnl0246134 sshd[243315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.130.200.181 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 18:36:05,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344565.7772663, 'message': 'Dec 6 18:36:05 hqnl0246134 sshd[243315]: Failed password for invalid user marvin from 43.130.200.181 port 57774 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 18:36:07,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344567.784744, 'message': 'Dec 6 18:36:07 hqnl0246134 sshd[243315]: Disconnected from invalid user marvin 43.130.200.181 port 57774 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0226 seconds
WARNING [2022-12-06 18:36:09,493] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:36:09,528] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0473 seconds
INFO [2022-12-06 18:36:17,766] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:36:17,766] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:36:17,777] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:36:17,791] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 18:36:20,285] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:36:20,286] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:36:20,292] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:36:20,303] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-06 18:36:27,849] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.187.120', 'timestamp': 1670344587.826504, 'message': 'Dec 6 18:36:26 hqnl0246134 sshd[243341]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.187.120 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 18:36:27,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.187.120', 'timestamp': 1670344587.8268478, 'message': 'Dec 6 18:36:26 hqnl0246134 sshd[243341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.187.120 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 18:36:29,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '167.172.187.120', 'timestamp': 1670344589.8285515, 'message': 'Dec 6 18:36:28 hqnl0246134 sshd[243341]: Failed password for root from 167.172.187.120 port 56304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 18:36:33,855] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344593.8335097, 'message': 'Dec 6 18:36:33 hqnl0246134 sshd[243348]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 18:36:33,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344593.8338265, 'message': 'Dec 6 18:36:33 hqnl0246134 sshd[243348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 18:36:35,856] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344595.837315, 'message': 'Dec 6 18:36:35 hqnl0246134 sshd[243348]: Failed password for root from 61.177.173.18 port 61709 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:36:37,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344597.8396785, 'message': 'Dec 6 18:36:37 hqnl0246134 sshd[243348]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 18:36:37,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.71.46.226', 'timestamp': 1670344597.8400288, 'message': 'Dec 6 18:36:37 hqnl0246134 sshd[243358]: Invalid user arun from 13.71.46.226 port 1024', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 18:36:39,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '13.71.46.226', 'timestamp': 1670344599.8423796, 'message': 'Dec 6 18:36:37 hqnl0246134 sshd[243358]: pam_imunify(sshd:auth): [IM360_RBL] The IP 13.71.46.226 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 18:36:39,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344599.8436759, 'message': 'Dec 6 18:36:39 hqnl0246134 sshd[243348]: Failed password for root from 61.177.173.18 port 61709 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 18:36:39,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '13.71.46.226', 'timestamp': 1670344599.8426223, 'message': 'Dec 6 18:36:37 hqnl0246134 sshd[243358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.46.226 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 18:36:41,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.247.213.54', 'timestamp': 1670344601.8460505, 'message': 'Dec 6 18:36:40 hqnl0246134 sshd[243361]: Invalid user charles from 115.247.213.54 port 41726', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0430 seconds
INFO [2022-12-06 18:36:41,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.71.46.226', 'timestamp': 1670344601.8464978, 'message': 'Dec 6 18:36:40 hqnl0246134 sshd[243358]: Failed password for invalid user arun from 13.71.46.226 port 1024 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0438 seconds
INFO [2022-12-06 18:36:41,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.174.137.15', 'timestamp': 1670344601.8465989, 'message': 'Dec 6 18:36:40 hqnl0246134 sshd[243363]: Invalid user oliver from 189.174.137.15 port 40116', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0439 seconds
INFO [2022-12-06 18:36:41,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.247.213.54', 'timestamp': 1670344601.846256, 'message': 'Dec 6 18:36:40 hqnl0246134 sshd[243361]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.247.213.54 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-06 18:36:41,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.174.137.15', 'timestamp': 1670344601.8467107, 'message': 'Dec 6 18:36:41 hqnl0246134 sshd[243363]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.174.137.15 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 18:36:41,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344601.8469582, 'message': 'Dec 6 18:36:41 hqnl0246134 sshd[243348]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 18:36:41,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.247.213.54', 'timestamp': 1670344601.8463905, 'message': 'Dec 6 18:36:40 hqnl0246134 sshd[243361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.247.213.54 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 18:36:41,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.174.137.15', 'timestamp': 1670344601.846833, 'message': 'Dec 6 18:36:41 hqnl0246134 sshd[243363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.174.137.15 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 18:36:43,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.247.213.54', 'timestamp': 1670344603.8462584, 'message': 'Dec 6 18:36:42 hqnl0246134 sshd[243361]: Failed password for invalid user charles from 115.247.213.54 port 41726 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0586 seconds
INFO [2022-12-06 18:36:43,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.71.46.226', 'timestamp': 1670344603.846447, 'message': 'Dec 6 18:36:42 hqnl0246134 sshd[243358]: Disconnected from invalid user arun 13.71.46.226 port 1024 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0590 seconds
INFO [2022-12-06 18:36:43,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.174.137.15', 'timestamp': 1670344603.8473122, 'message': 'Dec 6 18:36:43 hqnl0246134 sshd[243363]: Failed password for invalid user oliver from 189.174.137.15 port 40116 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0583 seconds
INFO [2022-12-06 18:36:43,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344603.847439, 'message': 'Dec 6 18:36:43 hqnl0246134 sshd[243348]: Failed password for root from 61.177.173.18 port 61709 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0581 seconds
INFO [2022-12-06 18:36:43,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.247.213.54', 'timestamp': 1670344603.8471937, 'message': 'Dec 6 18:36:42 hqnl0246134 sshd[243361]: Disconnected from invalid user charles 115.247.213.54 port 41726 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 18:36:45,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.174.137.15', 'timestamp': 1670344605.8512597, 'message': 'Dec 6 18:36:45 hqnl0246134 sshd[243363]: Disconnected from invalid user oliver 189.174.137.15 port 40116 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-06 18:36:48,033] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:36:48,034] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 18:37:09,504] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:37:09,541] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0534 seconds
INFO [2022-12-06 18:37:18,405] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:37:18,406] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:37:18,417] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:37:18,431] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0239 seconds
INFO [2022-12-06 18:37:21,038] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:37:21,038] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:37:21,046] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:37:21,059] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 18:37:23,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344643.9106739, 'message': 'Dec 6 18:37:23 hqnl0246134 sshd[243406]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 18:37:23,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344643.9110599, 'message': 'Dec 6 18:37:23 hqnl0246134 sshd[243406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:37:25,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344645.9124093, 'message': 'Dec 6 18:37:25 hqnl0246134 sshd[243406]: Failed password for root from 61.177.173.18 port 44539 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:37:27,946] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '198.44.165.85', 'timestamp': 1670344647.91495, 'message': 'Dec 6 18:37:26 hqnl0246134 sshd[243408]: pam_imunify(sshd:auth): [IM360_RBL] The IP 198.44.165.85 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 18:37:27,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344647.9152446, 'message': 'Dec 6 18:37:27 hqnl0246134 sshd[243406]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 18:37:27,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '198.44.165.85', 'timestamp': 1670344647.9151325, 'message': 'Dec 6 18:37:26 hqnl0246134 sshd[243408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.44.165.85 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 18:37:29,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '198.44.165.85', 'timestamp': 1670344649.9177682, 'message': 'Dec 6 18:37:28 hqnl0246134 sshd[243408]: Failed password for root from 198.44.165.85 port 39992 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:37:31,943] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344651.9205182, 'message': 'Dec 6 18:37:30 hqnl0246134 sshd[243406]: Failed password for root from 61.177.173.18 port 44539 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 18:37:33,701] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:37:33,702] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:37:33,711] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:37:33,723] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 18:37:33,946] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344653.9230978, 'message': 'Dec 6 18:37:32 hqnl0246134 sshd[243406]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 18:37:35,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344655.9303727, 'message': 'Dec 6 18:37:34 hqnl0246134 sshd[243406]: Failed password for root from 61.177.173.18 port 44539 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0305 seconds
WARNING [2022-12-06 18:37:48,040] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:37:48,041] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:37:51,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '111.93.235.74', 'timestamp': 1670344671.9593372, 'message': 'Dec 6 18:37:50 hqnl0246134 sshd[243453]: pam_imunify(sshd:auth): [IM360_RBL] The IP 111.93.235.74 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 18:37:52,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '111.93.235.74', 'timestamp': 1670344671.959769, 'message': 'Dec 6 18:37:50 hqnl0246134 sshd[243453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.74 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 18:37:53,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '111.93.235.74', 'timestamp': 1670344673.9629347, 'message': 'Dec 6 18:37:52 hqnl0246134 sshd[243453]: Failed password for root from 111.93.235.74 port 54224 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:38:08,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '60.49.207.252', 'timestamp': 1670344687.9846766, 'message': 'Dec 6 18:38:06 hqnl0246134 sshd[243465]: pam_imunify(sshd:auth): [IM360_RBL] The IP 60.49.207.252 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 18:38:08,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '60.49.207.252', 'timestamp': 1670344687.9850585, 'message': 'Dec 6 18:38:06 hqnl0246134 sshd[243465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.49.207.252 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 18:38:09,499] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:38:09,536] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0453 seconds
INFO [2022-12-06 18:38:10,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '60.49.207.252', 'timestamp': 1670344689.985534, 'message': 'Dec 6 18:38:08 hqnl0246134 sshd[243465]: Failed password for root from 60.49.207.252 port 55476 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 18:38:12,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344691.989421, 'message': 'Dec 6 18:38:11 hqnl0246134 sshd[243477]: Invalid user marisa from 43.130.200.181 port 56276', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 18:38:12,082] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344691.9897718, 'message': 'Dec 6 18:38:11 hqnl0246134 sshd[243477]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.130.200.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0581 seconds
INFO [2022-12-06 18:38:12,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344691.989995, 'message': 'Dec 6 18:38:11 hqnl0246134 sshd[243477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.130.200.181 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 18:38:14,024] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344693.9901707, 'message': 'Dec 6 18:38:12 hqnl0246134 sshd[243479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 18:38:14,026] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344693.9904857, 'message': 'Dec 6 18:38:13 hqnl0246134 sshd[243477]: Failed password for invalid user marisa from 43.130.200.181 port 56276 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 18:38:14,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344693.9903705, 'message': 'Dec 6 18:38:12 hqnl0246134 sshd[243479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:38:16,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344695.9934032, 'message': 'Dec 6 18:38:14 hqnl0246134 sshd[243477]: Disconnected from invalid user marisa 43.130.200.181 port 56276 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 18:38:16,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344695.9936438, 'message': 'Dec 6 18:38:14 hqnl0246134 sshd[243479]: Failed password for root from 61.177.173.18 port 18505 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 18:38:18,870] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:38:18,871] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:38:18,884] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:38:18,901] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0287 seconds
INFO [2022-12-06 18:38:18,901] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344698.8729308, 'message': 'Dec 6 18:38:16 hqnl0246134 sshd[243479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 18:38:20,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344699.9948642, 'message': 'Dec 6 18:38:18 hqnl0246134 sshd[243479]: Failed password for root from 61.177.173.18 port 18505 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:38:20,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344699.995048, 'message': 'Dec 6 18:38:19 hqnl0246134 sshd[243479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:38:21,530] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:38:21,530] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:38:21,540] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:38:21,552] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 18:38:22,017] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344701.9982793, 'message': 'Dec 6 18:38:21 hqnl0246134 sshd[243479]: Failed password for root from 61.177.173.18 port 18505 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:38:34,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '187.102.118.254', 'timestamp': 1670344714.0229309, 'message': 'Dec 6 18:38:32 hqnl0246134 sshd[243498]: pam_imunify(sshd:auth): [IM360_RBL] The IP 187.102.118.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 18:38:34,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '187.102.118.254', 'timestamp': 1670344714.023596, 'message': 'Dec 6 18:38:32 hqnl0246134 sshd[243498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.102.118.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:38:36,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '187.102.118.254', 'timestamp': 1670344716.0235832, 'message': 'Dec 6 18:38:34 hqnl0246134 sshd[243498]: Failed password for root from 187.102.118.254 port 44936 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:38:40,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.55.198', 'timestamp': 1670344720.031079, 'message': 'Dec 6 18:38:38 hqnl0246134 sshd[243508]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.55.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 18:38:40,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344720.0315614, 'message': 'Dec 6 18:38:38 hqnl0246134 sshd[243510]: Invalid user michelle from 200.137.5.196 port 46933', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 18:38:40,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.55.198', 'timestamp': 1670344720.0314248, 'message': 'Dec 6 18:38:38 hqnl0246134 sshd[243508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.198 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 18:38:40,097] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344720.031667, 'message': 'Dec 6 18:38:38 hqnl0246134 sshd[243510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.137.5.196 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 18:38:40,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344720.031807, 'message': 'Dec 6 18:38:38 hqnl0246134 sshd[243510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.137.5.196 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 18:38:42,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.55.198', 'timestamp': 1670344722.033826, 'message': 'Dec 6 18:38:40 hqnl0246134 sshd[243508]: Failed password for root from 178.128.55.198 port 59804 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 18:38:42,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344722.0340772, 'message': 'Dec 6 18:38:40 hqnl0246134 sshd[243510]: Failed password for invalid user michelle from 200.137.5.196 port 46933 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 18:38:42,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344722.034228, 'message': 'Dec 6 18:38:41 hqnl0246134 sshd[243510]: Disconnected from invalid user michelle 200.137.5.196 port 46933 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 18:38:44,384] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:38:44,385] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:38:44,397] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:38:44,424] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0372 seconds
WARNING [2022-12-06 18:38:48,042] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:38:48,043] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:38:56,088] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344736.0540226, 'message': 'Dec 6 18:38:54 hqnl0246134 sshd[243521]: Invalid user pdv from 194.152.214.252 port 60043', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 18:38:56,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344736.0545347, 'message': 'Dec 6 18:38:55 hqnl0246134 sshd[243520]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.16.201.188 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 18:38:56,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344736.0542638, 'message': 'Dec 6 18:38:54 hqnl0246134 sshd[243521]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.152.214.252 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 18:38:56,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344736.0546381, 'message': 'Dec 6 18:38:55 hqnl0246134 sshd[243520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.16.201.188 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 18:38:56,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344736.05443, 'message': 'Dec 6 18:38:54 hqnl0246134 sshd[243521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.214.252 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 18:38:58,083] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344738.0542266, 'message': 'Dec 6 18:38:56 hqnl0246134 sshd[243521]: Failed password for invalid user pdv from 194.152.214.252 port 60043 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 18:38:58,084] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344738.0544403, 'message': 'Dec 6 18:38:57 hqnl0246134 sshd[243520]: Failed password for root from 210.16.201.188 port 52560 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 18:39:00,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.152.214.252', 'timestamp': 1670344740.0572917, 'message': 'Dec 6 18:38:59 hqnl0246134 sshd[243521]: Disconnected from invalid user pdv 194.152.214.252 port 60043 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:39:02,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344742.0582697, 'message': 'Dec 6 18:39:01 hqnl0246134 sshd[243525]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 18:39:02,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344742.058451, 'message': 'Dec 6 18:39:01 hqnl0246134 sshd[243525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 18:39:04,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '111.93.235.74', 'timestamp': 1670344744.0608118, 'message': 'Dec 6 18:39:02 hqnl0246134 sshd[243527]: pam_imunify(sshd:auth): [IM360_RBL] The IP 111.93.235.74 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 18:39:04,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344744.0611212, 'message': 'Dec 6 18:39:03 hqnl0246134 sshd[243525]: Failed password for root from 61.177.173.18 port 44396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 18:39:04,129] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '111.93.235.74', 'timestamp': 1670344744.0610056, 'message': 'Dec 6 18:39:02 hqnl0246134 sshd[243527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.74 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 18:39:04,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344744.061298, 'message': 'Dec 6 18:39:03 hqnl0246134 sshd[243525]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-06 18:39:06,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '111.93.235.74', 'timestamp': 1670344746.0640032, 'message': 'Dec 6 18:39:04 hqnl0246134 sshd[243527]: Failed password for root from 111.93.235.74 port 30419 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 18:39:06,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344746.0642078, 'message': 'Dec 6 18:39:05 hqnl0246134 sshd[243525]: Failed password for root from 61.177.173.18 port 44396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 18:39:06,110] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344746.0643485, 'message': 'Dec 6 18:39:06 hqnl0246134 sshd[243525]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 18:39:07,568] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 18:39:07,665] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 18:39:07,666] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 18:39:07,666] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 18:39:07,666] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 18:39:07,667] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 18:39:07,690] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 18:39:07,720] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0514 seconds
WARNING [2022-12-06 18:39:07,727] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 18:39:07,729] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:39:07,749] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0365 seconds
INFO [2022-12-06 18:39:07,750] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0329 seconds
WARNING [2022-12-06 18:39:09,507] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:39:09,544] defence360agent.internals.the_sink: SensorIncidentList(<25 item(s)>) processed in 0.0502 seconds
INFO [2022-12-06 18:39:10,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344750.0686023, 'message': 'Dec 6 18:39:08 hqnl0246134 sshd[243525]: Failed password for root from 61.177.173.18 port 44396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 18:39:17,729] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:39:17,730] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:39:17,738] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:39:17,755] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0241 seconds
INFO [2022-12-06 18:39:20,290] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:39:20,291] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:39:20,297] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:39:20,309] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 18:39:24,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.141.212.12', 'timestamp': 1670344764.0890143, 'message': 'Dec 6 18:39:22 hqnl0246134 sshd[243673]: Invalid user admwizzbe from 110.141.212.12 port 53396', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 18:39:24,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344764.0895133, 'message': 'Dec 6 18:39:23 hqnl0246134 sshd[243683]: Invalid user demo from 43.130.200.181 port 60098', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 18:39:24,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '110.141.212.12', 'timestamp': 1670344764.0892355, 'message': 'Dec 6 18:39:22 hqnl0246134 sshd[243673]: pam_imunify(sshd:auth): [IM360_RBL] The IP 110.141.212.12 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 18:39:24,157] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344764.0896742, 'message': 'Dec 6 18:39:23 hqnl0246134 sshd[243683]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.130.200.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 18:39:24,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '110.141.212.12', 'timestamp': 1670344764.0894067, 'message': 'Dec 6 18:39:22 hqnl0246134 sshd[243673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.141.212.12 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 18:39:24,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344764.0898433, 'message': 'Dec 6 18:39:23 hqnl0246134 sshd[243683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.130.200.181 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 18:39:26,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.141.212.12', 'timestamp': 1670344766.0920653, 'message': 'Dec 6 18:39:25 hqnl0246134 sshd[243673]: Failed password for invalid user admwizzbe from 110.141.212.12 port 53396 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 18:39:26,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344766.0923903, 'message': 'Dec 6 18:39:25 hqnl0246134 sshd[243683]: Failed password for invalid user demo from 43.130.200.181 port 60098 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 18:39:26,140] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344766.0925045, 'message': 'Dec 6 18:39:25 hqnl0246134 sshd[243683]: Disconnected from invalid user demo 43.130.200.181 port 60098 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:39:28,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.141.212.12', 'timestamp': 1670344768.0984862, 'message': 'Dec 6 18:39:26 hqnl0246134 sshd[243673]: Disconnected from invalid user admwizzbe 110.141.212.12 port 53396 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 18:39:28,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '62.122.171.202', 'timestamp': 1670344768.0986862, 'message': 'Dec 6 18:39:27 hqnl0246134 sshd[243685]: pam_imunify(sshd:auth): [IM360_RBL] The IP 62.122.171.202 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 18:39:28,143] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '62.122.171.202', 'timestamp': 1670344768.0988336, 'message': 'Dec 6 18:39:27 hqnl0246134 sshd[243685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.171.202 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 18:39:30,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '62.122.171.202', 'timestamp': 1670344770.1022508, 'message': 'Dec 6 18:39:29 hqnl0246134 sshd[243685]: Failed password for root from 62.122.171.202 port 37360 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 18:39:37,795] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 18:39:37,796] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 18:39:37,798] im360.plugins.client360: Waiting 6 minutes before retry...
WARNING [2022-12-06 18:39:48,047] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:39:48,048] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:39:50,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344790.1355832, 'message': 'Dec 6 18:39:49 hqnl0246134 sshd[243701]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 18:39:50,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344790.136215, 'message': 'Dec 6 18:39:49 hqnl0246134 sshd[243701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:39:52,156] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344792.1375468, 'message': 'Dec 6 18:39:51 hqnl0246134 sshd[243701]: Failed password for root from 61.177.173.18 port 23794 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:39:52,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344792.1378176, 'message': 'Dec 6 18:39:52 hqnl0246134 sshd[243701]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 18:39:56,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344796.147214, 'message': 'Dec 6 18:39:54 hqnl0246134 sshd[243701]: Failed password for root from 61.177.173.18 port 23794 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 18:39:58,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344798.14995, 'message': 'Dec 6 18:39:56 hqnl0246134 sshd[243701]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 18:39:58,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344798.150218, 'message': 'Dec 6 18:39:58 hqnl0246134 sshd[243701]: Failed password for root from 61.177.173.18 port 23794 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 18:40:01,554] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:40:01,554] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:40:01,567] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:40:01,585] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0301 seconds
WARNING [2022-12-06 18:40:09,511] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:40:09,554] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0562 seconds
INFO [2022-12-06 18:40:17,696] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:40:17,697] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:40:17,704] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:40:17,715] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 18:40:20,293] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:40:20,294] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:40:20,303] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:40:20,316] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 18:40:32,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344832.2012208, 'message': 'Dec 6 18:40:31 hqnl0246134 sshd[243758]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.130.200.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:40:32,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344832.2014656, 'message': 'Dec 6 18:40:31 hqnl0246134 sshd[243758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.130.200.181 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 18:40:34,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.130.200.181', 'timestamp': 1670344834.20389, 'message': 'Dec 6 18:40:33 hqnl0246134 sshd[243758]: Failed password for root from 43.130.200.181 port 47628 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 18:40:40,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344840.2153351, 'message': 'Dec 6 18:40:38 hqnl0246134 sshd[243768]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 18:40:40,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344840.2159328, 'message': 'Dec 6 18:40:38 hqnl0246134 sshd[243768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:40:42,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344842.218031, 'message': 'Dec 6 18:40:40 hqnl0246134 sshd[243768]: Failed password for root from 61.177.173.18 port 54315 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 18:40:44,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344844.22076, 'message': 'Dec 6 18:40:42 hqnl0246134 sshd[243768]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:40:46,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344846.2232122, 'message': 'Dec 6 18:40:44 hqnl0246134 sshd[243768]: Failed password for root from 61.177.173.18 port 54315 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 18:40:46,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344846.2234037, 'message': 'Dec 6 18:40:45 hqnl0246134 sshd[243768]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
WARNING [2022-12-06 18:40:48,051] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:40:48,052] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:40:48,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344848.2261465, 'message': 'Dec 6 18:40:47 hqnl0246134 sshd[243768]: Failed password for root from 61.177.173.18 port 54315 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:41:06,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '42.200.159.37', 'timestamp': 1670344866.269901, 'message': 'Dec 6 18:41:04 hqnl0246134 sshd[243779]: Invalid user teamspeak from 42.200.159.37 port 42304', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 18:41:06,321] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '42.200.159.37', 'timestamp': 1670344866.2705739, 'message': 'Dec 6 18:41:04 hqnl0246134 sshd[243779]: pam_imunify(sshd:auth): [IM360_RBL] The IP 42.200.159.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:41:06,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '42.200.159.37', 'timestamp': 1670344866.2708333, 'message': 'Dec 6 18:41:04 hqnl0246134 sshd[243779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.159.37 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 18:41:08,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '42.200.159.37', 'timestamp': 1670344868.2705605, 'message': 'Dec 6 18:41:06 hqnl0246134 sshd[243779]: Failed password for invalid user teamspeak from 42.200.159.37 port 42304 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 18:41:08,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '42.200.159.37', 'timestamp': 1670344868.2709947, 'message': 'Dec 6 18:41:07 hqnl0246134 sshd[243779]: Disconnected from invalid user teamspeak 42.200.159.37 port 42304 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0211 seconds
WARNING [2022-12-06 18:41:09,512] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:41:09,537] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0326 seconds
INFO [2022-12-06 18:41:10,254] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:41:10,255] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:41:10,264] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:41:10,276] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 18:41:17,784] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:41:17,784] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:41:17,791] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:41:17,805] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 18:41:20,433] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:41:20,434] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:41:20,441] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:41:20,452] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 18:41:26,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344886.3063564, 'message': 'Dec 6 18:41:25 hqnl0246134 sshd[243807]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 18:41:26,361] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344886.3066103, 'message': 'Dec 6 18:41:25 hqnl0246134 sshd[243807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 18:41:28,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344888.3087134, 'message': 'Dec 6 18:41:27 hqnl0246134 sshd[243807]: Failed password for root from 61.177.173.18 port 16853 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 18:41:30,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344890.309886, 'message': 'Dec 6 18:41:29 hqnl0246134 sshd[243807]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 18:41:32,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344892.313602, 'message': 'Dec 6 18:41:31 hqnl0246134 sshd[243807]: Failed password for root from 61.177.173.18 port 16853 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 18:41:32,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344892.3139517, 'message': 'Dec 6 18:41:31 hqnl0246134 sshd[243807]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:41:34,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344894.3145618, 'message': 'Dec 6 18:41:33 hqnl0246134 sshd[243807]: Failed password for root from 61.177.173.18 port 16853 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:41:46,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.196.76', 'timestamp': 1670344906.3368967, 'message': 'Dec 6 18:41:45 hqnl0246134 sshd[243846]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.196.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 18:41:46,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.196.76', 'timestamp': 1670344906.3374517, 'message': 'Dec 6 18:41:45 hqnl0246134 sshd[243846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.196.76 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 18:41:48,055] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:41:48,056] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:41:50,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '137.184.196.76', 'timestamp': 1670344910.33833, 'message': 'Dec 6 18:41:48 hqnl0246134 sshd[243846]: Failed password for root from 137.184.196.76 port 32926 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 18:41:53,806] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 18:41:56,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344916.3452983, 'message': 'Dec 6 18:41:54 hqnl0246134 sshd[243850]: Invalid user user from 200.137.5.196 port 41431', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 18:41:56,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344916.345801, 'message': 'Dec 6 18:41:54 hqnl0246134 sshd[243850]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.137.5.196 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:41:56,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344916.346051, 'message': 'Dec 6 18:41:54 hqnl0246134 sshd[243850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.137.5.196 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:41:58,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344918.348992, 'message': 'Dec 6 18:41:56 hqnl0246134 sshd[243850]: Failed password for invalid user user from 200.137.5.196 port 41431 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 18:42:00,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.137.5.196', 'timestamp': 1670344920.3504004, 'message': 'Dec 6 18:41:58 hqnl0246134 sshd[243850]: Disconnected from invalid user user 200.137.5.196 port 41431 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:42:08,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344928.3597527, 'message': 'Dec 6 18:42:08 hqnl0246134 sshd[243873]: Invalid user automation from 210.16.201.188 port 41958', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0537 seconds
INFO [2022-12-06 18:42:08,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344928.3611095, 'message': 'Dec 6 18:42:08 hqnl0246134 sshd[243873]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.16.201.188 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0417 seconds
INFO [2022-12-06 18:42:08,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344928.3638847, 'message': 'Dec 6 18:42:08 hqnl0246134 sshd[243873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.16.201.188 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0381 seconds
WARNING [2022-12-06 18:42:09,521] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:42:09,565] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0560 seconds
INFO [2022-12-06 18:42:12,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344932.363307, 'message': 'Dec 6 18:42:10 hqnl0246134 sshd[243873]: Failed password for invalid user automation from 210.16.201.188 port 41958 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:42:12,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.16.201.188', 'timestamp': 1670344932.3637712, 'message': 'Dec 6 18:42:12 hqnl0246134 sshd[243873]: Disconnected from invalid user automation 210.16.201.188 port 41958 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:42:16,392] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344936.3664901, 'message': 'Dec 6 18:42:15 hqnl0246134 sshd[243883]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 18:42:16,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344936.3667636, 'message': 'Dec 6 18:42:15 hqnl0246134 sshd[243883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 18:42:17,937] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:42:17,938] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:42:17,947] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:42:17,961] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-06 18:42:18,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344938.3685434, 'message': 'Dec 6 18:42:17 hqnl0246134 sshd[243883]: Failed password for root from 61.177.173.18 port 54034 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 18:42:20,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344940.3697407, 'message': 'Dec 6 18:42:19 hqnl0246134 sshd[243883]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 18:42:20,706] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:42:20,707] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:42:20,714] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:42:20,735] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0277 seconds
INFO [2022-12-06 18:42:22,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344942.3725538, 'message': 'Dec 6 18:42:21 hqnl0246134 sshd[243883]: Failed password for root from 61.177.173.18 port 54034 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 18:42:24,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344944.37427, 'message': 'Dec 6 18:42:23 hqnl0246134 sshd[243883]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0558 seconds
INFO [2022-12-06 18:42:26,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344946.3750517, 'message': 'Dec 6 18:42:25 hqnl0246134 sshd[243883]: Failed password for root from 61.177.173.18 port 54034 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 18:42:42,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.71.46.226', 'timestamp': 1670344962.3944845, 'message': 'Dec 6 18:42:42 hqnl0246134 sshd[243909]: Invalid user xu from 13.71.46.226 port 1024', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 18:42:42,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '13.71.46.226', 'timestamp': 1670344962.3948495, 'message': 'Dec 6 18:42:42 hqnl0246134 sshd[243909]: pam_imunify(sshd:auth): [IM360_RBL] The IP 13.71.46.226 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:42:42,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '13.71.46.226', 'timestamp': 1670344962.3950188, 'message': 'Dec 6 18:42:42 hqnl0246134 sshd[243909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.46.226 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:42:44,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.71.46.226', 'timestamp': 1670344964.397346, 'message': 'Dec 6 18:42:43 hqnl0246134 sshd[243909]: Failed password for invalid user xu from 13.71.46.226 port 1024 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 18:42:46,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.71.46.226', 'timestamp': 1670344966.398408, 'message': 'Dec 6 18:42:44 hqnl0246134 sshd[243909]: Disconnected from invalid user xu 13.71.46.226 port 1024 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0389 seconds
INFO [2022-12-06 18:42:47,600] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:42:47,601] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:42:47,609] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:42:47,622] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
WARNING [2022-12-06 18:42:48,060] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:42:48,061] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:42:48,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '187.102.118.254', 'timestamp': 1670344968.4013066, 'message': 'Dec 6 18:42:48 hqnl0246134 sshd[243916]: Invalid user centor from 187.102.118.254 port 35028', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 18:42:48,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '187.102.118.254', 'timestamp': 1670344968.401618, 'message': 'Dec 6 18:42:48 hqnl0246134 sshd[243916]: pam_imunify(sshd:auth): [IM360_RBL] The IP 187.102.118.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:42:48,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '187.102.118.254', 'timestamp': 1670344968.4017909, 'message': 'Dec 6 18:42:48 hqnl0246134 sshd[243916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.102.118.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:42:50,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '187.102.118.254', 'timestamp': 1670344970.4032636, 'message': 'Dec 6 18:42:49 hqnl0246134 sshd[243916]: Failed password for invalid user centor from 187.102.118.254 port 35028 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 18:42:52,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '187.102.118.254', 'timestamp': 1670344972.4069479, 'message': 'Dec 6 18:42:50 hqnl0246134 sshd[243916]: Disconnected from invalid user centor 187.102.118.254 port 35028 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0417 seconds
INFO [2022-12-06 18:43:06,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344986.4236145, 'message': 'Dec 6 18:43:04 hqnl0246134 sshd[243932]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 18:43:06,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344986.4240918, 'message': 'Dec 6 18:43:04 hqnl0246134 sshd[243932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:43:08,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344988.4246926, 'message': 'Dec 6 18:43:07 hqnl0246134 sshd[243932]: Failed password for root from 61.177.173.18 port 33450 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
WARNING [2022-12-06 18:43:09,520] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:43:09,550] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0372 seconds
INFO [2022-12-06 18:43:10,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344990.4288223, 'message': 'Dec 6 18:43:09 hqnl0246134 sshd[243932]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 18:43:12,448] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344992.429348, 'message': 'Dec 6 18:43:11 hqnl0246134 sshd[243932]: Failed password for root from 61.177.173.18 port 33450 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 18:43:14,463] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344994.4323878, 'message': 'Dec 6 18:43:13 hqnl0246134 sshd[243932]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 18:43:16,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670344996.4343748, 'message': 'Dec 6 18:43:15 hqnl0246134 sshd[243932]: Failed password for root from 61.177.173.18 port 33450 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:43:17,974] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:43:17,974] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:43:17,981] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:43:17,994] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 18:43:20,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345000.4408402, 'message': 'Dec 6 18:43:19 hqnl0246134 sshd[243953]: Invalid user altair from 188.166.189.134 port 51936', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 18:43:20,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345000.4410713, 'message': 'Dec 6 18:43:19 hqnl0246134 sshd[243953]: pam_imunify(sshd:auth): [IM360_RBL] The IP 188.166.189.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 18:43:20,563] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:43:20,564] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 18:43:20,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345000.4488704, 'message': 'Dec 6 18:43:19 hqnl0246134 sshd[243953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.189.134 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0911 seconds
WARNING [2022-12-06 18:43:20,574] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:43:20,585] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 18:43:22,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345002.4416156, 'message': 'Dec 6 18:43:21 hqnl0246134 sshd[243953]: Failed password for invalid user altair from 188.166.189.134 port 51936 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 18:43:24,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345004.4446247, 'message': 'Dec 6 18:43:24 hqnl0246134 sshd[243953]: Disconnected from invalid user altair 188.166.189.134 port 51936 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 18:43:42,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.2.224.84', 'timestamp': 1670345022.4616635, 'message': 'Dec 6 18:43:40 hqnl0246134 sshd[243973]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.2.224.84 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 18:43:42,511] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.2.224.84', 'timestamp': 1670345022.4621804, 'message': 'Dec 6 18:43:40 hqnl0246134 sshd[243973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.2.224.84 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:43:44,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.2.224.84', 'timestamp': 1670345024.4640756, 'message': 'Dec 6 18:43:43 hqnl0246134 sshd[243973]: Failed password for root from 61.2.224.84 port 42366 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-06 18:43:48,063] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:43:48,065] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:43:54,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345034.477608, 'message': 'Dec 6 18:43:53 hqnl0246134 sshd[243985]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 18:43:54,520] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345034.4782772, 'message': 'Dec 6 18:43:53 hqnl0246134 sshd[243985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:43:56,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345036.4839437, 'message': 'Dec 6 18:43:55 hqnl0246134 sshd[243985]: Failed password for root from 61.177.173.18 port 57835 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:43:56,520] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345036.4842556, 'message': 'Dec 6 18:43:56 hqnl0246134 sshd[243985]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:43:58,504] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345038.4863503, 'message': 'Dec 6 18:43:57 hqnl0246134 sshd[243985]: Failed password for root from 61.177.173.18 port 57835 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 18:43:58,520] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345038.4865313, 'message': 'Dec 6 18:43:58 hqnl0246134 sshd[243985]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 18:44:02,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345042.509794, 'message': 'Dec 6 18:44:00 hqnl0246134 sshd[243985]: Failed password for root from 61.177.173.18 port 57835 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:44:05,418] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:44:05,418] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:44:05,429] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:44:05,445] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0262 seconds
WARNING [2022-12-06 18:44:09,532] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:44:09,563] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0471 seconds
INFO [2022-12-06 18:44:10,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '42.200.159.37', 'timestamp': 1670345050.5551324, 'message': 'Dec 6 18:44:09 hqnl0246134 sshd[244009]: Invalid user john from 42.200.159.37 port 59970', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 18:44:10,607] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '42.200.159.37', 'timestamp': 1670345050.5553544, 'message': 'Dec 6 18:44:09 hqnl0246134 sshd[244009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.159.37 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 18:44:12,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '42.200.159.37', 'timestamp': 1670345052.5598254, 'message': 'Dec 6 18:44:11 hqnl0246134 sshd[244009]: Failed password for invalid user john from 42.200.159.37 port 59970 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 18:44:14,583] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '42.200.159.37', 'timestamp': 1670345054.56556, 'message': 'Dec 6 18:44:13 hqnl0246134 sshd[244009]: Disconnected from invalid user john 42.200.159.37 port 59970 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:44:17,924] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:44:17,925] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:44:17,934] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:44:17,946] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 18:44:18,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345058.5690231, 'message': 'Dec 6 18:44:17 hqnl0246134 sshd[244017]: Invalid user server from 217.182.204.243 port 39216', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 18:44:18,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345058.5692396, 'message': 'Dec 6 18:44:17 hqnl0246134 sshd[244017]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.182.204.243 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 18:44:18,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345058.569377, 'message': 'Dec 6 18:44:17 hqnl0246134 sshd[244017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.204.243 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 18:44:20,525] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:44:20,525] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:44:20,531] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:44:20,542] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 18:44:20,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345060.572501, 'message': 'Dec 6 18:44:19 hqnl0246134 sshd[244017]: Failed password for invalid user server from 217.182.204.243 port 39216 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 18:44:20,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345060.5726984, 'message': 'Dec 6 18:44:19 hqnl0246134 sshd[244017]: Disconnected from invalid user server 217.182.204.243 port 39216 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 18:44:24,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345064.5821059, 'message': 'Dec 6 18:44:22 hqnl0246134 sshd[244028]: pam_imunify(sshd:auth): [IM360_RBL] The IP 84.53.228.192 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:44:24,624] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345064.5823395, 'message': 'Dec 6 18:44:22 hqnl0246134 sshd[244028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.53.228.192 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 18:44:26,617] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345066.5968072, 'message': 'Dec 6 18:44:25 hqnl0246134 sshd[244028]: Failed password for root from 84.53.228.192 port 38668 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 18:44:44,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '110.141.212.12', 'timestamp': 1670345084.6384351, 'message': 'Dec 6 18:44:42 hqnl0246134 sshd[244034]: pam_imunify(sshd:auth): [IM360_RBL] The IP 110.141.212.12 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0524 seconds
INFO [2022-12-06 18:44:44,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345084.639186, 'message': 'Dec 6 18:44:43 hqnl0246134 sshd[244044]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0523 seconds
INFO [2022-12-06 18:44:44,696] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '187.102.118.254', 'timestamp': 1670345084.6417086, 'message': 'Dec 6 18:44:43 hqnl0246134 sshd[244046]: pam_imunify(sshd:auth): [IM360_RBL] The IP 187.102.118.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0523 seconds
INFO [2022-12-06 18:44:44,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '110.141.212.12', 'timestamp': 1670345084.6390297, 'message': 'Dec 6 18:44:42 hqnl0246134 sshd[244034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.141.212.12 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0463 seconds
INFO [2022-12-06 18:44:44,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345084.6415882, 'message': 'Dec 6 18:44:43 hqnl0246134 sshd[244044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0464 seconds
INFO [2022-12-06 18:44:44,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '187.102.118.254', 'timestamp': 1670345084.6418855, 'message': 'Dec 6 18:44:43 hqnl0246134 sshd[244046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.102.118.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0458 seconds
INFO [2022-12-06 18:44:44,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '110.141.212.12', 'timestamp': 1670345084.6419914, 'message': 'Dec 6 18:44:44 hqnl0246134 sshd[244034]: Failed password for root from 110.141.212.12 port 38444 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 18:44:46,673] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345086.641764, 'message': 'Dec 6 18:44:44 hqnl0246134 sshd[244044]: Failed password for root from 61.177.173.18 port 39979 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 18:44:46,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '187.102.118.254', 'timestamp': 1670345086.6420095, 'message': 'Dec 6 18:44:45 hqnl0246134 sshd[244046]: Failed password for root from 187.102.118.254 port 50734 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 18:44:46,693] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345086.6424575, 'message': 'Dec 6 18:44:45 hqnl0246134 sshd[244044]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 18:44:48,069] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:44:48,070] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:44:48,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345088.645511, 'message': 'Dec 6 18:44:48 hqnl0246134 sshd[244044]: Failed password for root from 61.177.173.18 port 39979 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:44:50,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345090.6470792, 'message': 'Dec 6 18:44:49 hqnl0246134 sshd[244044]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:44:52,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345092.6481633, 'message': 'Dec 6 18:44:51 hqnl0246134 sshd[244044]: Failed password for root from 61.177.173.18 port 39979 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 18:45:09,532] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:45:09,563] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0428 seconds
INFO [2022-12-06 18:45:14,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.137.5.196', 'timestamp': 1670345114.6941292, 'message': 'Dec 6 18:45:13 hqnl0246134 sshd[244093]: Invalid user user21 from 200.137.5.196 port 35929', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 18:45:14,735] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.137.5.196', 'timestamp': 1670345114.695375, 'message': 'Dec 6 18:45:13 hqnl0246134 sshd[244093]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.137.5.196 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:45:14,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.137.5.196', 'timestamp': 1670345114.6955016, 'message': 'Dec 6 18:45:13 hqnl0246134 sshd[244093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.137.5.196 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:45:16,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.137.5.196', 'timestamp': 1670345116.7006018, 'message': 'Dec 6 18:45:15 hqnl0246134 sshd[244093]: Failed password for invalid user user21 from 200.137.5.196 port 35929 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:45:16,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.137.5.196', 'timestamp': 1670345116.7007775, 'message': 'Dec 6 18:45:15 hqnl0246134 sshd[244093]: Disconnected from invalid user user21 200.137.5.196 port 35929 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:45:18,111] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:45:18,112] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:45:18,124] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:45:18,145] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0323 seconds
INFO [2022-12-06 18:45:18,435] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:45:18,435] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:45:18,442] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:45:18,453] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 18:45:20,849] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:45:20,850] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:45:20,872] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:45:20,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '13.71.46.226', 'timestamp': 1670345120.7044086, 'message': 'Dec 6 18:45:19 hqnl0246134 sshd[244103]: pam_imunify(sshd:auth): [IM360_RBL] The IP 13.71.46.226 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1733 seconds
INFO [2022-12-06 18:45:20,903] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0519 seconds
INFO [2022-12-06 18:45:20,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '13.71.46.226', 'timestamp': 1670345120.7046654, 'message': 'Dec 6 18:45:19 hqnl0246134 sshd[244103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.46.226 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 18:45:20,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '13.71.46.226', 'timestamp': 1670345120.704849, 'message': 'Dec 6 18:45:20 hqnl0246134 sshd[244103]: Failed password for root from 13.71.46.226 port 1024 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:45:32,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345132.7423227, 'message': 'Dec 6 18:45:30 hqnl0246134 sshd[244121]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 18:45:32,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345132.7427428, 'message': 'Dec 6 18:45:30 hqnl0246134 sshd[244121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:45:32,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345132.7429159, 'message': 'Dec 6 18:45:32 hqnl0246134 sshd[244121]: Failed password for root from 61.177.173.18 port 11497 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 18:45:34,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345134.7436259, 'message': 'Dec 6 18:45:33 hqnl0246134 sshd[244121]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 18:45:36,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.16.201.188', 'timestamp': 1670345136.7459936, 'message': 'Dec 6 18:45:35 hqnl0246134 sshd[244145]: Invalid user css from 210.16.201.188 port 59592', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 18:45:36,782] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345136.7476318, 'message': 'Dec 6 18:45:35 hqnl0246134 sshd[244121]: Failed password for root from 61.177.173.18 port 11497 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 18:45:36,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.16.201.188', 'timestamp': 1670345136.7462504, 'message': 'Dec 6 18:45:35 hqnl0246134 sshd[244145]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.16.201.188 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:45:36,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.16.201.188', 'timestamp': 1670345136.7475002, 'message': 'Dec 6 18:45:35 hqnl0246134 sshd[244145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.16.201.188 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 18:45:38,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.16.201.188', 'timestamp': 1670345138.7486432, 'message': 'Dec 6 18:45:37 hqnl0246134 sshd[244145]: Failed password for invalid user css from 210.16.201.188 port 59592 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 18:45:38,782] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345138.7490225, 'message': 'Dec 6 18:45:37 hqnl0246134 sshd[244121]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 18:45:38,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.16.201.188', 'timestamp': 1670345138.7491632, 'message': 'Dec 6 18:45:37 hqnl0246134 sshd[244145]: Disconnected from invalid user css 210.16.201.188 port 59592 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 18:45:40,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345140.7521126, 'message': 'Dec 6 18:45:39 hqnl0246134 sshd[244121]: Failed password for root from 61.177.173.18 port 11497 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
WARNING [2022-12-06 18:45:48,080] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:45:48,081] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 18:46:09,538] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:46:09,564] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0355 seconds
INFO [2022-12-06 18:46:09,880] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 18:46:09,949] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 18:46:09,949] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 18:46:09,950] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 18:46:09,950] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 18:46:09,950] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 18:46:09,958] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 18:46:09,974] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0237 seconds
WARNING [2022-12-06 18:46:09,981] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 18:46:09,983] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:46:10,001] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0328 seconds
INFO [2022-12-06 18:46:10,002] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0311 seconds
INFO [2022-12-06 18:46:17,701] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:46:17,702] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:46:17,711] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:46:17,722] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 18:46:20,337] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:46:20,337] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:46:20,345] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:46:20,357] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 18:46:20,827] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345180.807014, 'message': 'Dec 6 18:46:19 hqnl0246134 sshd[244189]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 18:46:20,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345180.8072236, 'message': 'Dec 6 18:46:19 hqnl0246134 sshd[244189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 18:46:22,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345182.812504, 'message': 'Dec 6 18:46:21 hqnl0246134 sshd[244189]: Failed password for root from 61.177.173.18 port 43820 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 18:46:24,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345184.8176236, 'message': 'Dec 6 18:46:23 hqnl0246134 sshd[244189]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:46:26,855] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345186.8230124, 'message': 'Dec 6 18:46:25 hqnl0246134 sshd[244189]: Failed password for root from 61.177.173.18 port 43820 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 18:46:26,856] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345186.823267, 'message': 'Dec 6 18:46:25 hqnl0246134 sshd[244195]: Invalid user VM from 62.122.171.202 port 37692', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 18:46:26,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345186.8236628, 'message': 'Dec 6 18:46:25 hqnl0246134 sshd[244189]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 18:46:26,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345186.8234155, 'message': 'Dec 6 18:46:25 hqnl0246134 sshd[244195]: pam_imunify(sshd:auth): [IM360_RBL] The IP 62.122.171.202 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 18:46:26,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345186.8235552, 'message': 'Dec 6 18:46:25 hqnl0246134 sshd[244195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.171.202 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:46:28,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345188.828755, 'message': 'Dec 6 18:46:26 hqnl0246134 sshd[244195]: Failed password for invalid user VM from 62.122.171.202 port 37692 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 18:46:28,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345188.8290055, 'message': 'Dec 6 18:46:27 hqnl0246134 sshd[244189]: Failed password for root from 61.177.173.18 port 43820 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 18:46:28,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345188.8291166, 'message': 'Dec 6 18:46:27 hqnl0246134 sshd[244195]: Disconnected from invalid user VM 62.122.171.202 port 37692 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:46:29,809] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:46:29,809] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:46:29,818] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:46:29,829] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 18:46:34,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '187.102.118.254', 'timestamp': 1670345194.8496833, 'message': 'Dec 6 18:46:34 hqnl0246134 sshd[244204]: pam_imunify(sshd:auth): [IM360_RBL] The IP 187.102.118.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 18:46:34,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '187.102.118.254', 'timestamp': 1670345194.8501766, 'message': 'Dec 6 18:46:34 hqnl0246134 sshd[244204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.102.118.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:46:36,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '187.102.118.254', 'timestamp': 1670345196.854325, 'message': 'Dec 6 18:46:36 hqnl0246134 sshd[244204]: Failed password for root from 187.102.118.254 port 38206 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 18:46:40,082] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 18:46:40,084] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 18:46:40,086] im360.plugins.client360: Waiting 3 minutes before retry...
WARNING [2022-12-06 18:46:48,089] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:46:48,090] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:47:00,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.219.33.178', 'timestamp': 1670345220.8964887, 'message': 'Dec 6 18:47:00 hqnl0246134 sshd[244214]: Invalid user user02 from 102.219.33.178 port 36754', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 18:47:00,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '102.219.33.178', 'timestamp': 1670345220.8972588, 'message': 'Dec 6 18:47:00 hqnl0246134 sshd[244214]: pam_imunify(sshd:auth): [IM360_RBL] The IP 102.219.33.178 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:47:00,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '102.219.33.178', 'timestamp': 1670345220.8974924, 'message': 'Dec 6 18:47:00 hqnl0246134 sshd[244214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.219.33.178 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:47:02,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '42.200.159.37', 'timestamp': 1670345222.9048417, 'message': 'Dec 6 18:47:01 hqnl0246134 sshd[244229]: Invalid user coder from 42.200.159.37 port 49380', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 18:47:02,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.219.33.178', 'timestamp': 1670345222.9052844, 'message': 'Dec 6 18:47:02 hqnl0246134 sshd[244214]: Failed password for invalid user user02 from 102.219.33.178 port 36754 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 18:47:02,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '42.200.159.37', 'timestamp': 1670345222.9050539, 'message': 'Dec 6 18:47:01 hqnl0246134 sshd[244229]: pam_imunify(sshd:auth): [IM360_RBL] The IP 42.200.159.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 18:47:02,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '42.200.159.37', 'timestamp': 1670345222.9051785, 'message': 'Dec 6 18:47:01 hqnl0246134 sshd[244229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.159.37 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:47:04,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345224.908579, 'message': 'Dec 6 18:47:03 hqnl0246134 sshd[244238]: Invalid user smbuser from 46.101.179.127 port 55210', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0663 seconds
INFO [2022-12-06 18:47:04,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.219.33.178', 'timestamp': 1670345224.9089358, 'message': 'Dec 6 18:47:03 hqnl0246134 sshd[244214]: Disconnected from invalid user user02 102.219.33.178 port 36754 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0667 seconds
INFO [2022-12-06 18:47:04,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '42.200.159.37', 'timestamp': 1670345224.9093263, 'message': 'Dec 6 18:47:03 hqnl0246134 sshd[244229]: Failed password for invalid user coder from 42.200.159.37 port 49380 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0662 seconds
INFO [2022-12-06 18:47:04,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345224.9095376, 'message': 'Dec 6 18:47:04 hqnl0246134 sshd[244240]: Invalid user oracle from 159.65.235.114 port 38432', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0657 seconds
INFO [2022-12-06 18:47:05,018] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345224.9091349, 'message': 'Dec 6 18:47:03 hqnl0246134 sshd[244238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.179.127 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0408 seconds
INFO [2022-12-06 18:47:05,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345224.9097254, 'message': 'Dec 6 18:47:04 hqnl0246134 sshd[244240]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.65.235.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0393 seconds
INFO [2022-12-06 18:47:05,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '42.200.159.37', 'timestamp': 1670345224.9101264, 'message': 'Dec 6 18:47:04 hqnl0246134 sshd[244229]: Disconnected from invalid user coder 42.200.159.37 port 49380 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 18:47:05,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345224.9099221, 'message': 'Dec 6 18:47:04 hqnl0246134 sshd[244240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.235.114 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 18:47:06,945] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345226.9107826, 'message': 'Dec 6 18:47:05 hqnl0246134 sshd[244238]: Failed password for invalid user smbuser from 46.101.179.127 port 55210 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 18:47:06,946] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345226.911181, 'message': 'Dec 6 18:47:06 hqnl0246134 sshd[244240]: Failed password for invalid user oracle from 159.65.235.114 port 38432 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 18:47:06,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345226.9110107, 'message': 'Dec 6 18:47:05 hqnl0246134 sshd[244238]: Disconnected from invalid user smbuser 46.101.179.127 port 55210 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:47:08,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345228.913998, 'message': 'Dec 6 18:47:07 hqnl0246134 sshd[244240]: Disconnected from invalid user oracle 159.65.235.114 port 38432 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 18:47:08,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345228.9143598, 'message': 'Dec 6 18:47:08 hqnl0246134 sshd[244243]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0387 seconds
INFO [2022-12-06 18:47:08,971] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345228.9145172, 'message': 'Dec 6 18:47:08 hqnl0246134 sshd[244243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-06 18:47:09,543] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:47:09,578] defence360agent.internals.the_sink: SensorIncidentList(<20 item(s)>) processed in 0.0446 seconds
INFO [2022-12-06 18:47:10,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345230.9138877, 'message': 'Dec 6 18:47:10 hqnl0246134 sshd[244243]: Failed password for root from 61.177.173.18 port 20584 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:47:10,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345230.914094, 'message': 'Dec 6 18:47:10 hqnl0246134 sshd[244243]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:47:12,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.217.58', 'timestamp': 1670345232.9167352, 'message': 'Dec 6 18:47:12 hqnl0246134 sshd[244255]: Invalid user benny from 178.128.217.58 port 48514', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 18:47:12,945] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345232.9170318, 'message': 'Dec 6 18:47:12 hqnl0246134 sshd[244243]: Failed password for root from 61.177.173.18 port 20584 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 18:47:14,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.217.58', 'timestamp': 1670345234.9181683, 'message': 'Dec 6 18:47:12 hqnl0246134 sshd[244255]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.217.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0437 seconds
INFO [2022-12-06 18:47:14,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345234.9184573, 'message': 'Dec 6 18:47:13 hqnl0246134 sshd[244243]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0448 seconds
INFO [2022-12-06 18:47:14,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345234.9185646, 'message': 'Dec 6 18:47:14 hqnl0246134 sshd[244260]: Invalid user will from 217.182.204.243 port 33244', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0447 seconds
INFO [2022-12-06 18:47:14,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.217.58', 'timestamp': 1670345234.9183445, 'message': 'Dec 6 18:47:12 hqnl0246134 sshd[244255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.58 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 18:47:15,001] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345234.9188292, 'message': 'Dec 6 18:47:14 hqnl0246134 sshd[244260]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.182.204.243 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 18:47:15,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.217.58', 'timestamp': 1670345234.9187217, 'message': 'Dec 6 18:47:14 hqnl0246134 sshd[244255]: Failed password for invalid user benny from 178.128.217.58 port 48514 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0415 seconds
INFO [2022-12-06 18:47:15,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345234.9189453, 'message': 'Dec 6 18:47:14 hqnl0246134 sshd[244260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.204.243 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-06 18:47:16,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345236.9216661, 'message': 'Dec 6 18:47:15 hqnl0246134 sshd[244243]: Failed password for root from 61.177.173.18 port 20584 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0509 seconds
INFO [2022-12-06 18:47:16,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.217.58', 'timestamp': 1670345236.9220777, 'message': 'Dec 6 18:47:16 hqnl0246134 sshd[244255]: Disconnected from invalid user benny 178.128.217.58 port 48514 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0508 seconds
INFO [2022-12-06 18:47:16,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345236.9223087, 'message': 'Dec 6 18:47:16 hqnl0246134 sshd[244260]: Failed password for invalid user will from 217.182.204.243 port 33244 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0502 seconds
INFO [2022-12-06 18:47:18,108] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:47:18,109] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:47:18,117] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:47:18,128] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 18:47:18,943] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345238.9221485, 'message': 'Dec 6 18:47:18 hqnl0246134 sshd[244260]: Disconnected from invalid user will 217.182.204.243 port 33244 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 18:47:20,634] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:47:20,634] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:47:20,643] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:47:20,662] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0261 seconds
INFO [2022-12-06 18:47:34,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345254.9576905, 'message': 'Dec 6 18:47:34 hqnl0246134 sshd[244280]: Invalid user rohit from 167.172.187.120 port 41974', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 18:47:35,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345254.9585783, 'message': 'Dec 6 18:47:34 hqnl0246134 sshd[244280]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.187.120 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:47:35,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345254.9587786, 'message': 'Dec 6 18:47:34 hqnl0246134 sshd[244280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.187.120 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:47:36,990] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345256.9597223, 'message': 'Dec 6 18:47:36 hqnl0246134 sshd[244280]: Failed password for invalid user rohit from 167.172.187.120 port 41974 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 18:47:39,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345258.9629104, 'message': 'Dec 6 18:47:38 hqnl0246134 sshd[244280]: Disconnected from invalid user rohit 167.172.187.120 port 41974 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0441 seconds
INFO [2022-12-06 18:47:40,645] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:47:40,646] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:47:40,657] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:47:40,672] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0249 seconds
INFO [2022-12-06 18:47:43,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345262.9784036, 'message': 'Dec 6 18:47:42 hqnl0246134 sshd[244298]: Invalid user naresh from 137.184.196.76 port 33230', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0535 seconds
INFO [2022-12-06 18:47:43,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.71.46.226', 'timestamp': 1670345262.9795673, 'message': 'Dec 6 18:47:42 hqnl0246134 sshd[244296]: Invalid user kong from 13.71.46.226 port 1024', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0546 seconds
INFO [2022-12-06 18:47:43,076] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345262.9786913, 'message': 'Dec 6 18:47:42 hqnl0246134 sshd[244298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.196.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-06 18:47:43,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '13.71.46.226', 'timestamp': 1670345262.9797494, 'message': 'Dec 6 18:47:42 hqnl0246134 sshd[244296]: pam_imunify(sshd:auth): [IM360_RBL] The IP 13.71.46.226 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-06 18:47:43,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345262.978955, 'message': 'Dec 6 18:47:42 hqnl0246134 sshd[244298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.196.76 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 18:47:43,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '13.71.46.226', 'timestamp': 1670345262.9799466, 'message': 'Dec 6 18:47:42 hqnl0246134 sshd[244296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.46.226 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 18:47:45,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345264.9803505, 'message': 'Dec 6 18:47:44 hqnl0246134 sshd[244298]: Failed password for invalid user naresh from 137.184.196.76 port 33230 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1352 seconds
INFO [2022-12-06 18:47:45,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.71.46.226', 'timestamp': 1670345264.9805415, 'message': 'Dec 6 18:47:44 hqnl0246134 sshd[244296]: Failed password for invalid user kong from 13.71.46.226 port 1024 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1355 seconds
INFO [2022-12-06 18:47:47,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345266.9855165, 'message': 'Dec 6 18:47:45 hqnl0246134 sshd[244298]: Disconnected from invalid user naresh 137.184.196.76 port 33230 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 18:47:47,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '13.71.46.226', 'timestamp': 1670345266.9857202, 'message': 'Dec 6 18:47:46 hqnl0246134 sshd[244296]: Disconnected from invalid user kong 13.71.46.226 port 1024 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
WARNING [2022-12-06 18:47:48,095] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:47:48,096] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:47:59,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345279.007328, 'message': 'Dec 6 18:47:57 hqnl0246134 sshd[244304]: Invalid user pedro from 178.128.55.198 port 49344', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 18:47:59,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345279.009556, 'message': 'Dec 6 18:47:57 hqnl0246134 sshd[244306]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 18:47:59,073] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345279.00915, 'message': 'Dec 6 18:47:57 hqnl0246134 sshd[244304]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.55.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 18:47:59,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345279.0097876, 'message': 'Dec 6 18:47:57 hqnl0246134 sshd[244306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 18:47:59,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345279.0093634, 'message': 'Dec 6 18:47:57 hqnl0246134 sshd[244304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 18:48:01,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345281.0144508, 'message': 'Dec 6 18:47:59 hqnl0246134 sshd[244304]: Failed password for invalid user pedro from 178.128.55.198 port 49344 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 18:48:01,060] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345281.0147827, 'message': 'Dec 6 18:47:59 hqnl0246134 sshd[244306]: Failed password for root from 61.177.173.18 port 60467 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 18:48:01,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345281.0149899, 'message': 'Dec 6 18:48:00 hqnl0246134 sshd[244306]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 18:48:03,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345283.0168777, 'message': 'Dec 6 18:48:01 hqnl0246134 sshd[244304]: Disconnected from invalid user pedro 178.128.55.198 port 49344 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0607 seconds
INFO [2022-12-06 18:48:03,079] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345283.01713, 'message': 'Dec 6 18:48:01 hqnl0246134 sshd[244306]: Failed password for root from 61.177.173.18 port 60467 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0612 seconds
INFO [2022-12-06 18:48:03,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345283.0179305, 'message': 'Dec 6 18:48:02 hqnl0246134 sshd[244306]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 18:48:05,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345285.019854, 'message': 'Dec 6 18:48:04 hqnl0246134 sshd[244306]: Failed password for root from 61.177.173.18 port 60467 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0242 seconds
WARNING [2022-12-06 18:48:09,549] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:48:09,583] defence360agent.internals.the_sink: SensorIncidentList(<21 item(s)>) processed in 0.0451 seconds
INFO [2022-12-06 18:48:17,798] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:48:17,798] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:48:17,807] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:48:17,820] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 18:48:20,612] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:48:20,613] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:48:20,620] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:48:20,631] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 18:48:41,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670345321.069694, 'message': 'Dec 6 18:48:39 hqnl0246134 sshd[244340]: Invalid user test6 from 133.130.99.35 port 45600', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 18:48:41,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '133.130.99.35', 'timestamp': 1670345321.0702503, 'message': 'Dec 6 18:48:39 hqnl0246134 sshd[244340]: pam_imunify(sshd:auth): [IM360_RBL] The IP 133.130.99.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:48:41,129] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '133.130.99.35', 'timestamp': 1670345321.0704265, 'message': 'Dec 6 18:48:39 hqnl0246134 sshd[244340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.99.35 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 18:48:43,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670345323.0698285, 'message': 'Dec 6 18:48:41 hqnl0246134 sshd[244340]: Failed password for invalid user test6 from 133.130.99.35 port 45600 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:48:43,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670345323.070108, 'message': 'Dec 6 18:48:43 hqnl0246134 sshd[244340]: Disconnected from invalid user test6 133.130.99.35 port 45600 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:48:47,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345327.0761406, 'message': 'Dec 6 18:48:46 hqnl0246134 sshd[244352]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 18:48:47,110] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345327.0764031, 'message': 'Dec 6 18:48:46 hqnl0246134 sshd[244352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0161 seconds
WARNING [2022-12-06 18:48:48,099] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:48:48,099] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:48:49,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345329.0785875, 'message': 'Dec 6 18:48:48 hqnl0246134 sshd[244352]: Failed password for root from 61.177.173.18 port 32487 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:48:53,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345333.083973, 'message': 'Dec 6 18:48:51 hqnl0246134 sshd[244352]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 18:48:53,125] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345333.0842564, 'message': 'Dec 6 18:48:52 hqnl0246134 sshd[244352]: Failed password for root from 61.177.173.18 port 32487 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 18:48:55,151] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345335.0856962, 'message': 'Dec 6 18:48:53 hqnl0246134 sshd[244352]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0655 seconds
INFO [2022-12-06 18:48:55,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.174.137.15', 'timestamp': 1670345335.085893, 'message': 'Dec 6 18:48:53 hqnl0246134 sshd[244356]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.174.137.15 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0657 seconds
INFO [2022-12-06 18:48:55,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.174.137.15', 'timestamp': 1670345335.0860572, 'message': 'Dec 6 18:48:53 hqnl0246134 sshd[244356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.174.137.15 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 18:48:57,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345337.2429695, 'message': 'Dec 6 18:48:55 hqnl0246134 sshd[244352]: Failed password for root from 61.177.173.18 port 32487 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 18:48:57,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '189.174.137.15', 'timestamp': 1670345337.2431364, 'message': 'Dec 6 18:48:55 hqnl0246134 sshd[244356]: Failed password for root from 189.174.137.15 port 58652 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 18:48:58,707] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:48:58,708] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:48:58,715] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:48:58,726] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
WARNING [2022-12-06 18:49:09,550] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:49:09,577] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0356 seconds
INFO [2022-12-06 18:49:17,701] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:49:17,702] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:49:17,710] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:49:17,721] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 18:49:20,346] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:49:20,347] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:49:20,356] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:49:20,367] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 18:49:29,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345369.1455624, 'message': 'Dec 6 18:49:28 hqnl0246134 sshd[244418]: pam_imunify(sshd:auth): [IM360_RBL] The IP 60.49.207.252 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 18:49:29,189] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345369.146006, 'message': 'Dec 6 18:49:28 hqnl0246134 sshd[244418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.49.207.252 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:49:31,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345371.1494331, 'message': 'Dec 6 18:49:30 hqnl0246134 sshd[244418]: Failed password for root from 60.49.207.252 port 57749 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 18:49:37,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345377.162701, 'message': 'Dec 6 18:49:36 hqnl0246134 sshd[244422]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 18:49:37,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345377.1630695, 'message': 'Dec 6 18:49:36 hqnl0246134 sshd[244422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 18:49:39,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.66.116', 'timestamp': 1670345379.1620843, 'message': 'Dec 6 18:49:37 hqnl0246134 sshd[244424]: Invalid user customer from 164.92.66.116 port 51140', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0837 seconds
INFO [2022-12-06 18:49:39,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345379.1624718, 'message': 'Dec 6 18:49:37 hqnl0246134 sshd[244422]: Failed password for root from 61.177.173.18 port 10457 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0839 seconds
INFO [2022-12-06 18:49:39,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.92.66.116', 'timestamp': 1670345379.1626203, 'message': 'Dec 6 18:49:37 hqnl0246134 sshd[244424]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.92.66.116 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0577 seconds
INFO [2022-12-06 18:49:39,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345379.1629236, 'message': 'Dec 6 18:49:38 hqnl0246134 sshd[244422]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0580 seconds
INFO [2022-12-06 18:49:39,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.92.66.116', 'timestamp': 1670345379.1627686, 'message': 'Dec 6 18:49:37 hqnl0246134 sshd[244424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.116 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 18:49:41,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.66.116', 'timestamp': 1670345381.1647456, 'message': 'Dec 6 18:49:40 hqnl0246134 sshd[244424]: Failed password for invalid user customer from 164.92.66.116 port 51140 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:49:43,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345383.1658933, 'message': 'Dec 6 18:49:41 hqnl0246134 sshd[244422]: Failed password for root from 61.177.173.18 port 10457 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0540 seconds
INFO [2022-12-06 18:49:43,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.66.116', 'timestamp': 1670345383.1660962, 'message': 'Dec 6 18:49:41 hqnl0246134 sshd[244424]: Disconnected from invalid user customer 164.92.66.116 port 51140 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0555 seconds
INFO [2022-12-06 18:49:43,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345383.1662118, 'message': 'Dec 6 18:49:43 hqnl0246134 sshd[244422]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0360 seconds
INFO [2022-12-06 18:49:45,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345385.168692, 'message': 'Dec 6 18:49:43 hqnl0246134 sshd[244437]: Invalid user jimmy from 46.101.179.127 port 45412', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 18:49:45,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345385.169139, 'message': 'Dec 6 18:49:44 hqnl0246134 sshd[244422]: Failed password for root from 61.177.173.18 port 10457 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 18:49:45,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345385.1688771, 'message': 'Dec 6 18:49:43 hqnl0246134 sshd[244437]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.179.127 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:49:45,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345385.1690183, 'message': 'Dec 6 18:49:43 hqnl0246134 sshd[244437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.179.127 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 18:49:47,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345387.1727831, 'message': 'Dec 6 18:49:45 hqnl0246134 sshd[244437]: Failed password for invalid user jimmy from 46.101.179.127 port 45412 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 18:49:47,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.141.212.12', 'timestamp': 1670345387.1730034, 'message': 'Dec 6 18:49:46 hqnl0246134 sshd[244440]: Invalid user klaus from 110.141.212.12 port 42794', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 18:49:47,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '110.141.212.12', 'timestamp': 1670345387.1731172, 'message': 'Dec 6 18:49:46 hqnl0246134 sshd[244440]: pam_imunify(sshd:auth): [IM360_RBL] The IP 110.141.212.12 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 18:49:47,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '110.141.212.12', 'timestamp': 1670345387.1732652, 'message': 'Dec 6 18:49:46 hqnl0246134 sshd[244440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.141.212.12 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0229 seconds
WARNING [2022-12-06 18:49:48,105] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:49:48,106] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:49:49,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345389.1739924, 'message': 'Dec 6 18:49:47 hqnl0246134 sshd[244437]: Disconnected from invalid user jimmy 46.101.179.127 port 45412 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0432 seconds
INFO [2022-12-06 18:49:51,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.141.212.12', 'timestamp': 1670345391.176405, 'message': 'Dec 6 18:49:49 hqnl0246134 sshd[244440]: Failed password for invalid user klaus from 110.141.212.12 port 42794 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 18:49:51,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.141.212.12', 'timestamp': 1670345391.1773412, 'message': 'Dec 6 18:49:50 hqnl0246134 sshd[244440]: Disconnected from invalid user klaus 110.141.212.12 port 42794 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 18:49:56,713] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 18:49:56,782] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 18:49:56,783] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 18:49:56,783] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 18:49:56,784] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 18:49:56,784] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 18:49:56,803] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 18:49:56,842] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0559 seconds
WARNING [2022-12-06 18:49:56,855] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 18:49:56,860] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:49:56,896] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0649 seconds
INFO [2022-12-06 18:49:56,899] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0624 seconds
INFO [2022-12-06 18:50:07,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345407.187437, 'message': 'Dec 6 18:50:05 hqnl0246134 sshd[244465]: Invalid user ftpuser1 from 137.184.196.76 port 33404', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 18:50:07,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345407.1890097, 'message': 'Dec 6 18:50:06 hqnl0246134 sshd[244471]: Invalid user jennifer from 217.182.204.243 port 50310', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 18:50:07,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345407.1877067, 'message': 'Dec 6 18:50:05 hqnl0246134 sshd[244465]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.196.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0426 seconds
INFO [2022-12-06 18:50:07,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345407.1891437, 'message': 'Dec 6 18:50:06 hqnl0246134 sshd[244471]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.182.204.243 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0437 seconds
INFO [2022-12-06 18:50:07,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345407.1894007, 'message': 'Dec 6 18:50:06 hqnl0246134 sshd[244473]: Invalid user tidb from 167.172.187.120 port 57668', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0444 seconds
INFO [2022-12-06 18:50:07,321] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345407.188836, 'message': 'Dec 6 18:50:05 hqnl0246134 sshd[244465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.196.76 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0563 seconds
INFO [2022-12-06 18:50:07,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345407.1892734, 'message': 'Dec 6 18:50:06 hqnl0246134 sshd[244471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.204.243 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0557 seconds
INFO [2022-12-06 18:50:07,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345407.1896164, 'message': 'Dec 6 18:50:06 hqnl0246134 sshd[244473]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.187.120 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0553 seconds
INFO [2022-12-06 18:50:07,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345407.1899254, 'message': 'Dec 6 18:50:06 hqnl0246134 sshd[244467]: pam_imunify(sshd:auth): [IM360_RBL] The IP 188.166.189.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0555 seconds
INFO [2022-12-06 18:50:07,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '168.121.237.82', 'timestamp': 1670345407.1902895, 'message': 'Dec 6 18:50:06 hqnl0246134 sshd[244469]: pam_imunify(sshd:auth): [IM360_RBL] The IP 168.121.237.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 18:50:07,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345407.189772, 'message': 'Dec 6 18:50:06 hqnl0246134 sshd[244473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.187.120 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0416 seconds
INFO [2022-12-06 18:50:07,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345407.190127, 'message': 'Dec 6 18:50:06 hqnl0246134 sshd[244467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.189.134 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0414 seconds
INFO [2022-12-06 18:50:07,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.121.237.82', 'timestamp': 1670345407.1904352, 'message': 'Dec 6 18:50:06 hqnl0246134 sshd[244469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.237.82 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 18:50:09,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345409.1988704, 'message': 'Dec 6 18:50:08 hqnl0246134 sshd[244465]: Failed password for invalid user ftpuser1 from 137.184.196.76 port 33404 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0605 seconds
INFO [2022-12-06 18:50:09,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345409.1992521, 'message': 'Dec 6 18:50:08 hqnl0246134 sshd[244471]: Failed password for invalid user jennifer from 217.182.204.243 port 50310 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0611 seconds
INFO [2022-12-06 18:50:09,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345409.1993978, 'message': 'Dec 6 18:50:08 hqnl0246134 sshd[244473]: Failed password for invalid user tidb from 167.172.187.120 port 57668 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0610 seconds
INFO [2022-12-06 18:50:09,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345409.1995568, 'message': 'Dec 6 18:50:08 hqnl0246134 sshd[244467]: Failed password for root from 188.166.189.134 port 48638 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0603 seconds
INFO [2022-12-06 18:50:09,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.204.243', 'timestamp': 1670345409.1996717, 'message': 'Dec 6 18:50:08 hqnl0246134 sshd[244471]: Disconnected from invalid user jennifer 217.182.204.243 port 50310 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 18:50:09,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '168.121.237.82', 'timestamp': 1670345409.1997926, 'message': 'Dec 6 18:50:08 hqnl0246134 sshd[244469]: Failed password for root from 168.121.237.82 port 35008 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
WARNING [2022-12-06 18:50:09,558] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:50:09,594] defence360agent.internals.the_sink: SensorIncidentList(<30 item(s)>) processed in 0.0459 seconds
INFO [2022-12-06 18:50:11,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345411.1927207, 'message': 'Dec 6 18:50:09 hqnl0246134 sshd[244465]: Disconnected from invalid user ftpuser1 137.184.196.76 port 33404 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-06 18:50:11,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345411.1930876, 'message': 'Dec 6 18:50:10 hqnl0246134 sshd[244473]: Disconnected from invalid user tidb 167.172.187.120 port 57668 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 18:50:11,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345411.193227, 'message': 'Dec 6 18:50:10 hqnl0246134 sshd[244490]: Invalid user testuser2 from 164.92.157.100 port 34426', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0490 seconds
INFO [2022-12-06 18:50:11,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345411.1933625, 'message': 'Dec 6 18:50:11 hqnl0246134 sshd[244490]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.92.157.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 18:50:11,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345411.1934688, 'message': 'Dec 6 18:50:11 hqnl0246134 sshd[244490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.157.100 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:50:11,383] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:50:11,383] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:50:11,393] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:50:11,406] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-06 18:50:13,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345413.19346, 'message': 'Dec 6 18:50:13 hqnl0246134 sshd[244490]: Failed password for invalid user testuser2 from 164.92.157.100 port 34426 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 18:50:15,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345415.196032, 'message': 'Dec 6 18:50:14 hqnl0246134 sshd[244490]: Disconnected from invalid user testuser2 164.92.157.100 port 34426 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 18:50:18,378] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:50:18,379] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:50:18,390] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:50:18,403] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0234 seconds
INFO [2022-12-06 18:50:21,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345421.2029765, 'message': 'Dec 6 18:50:19 hqnl0246134 sshd[244510]: Invalid user tuxedo from 68.183.142.49 port 36264', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0644 seconds
INFO [2022-12-06 18:50:21,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345421.2033668, 'message': 'Dec 6 18:50:19 hqnl0246134 sshd[244510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.142.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0586 seconds
INFO [2022-12-06 18:50:21,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345421.203586, 'message': 'Dec 6 18:50:19 hqnl0246134 sshd[244510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.142.49 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0634 seconds
INFO [2022-12-06 18:50:22,462] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:50:22,463] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:50:22,474] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:50:22,485] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-06 18:50:23,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345423.2042844, 'message': 'Dec 6 18:50:21 hqnl0246134 sshd[244510]: Failed password for invalid user tuxedo from 68.183.142.49 port 36264 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:50:23,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345423.2044759, 'message': 'Dec 6 18:50:21 hqnl0246134 sshd[244510]: Disconnected from invalid user tuxedo 68.183.142.49 port 36264 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 18:50:26,912] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 18:50:26,913] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 18:50:26,913] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 18:50:27,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345427.2087803, 'message': 'Dec 6 18:50:25 hqnl0246134 sshd[244520]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 18:50:27,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345427.2091775, 'message': 'Dec 6 18:50:25 hqnl0246134 sshd[244520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 18:50:29,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345429.2103868, 'message': 'Dec 6 18:50:27 hqnl0246134 sshd[244520]: Failed password for root from 61.177.173.18 port 37618 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:50:31,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345431.213197, 'message': 'Dec 6 18:50:29 hqnl0246134 sshd[244520]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 18:50:33,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345433.2148633, 'message': 'Dec 6 18:50:32 hqnl0246134 sshd[244520]: Failed password for root from 61.177.173.18 port 37618 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:50:35,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345435.2180402, 'message': 'Dec 6 18:50:34 hqnl0246134 sshd[244520]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:50:37,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345437.221269, 'message': 'Dec 6 18:50:36 hqnl0246134 sshd[244520]: Failed password for root from 61.177.173.18 port 37618 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0235 seconds
WARNING [2022-12-06 18:50:48,119] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:50:48,120] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:50:53,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345453.2424066, 'message': 'Dec 6 18:50:52 hqnl0246134 sshd[244534]: Invalid user jane from 178.128.55.198 port 60444', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 18:50:53,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345453.2428987, 'message': 'Dec 6 18:50:52 hqnl0246134 sshd[244534]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.55.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 18:50:53,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345453.2490194, 'message': 'Dec 6 18:50:52 hqnl0246134 sshd[244534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:50:55,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345455.2447176, 'message': 'Dec 6 18:50:54 hqnl0246134 sshd[244536]: Invalid user git from 62.122.171.202 port 37898', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 18:50:55,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345455.2453845, 'message': 'Dec 6 18:50:54 hqnl0246134 sshd[244534]: Failed password for invalid user jane from 178.128.55.198 port 60444 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 18:50:55,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345455.2450264, 'message': 'Dec 6 18:50:54 hqnl0246134 sshd[244536]: pam_imunify(sshd:auth): [IM360_RBL] The IP 62.122.171.202 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 18:50:55,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345455.2452052, 'message': 'Dec 6 18:50:54 hqnl0246134 sshd[244536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.171.202 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 18:50:57,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345457.2460387, 'message': 'Dec 6 18:50:56 hqnl0246134 sshd[244536]: Failed password for invalid user git from 62.122.171.202 port 37898 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 18:50:57,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345457.2463315, 'message': 'Dec 6 18:50:56 hqnl0246134 sshd[244534]: Disconnected from invalid user jane 178.128.55.198 port 60444 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 18:50:57,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345457.2462196, 'message': 'Dec 6 18:50:56 hqnl0246134 sshd[244536]: Disconnected from invalid user git 62.122.171.202 port 37898 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-06 18:51:09,570] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:51:09,596] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0350 seconds
INFO [2022-12-06 18:51:13,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345473.2704039, 'message': 'Dec 6 18:51:13 hqnl0246134 sshd[244554]: pam_imunify(sshd:auth): [IM360_RBL] The IP 84.53.228.192 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:51:13,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345473.2722378, 'message': 'Dec 6 18:51:13 hqnl0246134 sshd[244554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.53.228.192 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:51:15,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345475.273043, 'message': 'Dec 6 18:51:14 hqnl0246134 sshd[244556]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 18:51:15,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345475.273413, 'message': 'Dec 6 18:51:14 hqnl0246134 sshd[244554]: Failed password for root from 84.53.228.192 port 54214 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 18:51:15,328] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345475.273253, 'message': 'Dec 6 18:51:14 hqnl0246134 sshd[244556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 18:51:17,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345477.276342, 'message': 'Dec 6 18:51:16 hqnl0246134 sshd[244556]: Failed password for root from 61.177.173.18 port 10638 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 18:51:17,711] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:51:17,711] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:51:17,722] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:51:17,734] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 18:51:19,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345479.2795942, 'message': 'Dec 6 18:51:18 hqnl0246134 sshd[244556]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 18:51:19,638] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:51:19,639] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:51:19,646] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:51:19,659] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 18:51:21,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345481.281922, 'message': 'Dec 6 18:51:20 hqnl0246134 sshd[244556]: Failed password for root from 61.177.173.18 port 10638 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 18:51:21,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345481.2821646, 'message': 'Dec 6 18:51:20 hqnl0246134 sshd[244556]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 18:51:22,242] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:51:22,243] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:51:22,250] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:51:22,261] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 18:51:23,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345483.2859018, 'message': 'Dec 6 18:51:22 hqnl0246134 sshd[244556]: Failed password for root from 61.177.173.18 port 10638 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 18:51:40,100] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 18:51:40,102] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 18:51:40,991] im360.plugins.pam: PAM module has been enabled for dovecot-pam
WARNING [2022-12-06 18:51:48,124] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:51:48,125] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 18:51:53,808] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 18:52:03,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345523.3416595, 'message': 'Dec 6 18:52:02 hqnl0246134 sshd[244615]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 18:52:03,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345523.3424988, 'message': 'Dec 6 18:52:02 hqnl0246134 sshd[244615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 18:52:05,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345525.3446753, 'message': 'Dec 6 18:52:04 hqnl0246134 sshd[244615]: Failed password for root from 61.177.173.18 port 39997 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:52:05,382] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345525.3448937, 'message': 'Dec 6 18:52:05 hqnl0246134 sshd[244615]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:52:07,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345527.3474474, 'message': 'Dec 6 18:52:07 hqnl0246134 sshd[244615]: Failed password for root from 61.177.173.18 port 39997 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:52:09,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345529.3522742, 'message': 'Dec 6 18:52:07 hqnl0246134 sshd[244615]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 18:52:09,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345529.352489, 'message': 'Dec 6 18:52:08 hqnl0246134 sshd[244615]: Failed password for root from 61.177.173.18 port 39997 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
WARNING [2022-12-06 18:52:09,593] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:52:09,618] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0378 seconds
INFO [2022-12-06 18:52:11,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.174.137.15', 'timestamp': 1670345531.3564637, 'message': 'Dec 6 18:52:10 hqnl0246134 sshd[244619]: Invalid user postgres from 189.174.137.15 port 47616', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 18:52:11,406] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.174.137.15', 'timestamp': 1670345531.3566818, 'message': 'Dec 6 18:52:10 hqnl0246134 sshd[244619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.174.137.15 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 18:52:11,426] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.174.137.15', 'timestamp': 1670345531.3568304, 'message': 'Dec 6 18:52:10 hqnl0246134 sshd[244619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.174.137.15 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:52:13,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.174.137.15', 'timestamp': 1670345533.3564813, 'message': 'Dec 6 18:52:12 hqnl0246134 sshd[244619]: Failed password for invalid user postgres from 189.174.137.15 port 47616 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 18:52:15,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.174.137.15', 'timestamp': 1670345535.3598864, 'message': 'Dec 6 18:52:14 hqnl0246134 sshd[244619]: Disconnected from invalid user postgres 189.174.137.15 port 47616 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0408 seconds
INFO [2022-12-06 18:52:17,895] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:52:17,895] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:52:17,905] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:52:17,916] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 18:52:20,388] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:52:20,389] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:52:20,398] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:52:20,411] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 18:52:27,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345547.3866582, 'message': 'Dec 6 18:52:25 hqnl0246134 sshd[244644]: Invalid user wj from 46.101.179.127 port 35050', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 18:52:27,428] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345547.3870356, 'message': 'Dec 6 18:52:25 hqnl0246134 sshd[244644]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.179.127 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 18:52:27,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345547.3872373, 'message': 'Dec 6 18:52:25 hqnl0246134 sshd[244644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.179.127 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 18:52:27,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345547.3874156, 'message': 'Dec 6 18:52:27 hqnl0246134 sshd[244644]: Failed password for invalid user wj from 46.101.179.127 port 35050 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:52:29,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.179.127', 'timestamp': 1670345549.3865016, 'message': 'Dec 6 18:52:28 hqnl0246134 sshd[244644]: Disconnected from invalid user wj 46.101.179.127 port 35050 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 18:52:29,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345549.38676, 'message': 'Dec 6 18:52:28 hqnl0246134 sshd[244646]: Invalid user csgosrv from 137.184.196.76 port 33578', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 18:52:29,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345549.386881, 'message': 'Dec 6 18:52:29 hqnl0246134 sshd[244646]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.196.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 18:52:29,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345549.3870065, 'message': 'Dec 6 18:52:29 hqnl0246134 sshd[244646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.196.76 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:52:30,867] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:52:30,867] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:52:30,874] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:52:30,888] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 18:52:31,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345551.3893554, 'message': 'Dec 6 18:52:30 hqnl0246134 sshd[244646]: Failed password for invalid user csgosrv from 137.184.196.76 port 33578 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 18:52:33,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.196.76', 'timestamp': 1670345553.3916872, 'message': 'Dec 6 18:52:32 hqnl0246134 sshd[244646]: Disconnected from invalid user csgosrv 137.184.196.76 port 33578 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 18:52:39,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345559.4005678, 'message': 'Dec 6 18:52:38 hqnl0246134 sshd[244655]: Invalid user oracle from 60.49.207.252 port 39507', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 18:52:39,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345559.400931, 'message': 'Dec 6 18:52:38 hqnl0246134 sshd[244655]: pam_imunify(sshd:auth): [IM360_RBL] The IP 60.49.207.252 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 18:52:39,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345559.4011471, 'message': 'Dec 6 18:52:38 hqnl0246134 sshd[244655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.49.207.252 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 18:52:41,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345561.4020727, 'message': 'Dec 6 18:52:40 hqnl0246134 sshd[244655]: Failed password for invalid user oracle from 60.49.207.252 port 39507 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 18:52:41,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345561.4023979, 'message': 'Dec 6 18:52:40 hqnl0246134 sshd[244665]: Invalid user programacion from 167.172.187.120 port 45148', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 18:52:41,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345561.4025326, 'message': 'Dec 6 18:52:40 hqnl0246134 sshd[244665]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.187.120 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:52:41,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345561.4026368, 'message': 'Dec 6 18:52:40 hqnl0246134 sshd[244665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.187.120 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 18:52:43,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345563.406221, 'message': 'Dec 6 18:52:42 hqnl0246134 sshd[244655]: Disconnected from invalid user oracle 60.49.207.252 port 39507 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0435 seconds
INFO [2022-12-06 18:52:43,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345563.4065406, 'message': 'Dec 6 18:52:42 hqnl0246134 sshd[244665]: Failed password for invalid user programacion from 167.172.187.120 port 45148 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 18:52:43,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.187.120', 'timestamp': 1670345563.4067793, 'message': 'Dec 6 18:52:42 hqnl0246134 sshd[244665]: Disconnected from invalid user programacion 167.172.187.120 port 45148 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0240 seconds
WARNING [2022-12-06 18:52:48,130] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:52:48,130] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:52:53,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345573.421663, 'message': 'Dec 6 18:52:51 hqnl0246134 sshd[244673]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 18:52:53,487] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345573.4219975, 'message': 'Dec 6 18:52:51 hqnl0246134 sshd[244673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 18:52:55,462] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345575.4246051, 'message': 'Dec 6 18:52:53 hqnl0246134 sshd[244673]: Failed password for root from 61.177.173.18 port 19993 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 18:52:55,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345575.424962, 'message': 'Dec 6 18:52:53 hqnl0246134 sshd[244673]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 18:52:57,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345577.4287937, 'message': 'Dec 6 18:52:56 hqnl0246134 sshd[244673]: Failed password for root from 61.177.173.18 port 19993 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:52:59,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345579.430812, 'message': 'Dec 6 18:52:58 hqnl0246134 sshd[244673]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:53:01,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345581.4342105, 'message': 'Dec 6 18:53:00 hqnl0246134 sshd[244673]: Failed password for root from 61.177.173.18 port 19993 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 18:53:09,594] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:53:09,631] defence360agent.internals.the_sink: SensorIncidentList(<19 item(s)>) processed in 0.0461 seconds
INFO [2022-12-06 18:53:17,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345597.4630113, 'message': 'Dec 6 18:53:17 hqnl0246134 sshd[244724]: pam_imunify(sshd:auth): [IM360_RBL] The IP 188.166.189.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 18:53:17,513] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345597.4634473, 'message': 'Dec 6 18:53:17 hqnl0246134 sshd[244724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.189.134 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:53:17,922] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:53:17,923] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:53:17,930] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:53:17,942] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 18:53:20,542] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:53:20,543] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:53:20,551] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:53:20,566] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0230 seconds
INFO [2022-12-06 18:53:21,521] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345601.468048, 'message': 'Dec 6 18:53:19 hqnl0246134 sshd[244724]: Failed password for root from 188.166.189.134 port 35002 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0520 seconds
INFO [2022-12-06 18:53:21,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345601.4684215, 'message': 'Dec 6 18:53:21 hqnl0246134 sshd[244734]: Invalid user xmail from 164.92.157.100 port 33610', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0521 seconds
INFO [2022-12-06 18:53:21,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345601.4686584, 'message': 'Dec 6 18:53:21 hqnl0246134 sshd[244734]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.92.157.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 18:53:21,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345601.468864, 'message': 'Dec 6 18:53:21 hqnl0246134 sshd[244734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.157.100 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 18:53:25,506] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345605.4856021, 'message': 'Dec 6 18:53:23 hqnl0246134 sshd[244734]: Failed password for invalid user xmail from 164.92.157.100 port 33610 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 18:53:25,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345605.485863, 'message': 'Dec 6 18:53:24 hqnl0246134 sshd[244734]: Disconnected from invalid user xmail 164.92.157.100 port 33610 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 18:53:39,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345619.5270467, 'message': 'Dec 6 18:53:38 hqnl0246134 sshd[244740]: Invalid user mary from 178.128.55.198 port 43296', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 18:53:39,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345619.528263, 'message': 'Dec 6 18:53:38 hqnl0246134 sshd[244742]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0418 seconds
INFO [2022-12-06 18:53:39,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345619.5277903, 'message': 'Dec 6 18:53:38 hqnl0246134 sshd[244740]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.55.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 18:53:39,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345619.528502, 'message': 'Dec 6 18:53:38 hqnl0246134 sshd[244742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 18:53:39,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345619.5280755, 'message': 'Dec 6 18:53:38 hqnl0246134 sshd[244740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 18:53:41,563] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345621.5305731, 'message': 'Dec 6 18:53:40 hqnl0246134 sshd[244740]: Failed password for invalid user mary from 178.128.55.198 port 43296 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 18:53:41,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345621.5309567, 'message': 'Dec 6 18:53:40 hqnl0246134 sshd[244742]: Failed password for root from 61.177.173.18 port 44318 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 18:53:41,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.55.198', 'timestamp': 1670345621.531212, 'message': 'Dec 6 18:53:40 hqnl0246134 sshd[244740]: Disconnected from invalid user mary 178.128.55.198 port 43296 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 18:53:41,597] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345621.5310957, 'message': 'Dec 6 18:53:40 hqnl0246134 sshd[244742]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 18:53:43,635] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:53:43,636] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:53:43,649] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:53:43,667] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0308 seconds
INFO [2022-12-06 18:53:43,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345623.6377811, 'message': 'Dec 6 18:53:43 hqnl0246134 sshd[244742]: Failed password for root from 61.177.173.18 port 44318 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 18:53:45,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345625.5375493, 'message': 'Dec 6 18:53:45 hqnl0246134 sshd[244742]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 18:53:47,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345627.5426693, 'message': 'Dec 6 18:53:47 hqnl0246134 sshd[244742]: Failed password for root from 61.177.173.18 port 44318 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
WARNING [2022-12-06 18:53:48,134] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:53:48,135] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:53:53,322] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 18:53:53,390] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 18:53:53,391] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 18:53:53,391] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 18:53:53,391] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 18:53:53,391] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 18:53:53,400] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 18:53:53,415] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0229 seconds
WARNING [2022-12-06 18:53:53,421] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 18:53:53,423] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:53:53,439] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0303 seconds
INFO [2022-12-06 18:53:53,441] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0288 seconds
INFO [2022-12-06 18:54:07,653] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345647.6348298, 'message': 'Dec 6 18:54:06 hqnl0246134 sshd[244772]: Invalid user test2 from 68.183.142.49 port 55760', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:54:07,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345647.635067, 'message': 'Dec 6 18:54:06 hqnl0246134 sshd[244772]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.142.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 18:54:07,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345647.635198, 'message': 'Dec 6 18:54:06 hqnl0246134 sshd[244772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.142.49 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
WARNING [2022-12-06 18:54:09,595] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:54:09,621] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0331 seconds
INFO [2022-12-06 18:54:09,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345649.6370044, 'message': 'Dec 6 18:54:08 hqnl0246134 sshd[244772]: Failed password for invalid user test2 from 68.183.142.49 port 55760 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:54:09,673] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345649.6371865, 'message': 'Dec 6 18:54:08 hqnl0246134 sshd[244772]: Disconnected from invalid user test2 68.183.142.49 port 55760 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:54:13,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345653.648945, 'message': 'Dec 6 18:54:13 hqnl0246134 sshd[244782]: Invalid user steam from 84.53.228.192 port 42190', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 18:54:13,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345653.6493042, 'message': 'Dec 6 18:54:13 hqnl0246134 sshd[244782]: pam_imunify(sshd:auth): [IM360_RBL] The IP 84.53.228.192 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0162 seconds
INFO [2022-12-06 18:54:13,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345653.6494617, 'message': 'Dec 6 18:54:13 hqnl0246134 sshd[244782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.53.228.192 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 18:54:15,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345655.6498885, 'message': 'Dec 6 18:54:15 hqnl0246134 sshd[244782]: Failed password for invalid user steam from 84.53.228.192 port 42190 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 18:54:17,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345657.6624947, 'message': 'Dec 6 18:54:17 hqnl0246134 sshd[244782]: Disconnected from invalid user steam 84.53.228.192 port 42190 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 18:54:17,836] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:54:17,837] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:54:17,844] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:54:17,857] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 18:54:20,455] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:54:20,456] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:54:20,463] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:54:20,475] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 18:54:23,517] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 18:54:23,518] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 18:54:23,519] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 18:54:25,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345665.690001, 'message': 'Dec 6 18:54:25 hqnl0246134 sshd[244796]: Invalid user alejandro from 164.92.157.100 port 36504', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 18:54:25,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345665.6902964, 'message': 'Dec 6 18:54:25 hqnl0246134 sshd[244796]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.92.157.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 18:54:25,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345665.6904461, 'message': 'Dec 6 18:54:25 hqnl0246134 sshd[244796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.157.100 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 18:54:27,722] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345667.6927054, 'message': 'Dec 6 18:54:27 hqnl0246134 sshd[244796]: Failed password for invalid user alejandro from 164.92.157.100 port 36504 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 18:54:27,722] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345667.6929805, 'message': 'Dec 6 18:54:27 hqnl0246134 sshd[244799]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 18:54:27,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345667.6931121, 'message': 'Dec 6 18:54:27 hqnl0246134 sshd[244799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 18:54:29,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345669.695988, 'message': 'Dec 6 18:54:28 hqnl0246134 sshd[244796]: Disconnected from invalid user alejandro 164.92.157.100 port 36504 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 18:54:29,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345669.6962662, 'message': 'Dec 6 18:54:29 hqnl0246134 sshd[244799]: Failed password for root from 61.177.173.18 port 21406 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 18:54:33,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345673.705738, 'message': 'Dec 6 18:54:31 hqnl0246134 sshd[244799]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 18:54:33,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345673.7062557, 'message': 'Dec 6 18:54:33 hqnl0246134 sshd[244799]: Failed password for root from 61.177.173.18 port 21406 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 18:54:35,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345675.7194526, 'message': 'Dec 6 18:54:34 hqnl0246134 sshd[244799]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 18:54:37,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345677.735922, 'message': 'Dec 6 18:54:36 hqnl0246134 sshd[244799]: Failed password for root from 61.177.173.18 port 21406 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 18:54:48,139] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:54:48,140] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:55:01,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.174.137.15', 'timestamp': 1670345701.8166952, 'message': 'Dec 6 18:55:00 hqnl0246134 sshd[244815]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.174.137.15 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0501 seconds
INFO [2022-12-06 18:55:01,897] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.174.137.15', 'timestamp': 1670345701.817199, 'message': 'Dec 6 18:55:00 hqnl0246134 sshd[244815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.174.137.15 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 18:55:03,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '189.174.137.15', 'timestamp': 1670345703.8195953, 'message': 'Dec 6 18:55:02 hqnl0246134 sshd[244815]: Failed password for root from 189.174.137.15 port 36540 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 18:55:06,704] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:55:06,704] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:55:06,711] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:55:06,722] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
WARNING [2022-12-06 18:55:09,604] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:55:09,645] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0522 seconds
INFO [2022-12-06 18:55:11,854] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345711.828798, 'message': 'Dec 6 18:55:11 hqnl0246134 sshd[244845]: Invalid user guest from 62.122.171.202 port 38108', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 18:55:11,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345711.829192, 'message': 'Dec 6 18:55:11 hqnl0246134 sshd[244845]: pam_imunify(sshd:auth): [IM360_RBL] The IP 62.122.171.202 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:55:11,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345711.8293514, 'message': 'Dec 6 18:55:11 hqnl0246134 sshd[244845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.171.202 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 18:55:15,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345715.833668, 'message': 'Dec 6 18:55:13 hqnl0246134 sshd[244845]: Failed password for invalid user guest from 62.122.171.202 port 38108 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 18:55:15,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '62.122.171.202', 'timestamp': 1670345715.8339236, 'message': 'Dec 6 18:55:14 hqnl0246134 sshd[244845]: Disconnected from invalid user guest 62.122.171.202 port 38108 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 18:55:17,909] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:55:17,909] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:55:17,916] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:55:17,927] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 18:55:20,622] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:55:20,622] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:55:20,629] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:55:20,639] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0164 seconds
INFO [2022-12-06 18:55:23,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.127.204', 'timestamp': 1670345723.8407824, 'message': 'Dec 6 18:55:23 hqnl0246134 sshd[244875]: Invalid user testuser from 46.101.127.204 port 56360', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 18:55:23,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.127.204', 'timestamp': 1670345723.841071, 'message': 'Dec 6 18:55:23 hqnl0246134 sshd[244875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.127.204 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 18:55:25,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.127.204', 'timestamp': 1670345725.8442633, 'message': 'Dec 6 18:55:25 hqnl0246134 sshd[244875]: Failed password for invalid user testuser from 46.101.127.204 port 56360 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 18:55:27,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.127.204', 'timestamp': 1670345727.8454394, 'message': 'Dec 6 18:55:27 hqnl0246134 sshd[244875]: Disconnected from invalid user testuser 46.101.127.204 port 56360 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1271 seconds
INFO [2022-12-06 18:55:29,876] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '102.223.92.101', 'timestamp': 1670345729.8466597, 'message': 'Dec 6 18:55:29 hqnl0246134 sshd[244886]: pam_imunify(sshd:auth): [IM360_RBL] The IP 102.223.92.101 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 18:55:29,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '102.223.92.101', 'timestamp': 1670345729.8470492, 'message': 'Dec 6 18:55:29 hqnl0246134 sshd[244886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.223.92.101 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 18:55:31,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345731.8517318, 'message': 'Dec 6 18:55:29 hqnl0246134 sshd[244890]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.92.157.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 18:55:31,888] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '102.223.92.101', 'timestamp': 1670345731.852141, 'message': 'Dec 6 18:55:31 hqnl0246134 sshd[244886]: Failed password for root from 102.223.92.101 port 62939 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 18:55:31,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345731.8520114, 'message': 'Dec 6 18:55:29 hqnl0246134 sshd[244890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.157.100 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:55:33,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '164.92.157.100', 'timestamp': 1670345733.857297, 'message': 'Dec 6 18:55:32 hqnl0246134 sshd[244890]: Failed password for root from 164.92.157.100 port 37808 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 18:55:33,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '79.225.71.198', 'timestamp': 1670345733.8579004, 'message': 'Dec 6 18:55:33 hqnl0246134 sshd[244892]: Invalid user gmodserver from 79.225.71.198 port 33112', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 18:55:33,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '79.225.71.198', 'timestamp': 1670345733.8585205, 'message': 'Dec 6 18:55:33 hqnl0246134 sshd[244892]: pam_imunify(sshd:auth): [IM360_RBL] The IP 79.225.71.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 18:55:33,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '79.225.71.198', 'timestamp': 1670345733.8586304, 'message': 'Dec 6 18:55:33 hqnl0246134 sshd[244892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.225.71.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 18:55:35,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '79.225.71.198', 'timestamp': 1670345735.861976, 'message': 'Dec 6 18:55:35 hqnl0246134 sshd[244892]: Failed password for invalid user gmodserver from 79.225.71.198 port 33112 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 18:55:37,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '79.225.71.198', 'timestamp': 1670345737.8635604, 'message': 'Dec 6 18:55:37 hqnl0246134 sshd[244892]: Disconnected from invalid user gmodserver 79.225.71.198 port 33112 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
WARNING [2022-12-06 18:55:48,144] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:55:48,146] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:55:51,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.93.201.82', 'timestamp': 1670345751.8971553, 'message': 'Dec 6 18:55:50 hqnl0246134 sshd[244905]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.93.201.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 18:55:51,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.93.201.82', 'timestamp': 1670345751.8979108, 'message': 'Dec 6 18:55:50 hqnl0246134 sshd[244905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.82 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 18:55:53,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.93.201.82', 'timestamp': 1670345753.8977218, 'message': 'Dec 6 18:55:53 hqnl0246134 sshd[244905]: Failed password for root from 45.93.201.82 port 48736 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:55:57,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345757.906221, 'message': 'Dec 6 18:55:56 hqnl0246134 sshd[244910]: Invalid user git from 60.49.207.252 port 29155', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 18:55:57,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.93.201.82', 'timestamp': 1670345757.91314, 'message': 'Dec 6 18:55:57 hqnl0246134 sshd[244905]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.93.201.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 18:55:57,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345757.9128006, 'message': 'Dec 6 18:55:56 hqnl0246134 sshd[244910]: pam_imunify(sshd:auth): [IM360_RBL] The IP 60.49.207.252 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 18:55:58,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345757.9129803, 'message': 'Dec 6 18:55:56 hqnl0246134 sshd[244910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.49.207.252 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 18:55:59,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345759.9125562, 'message': 'Dec 6 18:55:58 hqnl0246134 sshd[244910]: Failed password for invalid user git from 60.49.207.252 port 29155 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 18:55:59,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.93.201.82', 'timestamp': 1670345759.9128373, 'message': 'Dec 6 18:55:59 hqnl0246134 sshd[244905]: Failed password for root from 45.93.201.82 port 48736 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 18:56:01,984] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '60.49.207.252', 'timestamp': 1670345761.917684, 'message': 'Dec 6 18:56:00 hqnl0246134 sshd[244910]: Disconnected from invalid user git 60.49.207.252 port 29155 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0658 seconds
INFO [2022-12-06 18:56:01,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345761.9180126, 'message': 'Dec 6 18:56:00 hqnl0246134 sshd[244913]: Invalid user joe from 68.183.142.49 port 57926', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0659 seconds
INFO [2022-12-06 18:56:02,018] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345761.9184217, 'message': 'Dec 6 18:56:00 hqnl0246134 sshd[244913]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.142.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 18:56:02,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345761.9186273, 'message': 'Dec 6 18:56:00 hqnl0246134 sshd[244913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.142.49 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 18:56:03,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345763.9184663, 'message': 'Dec 6 18:56:02 hqnl0246134 sshd[244913]: Failed password for invalid user joe from 68.183.142.49 port 57926 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 18:56:03,958] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.93.201.82', 'timestamp': 1670345763.9187589, 'message': 'Dec 6 18:56:02 hqnl0246134 sshd[244905]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.93.201.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 18:56:03,976] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345763.9186459, 'message': 'Dec 6 18:56:02 hqnl0246134 sshd[244913]: Disconnected from invalid user joe 68.183.142.49 port 57926 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 18:56:05,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.93.201.82', 'timestamp': 1670345765.9224362, 'message': 'Dec 6 18:56:04 hqnl0246134 sshd[244905]: Failed password for root from 45.93.201.82 port 48736 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
WARNING [2022-12-06 18:56:09,610] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:56:09,664] defence360agent.internals.the_sink: SensorIncidentList(<23 item(s)>) processed in 0.0671 seconds
INFO [2022-12-06 18:56:09,958] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345769.9273481, 'message': 'Dec 6 18:56:08 hqnl0246134 sshd[244925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 18:56:09,988] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345769.9276495, 'message': 'Dec 6 18:56:08 hqnl0246134 sshd[244925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 18:56:11,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345771.9309075, 'message': 'Dec 6 18:56:11 hqnl0246134 sshd[244925]: Failed password for root from 61.177.173.18 port 47906 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 18:56:13,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345773.9331517, 'message': 'Dec 6 18:56:13 hqnl0246134 sshd[244925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 18:56:15,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345775.9356766, 'message': 'Dec 6 18:56:15 hqnl0246134 sshd[244925]: Failed password for root from 61.177.173.18 port 47906 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 18:56:15,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345775.936216, 'message': 'Dec 6 18:56:15 hqnl0246134 sshd[244925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 18:56:17,824] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:56:17,824] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:56:17,832] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:56:17,845] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 18:56:19,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345779.9357784, 'message': 'Dec 6 18:56:17 hqnl0246134 sshd[244925]: Failed password for root from 61.177.173.18 port 47906 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 18:56:20,607] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:56:20,607] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:56:20,622] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:56:20,646] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0293 seconds
INFO [2022-12-06 18:56:22,405] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:56:22,406] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:56:22,419] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:56:22,439] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0321 seconds
INFO [2022-12-06 18:56:31,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345791.95381, 'message': 'Dec 6 18:56:30 hqnl0246134 sshd[244955]: Invalid user ems from 188.166.189.134 port 49522', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 18:56:31,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345791.9541063, 'message': 'Dec 6 18:56:30 hqnl0246134 sshd[244955]: pam_imunify(sshd:auth): [IM360_RBL] The IP 188.166.189.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 18:56:32,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345791.9542432, 'message': 'Dec 6 18:56:30 hqnl0246134 sshd[244955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.189.134 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 18:56:33,971] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345793.9534342, 'message': 'Dec 6 18:56:32 hqnl0246134 sshd[244955]: Failed password for invalid user ems from 188.166.189.134 port 49522 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:56:35,976] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.189.134', 'timestamp': 1670345795.9573514, 'message': 'Dec 6 18:56:34 hqnl0246134 sshd[244955]: Disconnected from invalid user ems 188.166.189.134 port 49522 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 18:56:48,150] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:56:48,151] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:56:50,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345809.9864793, 'message': 'Dec 6 18:56:49 hqnl0246134 sshd[244967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 18:56:50,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345809.9870555, 'message': 'Dec 6 18:56:49 hqnl0246134 sshd[244967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 18:56:52,021] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345811.9863195, 'message': 'Dec 6 18:56:50 hqnl0246134 sshd[244969]: Invalid user jiayu from 159.65.235.114 port 49340', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 18:56:52,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345811.9868069, 'message': 'Dec 6 18:56:50 hqnl0246134 sshd[244967]: Failed password for root from 61.177.173.18 port 54731 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 18:56:52,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345811.9865248, 'message': 'Dec 6 18:56:50 hqnl0246134 sshd[244969]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.65.235.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 18:56:52,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345811.9869106, 'message': 'Dec 6 18:56:51 hqnl0246134 sshd[244967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 18:56:52,071] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345811.986668, 'message': 'Dec 6 18:56:50 hqnl0246134 sshd[244969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.235.114 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 18:56:54,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345813.9892113, 'message': 'Dec 6 18:56:52 hqnl0246134 sshd[244969]: Failed password for invalid user jiayu from 159.65.235.114 port 49340 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0525 seconds
INFO [2022-12-06 18:56:54,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345813.9894989, 'message': 'Dec 6 18:56:53 hqnl0246134 sshd[244967]: Failed password for root from 61.177.173.18 port 54731 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0531 seconds
INFO [2022-12-06 18:56:54,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345813.9897296, 'message': 'Dec 6 18:56:53 hqnl0246134 sshd[244969]: Disconnected from invalid user jiayu 159.65.235.114 port 49340 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 18:56:56,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.157.93', 'timestamp': 1670345815.9933722, 'message': 'Dec 6 18:56:55 hqnl0246134 sshd[244972]: Invalid user atualiza from 157.245.157.93 port 44082', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0514 seconds
INFO [2022-12-06 18:56:56,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345815.9935908, 'message': 'Dec 6 18:56:55 hqnl0246134 sshd[244967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0522 seconds
INFO [2022-12-06 18:56:56,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.245.157.93', 'timestamp': 1670345815.99374, 'message': 'Dec 6 18:56:55 hqnl0246134 sshd[244972]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.245.157.93 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 18:56:56,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.245.157.93', 'timestamp': 1670345815.9938462, 'message': 'Dec 6 18:56:55 hqnl0246134 sshd[244972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.157.93 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 18:56:58,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345817.99739, 'message': 'Dec 6 18:56:57 hqnl0246134 sshd[244967]: Failed password for root from 61.177.173.18 port 54731 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 18:56:58,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.157.93', 'timestamp': 1670345817.9977715, 'message': 'Dec 6 18:56:57 hqnl0246134 sshd[244972]: Failed password for invalid user atualiza from 157.245.157.93 port 44082 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 18:57:00,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.157.93', 'timestamp': 1670345819.9980426, 'message': 'Dec 6 18:56:59 hqnl0246134 sshd[244972]: Disconnected from invalid user atualiza 157.245.157.93 port 44082 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0243 seconds
WARNING [2022-12-06 18:57:09,611] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:57:09,652] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0502 seconds
INFO [2022-12-06 18:57:14,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345834.0188737, 'message': 'Dec 6 18:57:12 hqnl0246134 sshd[245001]: Invalid user elsearch from 84.53.228.192 port 58408', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 18:57:14,058] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345834.0192435, 'message': 'Dec 6 18:57:12 hqnl0246134 sshd[245001]: pam_imunify(sshd:auth): [IM360_RBL] The IP 84.53.228.192 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 18:57:14,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345834.0193965, 'message': 'Dec 6 18:57:12 hqnl0246134 sshd[245001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.53.228.192 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 18:57:16,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345836.0207918, 'message': 'Dec 6 18:57:14 hqnl0246134 sshd[245001]: Failed password for invalid user elsearch from 84.53.228.192 port 58408 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 18:57:16,058] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '84.53.228.192', 'timestamp': 1670345836.0211065, 'message': 'Dec 6 18:57:14 hqnl0246134 sshd[245001]: Disconnected from invalid user elsearch 84.53.228.192 port 58408 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 18:57:17,942] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:57:17,943] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:57:17,950] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:57:17,962] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 18:57:20,639] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:57:20,640] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:57:20,648] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:57:20,660] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 18:57:42,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345862.090554, 'message': 'Dec 6 18:57:40 hqnl0246134 sshd[245019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 18:57:42,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345862.0913267, 'message': 'Dec 6 18:57:40 hqnl0246134 sshd[245019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 18:57:44,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345864.0951736, 'message': 'Dec 6 18:57:42 hqnl0246134 sshd[245019]: Failed password for root from 61.177.173.18 port 57342 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-06 18:57:44,146] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.125.217', 'timestamp': 1670345864.1010299, 'message': 'Dec 6 18:57:42 hqnl0246134 sshd[245029]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.125.217 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0447 seconds
INFO [2022-12-06 18:57:44,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.138.209.255', 'timestamp': 1670345864.1013155, 'message': 'Dec 6 18:57:43 hqnl0246134 sshd[245031]: Invalid user dbadmin from 168.138.209.255 port 46444', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0448 seconds
INFO [2022-12-06 18:57:44,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.125.217', 'timestamp': 1670345864.1011834, 'message': 'Dec 6 18:57:42 hqnl0246134 sshd[245029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.125.217 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 18:57:44,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '168.138.209.255', 'timestamp': 1670345864.1014535, 'message': 'Dec 6 18:57:43 hqnl0246134 sshd[245031]: pam_imunify(sshd:auth): [IM360_RBL] The IP 168.138.209.255 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 18:57:44,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.138.209.255', 'timestamp': 1670345864.1015663, 'message': 'Dec 6 18:57:43 hqnl0246134 sshd[245031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.209.255 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 18:57:46,153] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.125.217', 'timestamp': 1670345866.0985951, 'message': 'Dec 6 18:57:44 hqnl0246134 sshd[245029]: Failed password for root from 178.128.125.217 port 40072 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0543 seconds
INFO [2022-12-06 18:57:46,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345866.0988653, 'message': 'Dec 6 18:57:44 hqnl0246134 sshd[245019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0544 seconds
INFO [2022-12-06 18:57:46,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.138.209.255', 'timestamp': 1670345866.0991025, 'message': 'Dec 6 18:57:45 hqnl0246134 sshd[245031]: Failed password for invalid user dbadmin from 168.138.209.255 port 46444 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0540 seconds
INFO [2022-12-06 18:57:47,798] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:57:47,798] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:57:47,811] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:57:47,828] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0291 seconds
INFO [2022-12-06 18:57:48,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345868.0992792, 'message': 'Dec 6 18:57:46 hqnl0246134 sshd[245019]: Failed password for root from 61.177.173.18 port 57342 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0496 seconds
WARNING [2022-12-06 18:57:48,152] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:57:48,153] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:57:48,153] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.138.209.255', 'timestamp': 1670345868.09981, 'message': 'Dec 6 18:57:47 hqnl0246134 sshd[245031]: Disconnected from invalid user dbadmin 168.138.209.255 port 46444 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0520 seconds
INFO [2022-12-06 18:57:48,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345868.0995758, 'message': 'Dec 6 18:57:46 hqnl0246134 sshd[245019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 18:57:50,136] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345870.1016102, 'message': 'Dec 6 18:57:48 hqnl0246134 sshd[245064]: Invalid user roots from 68.183.142.49 port 60076', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 18:57:50,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345870.1021826, 'message': 'Dec 6 18:57:49 hqnl0246134 sshd[245019]: Failed password for root from 61.177.173.18 port 57342 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 18:57:50,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345870.1019044, 'message': 'Dec 6 18:57:48 hqnl0246134 sshd[245064]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.142.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 18:57:50,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345870.1020699, 'message': 'Dec 6 18:57:48 hqnl0246134 sshd[245064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.142.49 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 18:57:52,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345872.1078858, 'message': 'Dec 6 18:57:50 hqnl0246134 sshd[245064]: Failed password for invalid user roots from 68.183.142.49 port 60076 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 18:57:52,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.142.49', 'timestamp': 1670345872.1080775, 'message': 'Dec 6 18:57:51 hqnl0246134 sshd[245064]: Disconnected from invalid user roots 68.183.142.49 port 60076 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 18:58:00,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '168.121.237.82', 'timestamp': 1670345880.1349053, 'message': 'Dec 6 18:57:58 hqnl0246134 sshd[245069]: pam_imunify(sshd:auth): [IM360_RBL] The IP 168.121.237.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 18:58:00,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.121.237.82', 'timestamp': 1670345880.1351612, 'message': 'Dec 6 18:57:58 hqnl0246134 sshd[245069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.237.82 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 18:58:02,158] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '168.121.237.82', 'timestamp': 1670345882.1387138, 'message': 'Dec 6 18:58:00 hqnl0246134 sshd[245069]: Failed password for root from 168.121.237.82 port 40448 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 18:58:09,617] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:58:09,646] defence360agent.internals.the_sink: SensorIncidentList(<19 item(s)>) processed in 0.0373 seconds
INFO [2022-12-06 18:58:18,097] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:58:18,098] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:58:18,111] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:58:18,132] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0308 seconds
INFO [2022-12-06 18:58:21,028] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:58:21,028] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:58:21,035] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:58:21,047] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 18:58:28,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345908.198234, 'message': 'Dec 6 18:58:27 hqnl0246134 sshd[245115]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0383 seconds
INFO [2022-12-06 18:58:28,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345908.1988566, 'message': 'Dec 6 18:58:27 hqnl0246134 sshd[245115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 18:58:30,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345910.198164, 'message': 'Dec 6 18:58:29 hqnl0246134 sshd[245115]: Failed password for root from 61.177.173.18 port 62942 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0592 seconds
INFO [2022-12-06 18:58:32,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345912.2005694, 'message': 'Dec 6 18:58:31 hqnl0246134 sshd[245115]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 18:58:34,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345914.2044263, 'message': 'Dec 6 18:58:33 hqnl0246134 sshd[245115]: Failed password for root from 61.177.173.18 port 62942 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 18:58:34,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345914.2047749, 'message': 'Dec 6 18:58:33 hqnl0246134 sshd[245115]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 18:58:36,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670345916.208944, 'message': 'Dec 6 18:58:35 hqnl0246134 sshd[245115]: Failed password for root from 61.177.173.18 port 62942 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 18:58:37,157] defence360agent.files: Updating all files
INFO [2022-12-06 18:58:37,482] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 18:58:37,482] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 18:58:37,821] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 18:58:37,821] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 18:58:38,092] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 18:58:38,092] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 18:58:38,454] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 18:58:38,454] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 18:58:38,455] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 18:58:38,719] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 16:58:38 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E42C35F526ABB'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 18:58:38,720] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 18:58:38,721] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 18:58:39,323] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 18:58:39,323] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 18:58:39,645] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 18:58:39,646] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 18:58:39,909] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 18:58:39,909] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 18:58:40,326] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 18:58:40,326] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 18:58:40,919] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 18:58:40,921] defence360agent.files: geo files update finished (not updated)
WARNING [2022-12-06 18:58:48,156] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:58:48,158] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:59:04,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.127.204', 'timestamp': 1670345944.2899745, 'message': 'Dec 6 18:59:04 hqnl0246134 sshd[245148]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.127.204 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 18:59:04,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.127.204', 'timestamp': 1670345944.2903428, 'message': 'Dec 6 18:59:04 hqnl0246134 sshd[245148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.127.204 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 18:59:06,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.217.58', 'timestamp': 1670345946.2983036, 'message': 'Dec 6 18:59:04 hqnl0246134 sshd[245150]: Invalid user meteor from 178.128.217.58 port 35820', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 18:59:06,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '46.101.127.204', 'timestamp': 1670345946.2987337, 'message': 'Dec 6 18:59:06 hqnl0246134 sshd[245148]: Failed password for root from 46.101.127.204 port 56574 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 18:59:06,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.217.58', 'timestamp': 1670345946.298502, 'message': 'Dec 6 18:59:05 hqnl0246134 sshd[245150]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.217.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 18:59:06,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.217.58', 'timestamp': 1670345946.2986267, 'message': 'Dec 6 18:59:05 hqnl0246134 sshd[245150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.58 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 18:59:08,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.217.58', 'timestamp': 1670345948.3000953, 'message': 'Dec 6 18:59:06 hqnl0246134 sshd[245150]: Failed password for invalid user meteor from 178.128.217.58 port 35820 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 18:59:09,627] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:59:09,686] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0735 seconds
INFO [2022-12-06 18:59:10,421] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:59:10,421] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 18:59:10,428] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.128.217.58', 'timestamp': 1670345950.3050344, 'message': 'Dec 6 18:59:09 hqnl0246134 sshd[245150]: Disconnected from invalid user meteor 178.128.217.58 port 35820 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1226 seconds
WARNING [2022-12-06 18:59:10,431] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:59:10,442] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 18:59:18,017] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:59:18,018] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:59:18,027] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:59:18,040] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 18:59:20,719] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 18:59:20,719] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 18:59:20,726] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:59:20,746] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0260 seconds
INFO [2022-12-06 18:59:26,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670345966.328762, 'message': 'Dec 6 18:59:24 hqnl0246134 sshd[245183]: Invalid user oracle from 59.127.158.223 port 41008', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 18:59:26,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.127.158.223', 'timestamp': 1670345966.3290484, 'message': 'Dec 6 18:59:24 hqnl0246134 sshd[245183]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.127.158.223 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:59:26,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.127.158.223', 'timestamp': 1670345966.3292377, 'message': 'Dec 6 18:59:24 hqnl0246134 sshd[245183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.158.223 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 18:59:26,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670345966.3294015, 'message': 'Dec 6 18:59:25 hqnl0246134 sshd[245183]: Failed password for invalid user oracle from 59.127.158.223 port 41008 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 18:59:28,357] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670345968.329868, 'message': 'Dec 6 18:59:26 hqnl0246134 sshd[245183]: Disconnected from invalid user oracle 59.127.158.223 port 41008 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0271 seconds
WARNING [2022-12-06 18:59:48,162] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 18:59:48,165] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 18:59:58,249] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 18:59:58,321] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 18:59:58,321] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 18:59:58,322] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 18:59:58,322] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 18:59:58,323] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 18:59:58,342] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 18:59:58,366] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0414 seconds
WARNING [2022-12-06 18:59:58,377] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 18:59:58,380] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 18:59:58,407] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0499 seconds
INFO [2022-12-06 18:59:58,409] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0472 seconds
INFO [2022-12-06 18:59:58,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345998.37416, 'message': 'Dec 6 18:59:57 hqnl0246134 sshd[245203]: Invalid user user from 159.65.235.114 port 38476', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-06 18:59:58,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345998.3744676, 'message': 'Dec 6 18:59:58 hqnl0246134 sshd[245203]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.65.235.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 18:59:58,448] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.65.235.114', 'timestamp': 1670345998.3746312, 'message': 'Dec 6 18:59:58 hqnl0246134 sshd[245203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.235.114 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 19:00:00,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.235.114', 'timestamp': 1670346000.375618, 'message': 'Dec 6 19:00:00 hqnl0246134 sshd[245203]: Failed password for invalid user user from 159.65.235.114 port 38476 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 19:00:02,514] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.235.114', 'timestamp': 1670346002.3819654, 'message': 'Dec 6 19:00:01 hqnl0246134 sshd[245203]: Disconnected from invalid user user 159.65.235.114 port 38476 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1315 seconds
INFO [2022-12-06 19:00:04,406] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346004.3791032, 'message': 'Dec 6 19:00:02 hqnl0246134 sshd[245205]: Invalid user test01 from 164.92.66.116 port 59396', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 19:00:04,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346004.3793523, 'message': 'Dec 6 19:00:03 hqnl0246134 sshd[245205]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.92.66.116 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 19:00:04,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346004.3795218, 'message': 'Dec 6 19:00:03 hqnl0246134 sshd[245205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.116 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 19:00:06,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346006.3822618, 'message': 'Dec 6 19:00:04 hqnl0246134 sshd[245205]: Failed password for invalid user test01 from 164.92.66.116 port 59396 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 19:00:06,455] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346006.3826337, 'message': 'Dec 6 19:00:05 hqnl0246134 sshd[245205]: Disconnected from invalid user test01 164.92.66.116 port 59396 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0329 seconds
WARNING [2022-12-06 19:00:09,637] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:00:09,663] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0425 seconds
INFO [2022-12-06 19:00:17,872] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:00:17,873] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:00:17,882] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:00:17,903] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0287 seconds
INFO [2022-12-06 19:00:22,380] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:00:22,380] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:00:22,388] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:00:22,400] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 19:00:28,449] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 19:00:28,450] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 19:00:28,451] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 19:00:42,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346042.446987, 'message': 'Dec 6 19:00:40 hqnl0246134 sshd[245274]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 19:00:42,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346042.4474058, 'message': 'Dec 6 19:00:40 hqnl0246134 sshd[245274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 19:00:44,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346044.4495046, 'message': 'Dec 6 19:00:42 hqnl0246134 sshd[245274]: Failed password for root from 61.177.173.18 port 63955 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 19:00:46,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346046.4505641, 'message': 'Dec 6 19:00:44 hqnl0246134 sshd[245274]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
WARNING [2022-12-06 19:00:48,171] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:00:48,172] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:00:48,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346048.452604, 'message': 'Dec 6 19:00:46 hqnl0246134 sshd[245274]: Failed password for root from 61.177.173.18 port 63955 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 19:00:48,514] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346048.452913, 'message': 'Dec 6 19:00:47 hqnl0246134 sshd[245274]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 19:00:50,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346050.4581342, 'message': 'Dec 6 19:00:49 hqnl0246134 sshd[245274]: Failed password for root from 61.177.173.18 port 63955 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 19:00:56,021] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:00:56,022] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:00:56,029] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:00:56,041] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
WARNING [2022-12-06 19:01:09,632] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:01:09,657] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0329 seconds
INFO [2022-12-06 19:01:18,393] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:01:18,394] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:01:18,402] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:01:18,414] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 19:01:21,363] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:01:21,363] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:01:21,370] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:01:21,382] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 19:01:28,520] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346088.4993286, 'message': 'Dec 6 19:01:28 hqnl0246134 sshd[245326]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 19:01:28,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346088.4997113, 'message': 'Dec 6 19:01:28 hqnl0246134 sshd[245326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 19:01:30,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346090.503752, 'message': 'Dec 6 19:01:30 hqnl0246134 sshd[245326]: Failed password for root from 61.177.173.18 port 44189 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 19:01:32,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346092.5067582, 'message': 'Dec 6 19:01:30 hqnl0246134 sshd[245326]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 19:01:32,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346092.5070343, 'message': 'Dec 6 19:01:32 hqnl0246134 sshd[245326]: Failed password for root from 61.177.173.18 port 44189 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 19:01:34,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346094.5102222, 'message': 'Dec 6 19:01:32 hqnl0246134 sshd[245326]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 19:01:36,549] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346096.5154657, 'message': 'Dec 6 19:01:34 hqnl0246134 sshd[245326]: Failed password for root from 61.177.173.18 port 44189 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 19:01:44,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346104.5236645, 'message': 'Dec 6 19:01:42 hqnl0246134 sshd[245340]: Invalid user customer from 102.223.92.101 port 27780', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 19:01:44,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346104.524309, 'message': 'Dec 6 19:01:42 hqnl0246134 sshd[245340]: pam_imunify(sshd:auth): [IM360_RBL] The IP 102.223.92.101 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 19:01:44,592] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346104.5244696, 'message': 'Dec 6 19:01:42 hqnl0246134 sshd[245340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.223.92.101 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 19:01:44,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346104.524599, 'message': 'Dec 6 19:01:44 hqnl0246134 sshd[245340]: Failed password for invalid user customer from 102.223.92.101 port 27780 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 19:01:46,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346106.525696, 'message': 'Dec 6 19:01:44 hqnl0246134 sshd[245340]: Disconnected from invalid user customer 102.223.92.101 port 27780 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
WARNING [2022-12-06 19:01:48,175] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:01:48,176] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:01:50,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.127.204', 'timestamp': 1670346110.5297332, 'message': 'Dec 6 19:01:48 hqnl0246134 sshd[245342]: Invalid user auditor from 46.101.127.204 port 56744', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 19:01:50,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.127.204', 'timestamp': 1670346110.5299776, 'message': 'Dec 6 19:01:48 hqnl0246134 sshd[245342]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.127.204 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 19:01:50,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.127.204', 'timestamp': 1670346110.5300918, 'message': 'Dec 6 19:01:48 hqnl0246134 sshd[245342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.127.204 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 19:01:52,552] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.127.204', 'timestamp': 1670346112.5327764, 'message': 'Dec 6 19:01:50 hqnl0246134 sshd[245342]: Failed password for invalid user auditor from 46.101.127.204 port 56744 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 19:01:52,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.127.204', 'timestamp': 1670346112.5330768, 'message': 'Dec 6 19:01:51 hqnl0246134 sshd[245342]: Disconnected from invalid user auditor 46.101.127.204 port 56744 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0221 seconds
WARNING [2022-12-06 19:01:53,811] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 19:01:54,069] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:01:54,070] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:01:54,077] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:01:54,089] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
WARNING [2022-12-06 19:02:09,650] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:02:09,676] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0349 seconds
INFO [2022-12-06 19:02:14,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346134.5705495, 'message': 'Dec 6 19:02:14 hqnl0246134 sshd[245377]: Invalid user admin from 79.225.71.198 port 42240', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 19:02:14,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346134.5711458, 'message': 'Dec 6 19:02:14 hqnl0246134 sshd[245377]: pam_imunify(sshd:auth): [IM360_RBL] The IP 79.225.71.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 19:02:14,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346134.5714068, 'message': 'Dec 6 19:02:14 hqnl0246134 sshd[245377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.225.71.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 19:02:16,615] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346136.5700123, 'message': 'Dec 6 19:02:15 hqnl0246134 sshd[245380]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 19:02:16,616] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346136.57039, 'message': 'Dec 6 19:02:16 hqnl0246134 sshd[245377]: Failed password for invalid user admin from 79.225.71.198 port 42240 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0447 seconds
INFO [2022-12-06 19:02:16,617] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.217.58', 'timestamp': 1670346136.5705316, 'message': 'Dec 6 19:02:16 hqnl0246134 sshd[245382]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.217.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0447 seconds
INFO [2022-12-06 19:02:16,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346136.5702546, 'message': 'Dec 6 19:02:15 hqnl0246134 sshd[245380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 19:02:16,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.217.58', 'timestamp': 1670346136.570689, 'message': 'Dec 6 19:02:16 hqnl0246134 sshd[245382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.58 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 19:02:17,968] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:02:17,968] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:02:17,975] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:02:17,993] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0238 seconds
INFO [2022-12-06 19:02:18,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346138.5724208, 'message': 'Dec 6 19:02:16 hqnl0246134 sshd[245377]: Disconnected from invalid user admin 79.225.71.198 port 42240 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 19:02:18,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346138.5726159, 'message': 'Dec 6 19:02:17 hqnl0246134 sshd[245380]: Failed password for root from 61.177.173.18 port 17745 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 19:02:20,499] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:02:20,500] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:02:20,507] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:02:20,518] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 19:02:20,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.217.58', 'timestamp': 1670346140.573861, 'message': 'Dec 6 19:02:18 hqnl0246134 sshd[245382]: Failed password for root from 178.128.217.58 port 52200 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 19:02:20,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346140.5741096, 'message': 'Dec 6 19:02:19 hqnl0246134 sshd[245380]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 19:02:22,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346142.5768495, 'message': 'Dec 6 19:02:21 hqnl0246134 sshd[245380]: Failed password for root from 61.177.173.18 port 17745 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 19:02:24,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346144.5775075, 'message': 'Dec 6 19:02:23 hqnl0246134 sshd[245380]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 19:02:26,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346146.58198, 'message': 'Dec 6 19:02:26 hqnl0246134 sshd[245380]: Failed password for root from 61.177.173.18 port 17745 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0199 seconds
WARNING [2022-12-06 19:02:48,178] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:02:48,179] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:02:48,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346168.622999, 'message': 'Dec 6 19:02:47 hqnl0246134 sshd[245430]: Invalid user testuser from 164.92.66.116 port 48308', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 19:02:48,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346168.6235666, 'message': 'Dec 6 19:02:47 hqnl0246134 sshd[245430]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.92.66.116 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:02:48,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346168.6237507, 'message': 'Dec 6 19:02:47 hqnl0246134 sshd[245430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.116 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 19:02:50,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346170.6256504, 'message': 'Dec 6 19:02:49 hqnl0246134 sshd[245430]: Failed password for invalid user testuser from 164.92.66.116 port 48308 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 19:02:50,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346170.6258512, 'message': 'Dec 6 19:02:49 hqnl0246134 sshd[245430]: Disconnected from invalid user testuser 164.92.66.116 port 48308 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 19:02:54,653] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.235.114', 'timestamp': 1670346174.628776, 'message': 'Dec 6 19:02:53 hqnl0246134 sshd[245432]: Invalid user mukesh from 159.65.235.114 port 55854', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 19:02:54,677] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.65.235.114', 'timestamp': 1670346174.6290984, 'message': 'Dec 6 19:02:53 hqnl0246134 sshd[245432]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.65.235.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 19:02:54,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.65.235.114', 'timestamp': 1670346174.6292822, 'message': 'Dec 6 19:02:53 hqnl0246134 sshd[245432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.235.114 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 19:02:56,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.235.114', 'timestamp': 1670346176.6322207, 'message': 'Dec 6 19:02:55 hqnl0246134 sshd[245432]: Failed password for invalid user mukesh from 159.65.235.114 port 55854 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 19:02:58,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.65.235.114', 'timestamp': 1670346178.6334803, 'message': 'Dec 6 19:02:57 hqnl0246134 sshd[245432]: Disconnected from invalid user mukesh 159.65.235.114 port 55854 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 19:03:06,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346186.6432812, 'message': 'Dec 6 19:03:04 hqnl0246134 sshd[245447]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 19:03:06,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346186.6437333, 'message': 'Dec 6 19:03:04 hqnl0246134 sshd[245447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 19:03:08,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346188.6446598, 'message': 'Dec 6 19:03:06 hqnl0246134 sshd[245447]: Failed password for root from 61.177.173.18 port 53750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
WARNING [2022-12-06 19:03:09,653] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:03:09,683] defence360agent.internals.the_sink: SensorIncidentList(<16 item(s)>) processed in 0.0376 seconds
INFO [2022-12-06 19:03:10,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346190.6456351, 'message': 'Dec 6 19:03:09 hqnl0246134 sshd[245447]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 19:03:12,677] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346192.6490767, 'message': 'Dec 6 19:03:11 hqnl0246134 sshd[245447]: Failed password for root from 61.177.173.18 port 53750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 19:03:14,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346194.6510353, 'message': 'Dec 6 19:03:13 hqnl0246134 sshd[245447]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 19:03:16,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346196.6529272, 'message': 'Dec 6 19:03:15 hqnl0246134 sshd[245447]: Failed password for root from 61.177.173.18 port 53750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 19:03:17,978] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:03:17,978] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:03:17,986] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:03:17,997] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-06 19:03:20,588] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:03:20,588] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:03:20,597] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:03:20,609] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 19:03:22,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346202.6702683, 'message': 'Dec 6 19:03:21 hqnl0246134 sshd[245472]: Invalid user oradev from 206.42.33.143 port 49033', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 19:03:22,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346202.6705155, 'message': 'Dec 6 19:03:21 hqnl0246134 sshd[245472]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.42.33.143 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 19:03:22,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346202.6729157, 'message': 'Dec 6 19:03:21 hqnl0246134 sshd[245472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.42.33.143 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 19:03:24,693] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346204.672524, 'message': 'Dec 6 19:03:24 hqnl0246134 sshd[245472]: Failed password for invalid user oradev from 206.42.33.143 port 49033 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 19:03:26,696] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346206.6735654, 'message': 'Dec 6 19:03:25 hqnl0246134 sshd[245472]: Disconnected from invalid user oradev 206.42.33.143 port 49033 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 19:03:27,723] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:03:27,723] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:03:27,730] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:03:27,742] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 19:03:30,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.121.237.82', 'timestamp': 1670346210.7733002, 'message': 'Dec 6 19:03:28 hqnl0246134 sshd[245479]: Invalid user oracle from 168.121.237.82 port 59844', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 19:03:30,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '168.121.237.82', 'timestamp': 1670346210.7734866, 'message': 'Dec 6 19:03:29 hqnl0246134 sshd[245479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 168.121.237.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 19:03:30,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.121.237.82', 'timestamp': 1670346210.7735937, 'message': 'Dec 6 19:03:29 hqnl0246134 sshd[245479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.237.82 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:03:32,713] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.121.237.82', 'timestamp': 1670346212.6871572, 'message': 'Dec 6 19:03:31 hqnl0246134 sshd[245479]: Failed password for invalid user oracle from 168.121.237.82 port 59844 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 19:03:32,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.121.237.82', 'timestamp': 1670346212.6873991, 'message': 'Dec 6 19:03:32 hqnl0246134 sshd[245479]: Disconnected from invalid user oracle 168.121.237.82 port 59844 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 19:03:48,182] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:03:48,184] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:03:52,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346232.7326245, 'message': 'Dec 6 19:03:52 hqnl0246134 sshd[245493]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 19:03:52,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346232.7352781, 'message': 'Dec 6 19:03:52 hqnl0246134 sshd[245493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 19:03:56,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346236.7413688, 'message': 'Dec 6 19:03:55 hqnl0246134 sshd[245493]: Failed password for root from 61.177.173.18 port 27564 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 19:03:58,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346238.7441804, 'message': 'Dec 6 19:03:56 hqnl0246134 sshd[245493]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 19:03:58,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346238.7446153, 'message': 'Dec 6 19:03:58 hqnl0246134 sshd[245493]: Failed password for root from 61.177.173.18 port 27564 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 19:04:00,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346240.747363, 'message': 'Dec 6 19:03:59 hqnl0246134 sshd[245493]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 19:04:02,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346242.7505198, 'message': 'Dec 6 19:04:01 hqnl0246134 sshd[245493]: Failed password for root from 61.177.173.18 port 27564 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0242 seconds
WARNING [2022-12-06 19:04:10,283] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:04:10,316] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.6629 seconds
INFO [2022-12-06 19:04:17,948] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:04:17,949] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:04:17,957] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:04:17,969] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 19:04:20,831] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:04:20,832] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:04:20,864] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:04:20,907] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0577 seconds
INFO [2022-12-06 19:04:30,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.127.204', 'timestamp': 1670346270.8002312, 'message': 'Dec 6 19:04:30 hqnl0246134 sshd[245530]: Invalid user admin from 46.101.127.204 port 56914', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 19:04:30,852] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.127.204', 'timestamp': 1670346270.8004947, 'message': 'Dec 6 19:04:30 hqnl0246134 sshd[245530]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.127.204 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 19:04:30,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.127.204', 'timestamp': 1670346270.8013847, 'message': 'Dec 6 19:04:30 hqnl0246134 sshd[245530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.127.204 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1432 seconds
INFO [2022-12-06 19:04:34,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.127.204', 'timestamp': 1670346274.8047411, 'message': 'Dec 6 19:04:32 hqnl0246134 sshd[245530]: Failed password for invalid user admin from 46.101.127.204 port 56914 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 19:04:34,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.127.204', 'timestamp': 1670346274.8049946, 'message': 'Dec 6 19:04:34 hqnl0246134 sshd[245530]: Disconnected from invalid user admin 46.101.127.204 port 56914 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 19:04:36,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346276.8062398, 'message': 'Dec 6 19:04:36 hqnl0246134 sshd[245535]: Invalid user frank from 59.127.158.223 port 48622', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 19:04:36,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346276.806433, 'message': 'Dec 6 19:04:36 hqnl0246134 sshd[245535]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.127.158.223 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 19:04:36,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346276.807236, 'message': 'Dec 6 19:04:36 hqnl0246134 sshd[245535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.158.223 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 19:04:37,299] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:04:37,299] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:04:37,305] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:04:37,316] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0166 seconds
INFO [2022-12-06 19:04:38,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346278.808628, 'message': 'Dec 6 19:04:37 hqnl0246134 sshd[245535]: Failed password for invalid user frank from 59.127.158.223 port 48622 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 19:04:38,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346278.80884, 'message': 'Dec 6 19:04:38 hqnl0246134 sshd[245535]: Disconnected from invalid user frank 59.127.158.223 port 48622 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 19:04:40,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346280.8162532, 'message': 'Dec 6 19:04:39 hqnl0246134 sshd[245542]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 19:04:40,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346280.8166249, 'message': 'Dec 6 19:04:39 hqnl0246134 sshd[245542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 19:04:42,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346282.8178782, 'message': 'Dec 6 19:04:41 hqnl0246134 sshd[245542]: Failed password for root from 61.177.173.18 port 53663 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 19:04:44,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346284.8211296, 'message': 'Dec 6 19:04:44 hqnl0246134 sshd[245542]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:04:46,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346286.8230698, 'message': 'Dec 6 19:04:45 hqnl0246134 sshd[245542]: Failed password for root from 61.177.173.18 port 53663 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 19:04:46,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346286.823321, 'message': 'Dec 6 19:04:46 hqnl0246134 sshd[245542]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
WARNING [2022-12-06 19:04:48,189] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:04:48,189] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:04:48,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346288.825549, 'message': 'Dec 6 19:04:48 hqnl0246134 sshd[245542]: Failed password for root from 61.177.173.18 port 53663 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 19:05:06,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346306.8600256, 'message': 'Dec 6 19:05:05 hqnl0246134 sshd[245578]: Invalid user test01 from 102.223.92.101 port 30662', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 19:05:06,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346306.8606298, 'message': 'Dec 6 19:05:05 hqnl0246134 sshd[245578]: pam_imunify(sshd:auth): [IM360_RBL] The IP 102.223.92.101 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:05:06,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346306.8608105, 'message': 'Dec 6 19:05:05 hqnl0246134 sshd[245578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.223.92.101 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 19:05:08,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346308.862038, 'message': 'Dec 6 19:05:07 hqnl0246134 sshd[245578]: Failed password for invalid user test01 from 102.223.92.101 port 30662 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 19:05:08,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346308.8624415, 'message': 'Dec 6 19:05:07 hqnl0246134 sshd[245578]: Disconnected from invalid user test01 102.223.92.101 port 30662 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 19:05:09,664] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:05:09,689] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0330 seconds
INFO [2022-12-06 19:05:17,972] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:05:17,973] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:05:17,984] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:05:17,998] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0242 seconds
INFO [2022-12-06 19:05:20,976] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:05:20,977] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:05:20,984] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:05:20,996] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 19:05:26,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.217.58', 'timestamp': 1670346326.8933713, 'message': 'Dec 6 19:05:25 hqnl0246134 sshd[245613]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.217.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 19:05:26,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.217.58', 'timestamp': 1670346326.8936942, 'message': 'Dec 6 19:05:25 hqnl0246134 sshd[245613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.58 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 19:05:28,946] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.217.58', 'timestamp': 1670346328.895895, 'message': 'Dec 6 19:05:27 hqnl0246134 sshd[245613]: Failed password for root from 178.128.217.58 port 40350 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0500 seconds
INFO [2022-12-06 19:05:28,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346328.8972847, 'message': 'Dec 6 19:05:28 hqnl0246134 sshd[245618]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0498 seconds
INFO [2022-12-06 19:05:28,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346328.897495, 'message': 'Dec 6 19:05:28 hqnl0246134 sshd[245618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 19:05:30,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346330.8981848, 'message': 'Dec 6 19:05:29 hqnl0246134 sshd[245622]: pam_imunify(sshd:auth): [IM360_RBL] The IP 164.92.66.116 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 19:05:30,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346330.8985922, 'message': 'Dec 6 19:05:29 hqnl0246134 sshd[245618]: Failed password for root from 61.177.173.18 port 43667 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 19:05:30,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346330.8984427, 'message': 'Dec 6 19:05:29 hqnl0246134 sshd[245622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.116 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 19:05:30,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346330.898698, 'message': 'Dec 6 19:05:30 hqnl0246134 sshd[245618]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 19:05:32,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '164.92.66.116', 'timestamp': 1670346332.9010305, 'message': 'Dec 6 19:05:31 hqnl0246134 sshd[245622]: Failed password for root from 164.92.66.116 port 37230 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0558 seconds
INFO [2022-12-06 19:05:32,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346332.9019072, 'message': 'Dec 6 19:05:31 hqnl0246134 sshd[245618]: Failed password for root from 61.177.173.18 port 43667 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0555 seconds
INFO [2022-12-06 19:05:32,976] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346332.9020832, 'message': 'Dec 6 19:05:32 hqnl0246134 sshd[245618]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 19:05:34,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346334.9068794, 'message': 'Dec 6 19:05:34 hqnl0246134 sshd[245618]: Failed password for root from 61.177.173.18 port 43667 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 19:05:36,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346336.9144185, 'message': 'Dec 6 19:05:36 hqnl0246134 sshd[245626]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.42.33.143 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 19:05:36,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346336.914929, 'message': 'Dec 6 19:05:36 hqnl0246134 sshd[245626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.42.33.143 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 19:05:38,943] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346338.9170468, 'message': 'Dec 6 19:05:38 hqnl0246134 sshd[245626]: Failed password for root from 206.42.33.143 port 36298 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 19:05:43,203] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:05:43,203] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:05:43,213] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:05:43,226] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
WARNING [2022-12-06 19:05:48,193] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:05:48,195] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 19:06:09,671] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:06:09,700] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0377 seconds
INFO [2022-12-06 19:06:15,019] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346374.9893672, 'message': 'Dec 6 19:06:13 hqnl0246134 sshd[245665]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 19:06:15,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346374.9900184, 'message': 'Dec 6 19:06:13 hqnl0246134 sshd[245665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 19:06:17,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346376.9924479, 'message': 'Dec 6 19:06:15 hqnl0246134 sshd[245665]: Failed password for root from 61.177.173.18 port 63626 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 19:06:17,814] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:06:17,815] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:06:17,823] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:06:17,838] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-06 19:06:19,018] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346378.9988508, 'message': 'Dec 6 19:06:17 hqnl0246134 sshd[245665]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 19:06:20,583] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:06:20,584] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:06:20,591] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:06:20,606] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0211 seconds
INFO [2022-12-06 19:06:21,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346381.0049658, 'message': 'Dec 6 19:06:19 hqnl0246134 sshd[245665]: Failed password for root from 61.177.173.18 port 63626 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.1181 seconds
INFO [2022-12-06 19:06:21,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346381.005168, 'message': 'Dec 6 19:06:20 hqnl0246134 sshd[245665]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 19:06:23,026] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346383.0076127, 'message': 'Dec 6 19:06:22 hqnl0246134 sshd[245665]: Failed password for root from 61.177.173.18 port 63626 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 19:06:33,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346393.0259058, 'message': 'Dec 6 19:06:31 hqnl0246134 sshd[245713]: Invalid user user from 59.127.158.223 port 50958', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 19:06:33,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346393.0261245, 'message': 'Dec 6 19:06:31 hqnl0246134 sshd[245713]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.127.158.223 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 19:06:33,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346393.0262818, 'message': 'Dec 6 19:06:31 hqnl0246134 sshd[245713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.158.223 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0161 seconds
INFO [2022-12-06 19:06:35,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346395.0284283, 'message': 'Dec 6 19:06:33 hqnl0246134 sshd[245713]: Failed password for invalid user user from 59.127.158.223 port 50958 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 19:06:35,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346395.02863, 'message': 'Dec 6 19:06:33 hqnl0246134 sshd[245713]: Disconnected from invalid user user 59.127.158.223 port 50958 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 19:06:48,198] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:06:48,199] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:07:03,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346423.095172, 'message': 'Dec 6 19:07:02 hqnl0246134 sshd[245736]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 19:07:03,143] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346423.0955606, 'message': 'Dec 6 19:07:02 hqnl0246134 sshd[245736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 19:07:05,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346425.0973198, 'message': 'Dec 6 19:07:04 hqnl0246134 sshd[245736]: Failed password for root from 61.177.173.18 port 54116 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 19:07:09,128] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346429.1071725, 'message': 'Dec 6 19:07:07 hqnl0246134 sshd[245736]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-06 19:07:09,674] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:07:09,702] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0360 seconds
INFO [2022-12-06 19:07:09,883] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 19:07:09,956] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 19:07:09,957] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 19:07:09,958] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 19:07:09,958] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 19:07:09,958] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 19:07:09,967] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 19:07:09,982] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0232 seconds
WARNING [2022-12-06 19:07:09,988] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 19:07:09,991] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:07:10,007] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0301 seconds
INFO [2022-12-06 19:07:10,009] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0285 seconds
INFO [2022-12-06 19:07:11,133] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346431.1143398, 'message': 'Dec 6 19:07:09 hqnl0246134 sshd[245736]: Failed password for root from 61.177.173.18 port 54116 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 19:07:13,140] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346433.12019, 'message': 'Dec 6 19:07:11 hqnl0246134 sshd[245736]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 19:07:15,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346435.1284745, 'message': 'Dec 6 19:07:13 hqnl0246134 sshd[245736]: Failed password for root from 61.177.173.18 port 54116 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 19:07:17,913] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:07:17,914] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:07:17,922] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:07:17,933] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 19:07:20,606] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:07:20,606] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:07:20,613] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:07:20,625] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 19:07:40,086] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 19:07:40,086] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 19:07:40,087] im360.plugins.client360: Waiting 3 minutes before retry...
WARNING [2022-12-06 19:07:48,202] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:07:48,203] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:07:49,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346469.197436, 'message': 'Dec 6 19:07:47 hqnl0246134 sshd[245782]: Invalid user maint from 206.42.33.143 port 51235', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 19:07:49,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346469.2050602, 'message': 'Dec 6 19:07:47 hqnl0246134 sshd[245782]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.42.33.143 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 19:07:49,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346469.2052367, 'message': 'Dec 6 19:07:47 hqnl0246134 sshd[245782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.42.33.143 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 19:07:51,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346471.2019138, 'message': 'Dec 6 19:07:49 hqnl0246134 sshd[245782]: Failed password for invalid user maint from 206.42.33.143 port 51235 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 19:07:51,231] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346471.2021441, 'message': 'Dec 6 19:07:49 hqnl0246134 sshd[245784]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 19:07:51,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346471.202293, 'message': 'Dec 6 19:07:49 hqnl0246134 sshd[245782]: Disconnected from invalid user maint 206.42.33.143 port 51235 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 19:07:51,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346471.2024724, 'message': 'Dec 6 19:07:49 hqnl0246134 sshd[245784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 19:07:52,644] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:07:52,644] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:07:52,651] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:07:52,663] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 19:07:53,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346473.204213, 'message': 'Dec 6 19:07:51 hqnl0246134 sshd[245784]: Failed password for root from 61.177.173.18 port 33834 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 19:07:53,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346473.2044241, 'message': 'Dec 6 19:07:52 hqnl0246134 sshd[245784]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 19:07:55,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346475.204964, 'message': 'Dec 6 19:07:53 hqnl0246134 sshd[245784]: Failed password for root from 61.177.173.18 port 33834 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 19:07:55,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346475.2052505, 'message': 'Dec 6 19:07:54 hqnl0246134 sshd[245784]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0383 seconds
INFO [2022-12-06 19:07:57,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346477.2067215, 'message': 'Dec 6 19:07:56 hqnl0246134 sshd[245784]: Failed password for root from 61.177.173.18 port 33834 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 19:08:05,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346485.2152395, 'message': 'Dec 6 19:08:04 hqnl0246134 sshd[245795]: Invalid user chrome from 79.225.71.198 port 32792', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 19:08:05,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346485.21546, 'message': 'Dec 6 19:08:04 hqnl0246134 sshd[245795]: pam_imunify(sshd:auth): [IM360_RBL] The IP 79.225.71.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 19:08:05,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346485.2156236, 'message': 'Dec 6 19:08:04 hqnl0246134 sshd[245795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.225.71.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 19:08:07,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346487.2173502, 'message': 'Dec 6 19:08:06 hqnl0246134 sshd[245795]: Failed password for invalid user chrome from 79.225.71.198 port 32792 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 19:08:09,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346489.2200942, 'message': 'Dec 6 19:08:08 hqnl0246134 sshd[245795]: Disconnected from invalid user chrome 79.225.71.198 port 32792 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0408 seconds
WARNING [2022-12-06 19:08:09,677] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:08:09,705] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0351 seconds
INFO [2022-12-06 19:08:17,866] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:08:17,868] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:08:17,887] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:08:17,910] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0405 seconds
INFO [2022-12-06 19:08:20,427] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:08:20,428] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:08:20,437] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:08:20,449] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-06 19:08:25,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346505.2462761, 'message': 'Dec 6 19:08:24 hqnl0246134 sshd[245831]: Invalid user testuser from 157.245.157.93 port 33290', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 19:08:25,290] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346505.2467458, 'message': 'Dec 6 19:08:25 hqnl0246134 sshd[245831]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.245.157.93 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 19:08:25,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346505.247024, 'message': 'Dec 6 19:08:25 hqnl0246134 sshd[245831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.157.93 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 19:08:29,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346509.2537217, 'message': 'Dec 6 19:08:27 hqnl0246134 sshd[245831]: Failed password for invalid user testuser from 157.245.157.93 port 33290 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 19:08:31,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346511.2576168, 'message': 'Dec 6 19:08:29 hqnl0246134 sshd[245831]: Disconnected from invalid user testuser 157.245.157.93 port 33290 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0406 seconds
INFO [2022-12-06 19:08:31,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346511.2582505, 'message': 'Dec 6 19:08:30 hqnl0246134 sshd[245833]: Invalid user testuser from 102.223.92.101 port 12923', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-06 19:08:31,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346511.2589874, 'message': 'Dec 6 19:08:31 hqnl0246134 sshd[245833]: pam_imunify(sshd:auth): [IM360_RBL] The IP 102.223.92.101 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 19:08:31,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346511.259177, 'message': 'Dec 6 19:08:31 hqnl0246134 sshd[245833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.223.92.101 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 19:08:33,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346513.2627506, 'message': 'Dec 6 19:08:33 hqnl0246134 sshd[245833]: Failed password for invalid user testuser from 102.223.92.101 port 12923 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 19:08:35,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '102.223.92.101', 'timestamp': 1670346515.2680163, 'message': 'Dec 6 19:08:33 hqnl0246134 sshd[245833]: Disconnected from invalid user testuser 102.223.92.101 port 12923 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 19:08:35,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346515.2684693, 'message': 'Dec 6 19:08:34 hqnl0246134 sshd[245835]: Invalid user tester from 59.127.158.223 port 53318', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 19:08:35,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346515.2687244, 'message': 'Dec 6 19:08:34 hqnl0246134 sshd[245835]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.127.158.223 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 19:08:35,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346515.26958, 'message': 'Dec 6 19:08:34 hqnl0246134 sshd[245835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.158.223 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 19:08:37,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346517.2714992, 'message': 'Dec 6 19:08:36 hqnl0246134 sshd[245835]: Failed password for invalid user tester from 59.127.158.223 port 53318 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 19:08:37,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346517.2717059, 'message': 'Dec 6 19:08:37 hqnl0246134 sshd[245838]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 19:08:37,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346517.2721183, 'message': 'Dec 6 19:08:37 hqnl0246134 sshd[245838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 19:08:39,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670346519.2744188, 'message': 'Dec 6 19:08:37 hqnl0246134 sshd[245835]: Disconnected from invalid user tester 59.127.158.223 port 53318 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 19:08:41,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346521.2769537, 'message': 'Dec 6 19:08:39 hqnl0246134 sshd[245838]: Failed password for root from 61.177.173.18 port 56453 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0395 seconds
INFO [2022-12-06 19:08:43,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346523.281233, 'message': 'Dec 6 19:08:41 hqnl0246134 sshd[245838]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 19:08:45,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346525.2847943, 'message': 'Dec 6 19:08:43 hqnl0246134 sshd[245838]: Failed password for root from 61.177.173.18 port 56453 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 19:08:45,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346525.28578, 'message': 'Dec 6 19:08:43 hqnl0246134 sshd[245838]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 19:08:47,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346527.2868016, 'message': 'Dec 6 19:08:45 hqnl0246134 sshd[245838]: Failed password for root from 61.177.173.18 port 56453 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 19:08:48,205] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:08:48,206] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:08:53,337] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.121.237.82', 'timestamp': 1670346533.3058014, 'message': 'Dec 6 19:08:53 hqnl0246134 sshd[245851]: Invalid user git from 168.121.237.82 port 50870', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 19:08:53,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '168.121.237.82', 'timestamp': 1670346533.3060875, 'message': 'Dec 6 19:08:53 hqnl0246134 sshd[245851]: pam_imunify(sshd:auth): [IM360_RBL] The IP 168.121.237.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 19:08:53,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.121.237.82', 'timestamp': 1670346533.3073487, 'message': 'Dec 6 19:08:53 hqnl0246134 sshd[245851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.237.82 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:08:55,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.121.237.82', 'timestamp': 1670346535.3124118, 'message': 'Dec 6 19:08:55 hqnl0246134 sshd[245851]: Failed password for invalid user git from 168.121.237.82 port 50870 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 19:08:57,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.121.237.82', 'timestamp': 1670346537.3156443, 'message': 'Dec 6 19:08:55 hqnl0246134 sshd[245851]: Disconnected from invalid user git 168.121.237.82 port 50870 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0278 seconds
WARNING [2022-12-06 19:09:09,684] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:09:09,718] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0441 seconds
INFO [2022-12-06 19:09:17,847] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:09:17,847] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:09:17,856] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:09:17,868] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 19:09:21,041] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:09:21,042] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:09:21,056] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:09:21,073] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0307 seconds
INFO [2022-12-06 19:09:27,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346567.3728933, 'message': 'Dec 6 19:09:25 hqnl0246134 sshd[246008]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 19:09:27,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346567.3732884, 'message': 'Dec 6 19:09:25 hqnl0246134 sshd[246008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 19:09:29,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346569.3781276, 'message': 'Dec 6 19:09:28 hqnl0246134 sshd[246008]: Failed password for root from 61.177.173.18 port 38651 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 19:09:31,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346571.3807297, 'message': 'Dec 6 19:09:30 hqnl0246134 sshd[246008]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 19:09:33,406] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346573.3838704, 'message': 'Dec 6 19:09:32 hqnl0246134 sshd[246008]: Failed password for root from 61.177.173.18 port 38651 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 19:09:35,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346575.3867397, 'message': 'Dec 6 19:09:34 hqnl0246134 sshd[246008]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 19:09:37,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346577.3904004, 'message': 'Dec 6 19:09:36 hqnl0246134 sshd[246008]: Failed password for root from 61.177.173.18 port 38651 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 19:09:41,419] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:09:41,420] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:09:41,428] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:09:41,440] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
WARNING [2022-12-06 19:09:48,208] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:09:48,210] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:09:59,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346599.4288125, 'message': 'Dec 6 19:09:58 hqnl0246134 sshd[246027]: Invalid user deploy from 206.42.33.143 port 37942', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 19:09:59,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346599.4293797, 'message': 'Dec 6 19:09:58 hqnl0246134 sshd[246027]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.42.33.143 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 19:09:59,493] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346599.4295666, 'message': 'Dec 6 19:09:58 hqnl0246134 sshd[246027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.42.33.143 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 19:10:01,472] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346601.438405, 'message': 'Dec 6 19:09:59 hqnl0246134 sshd[246027]: Failed password for invalid user deploy from 206.42.33.143 port 37942 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 19:10:01,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.42.33.143', 'timestamp': 1670346601.4387207, 'message': 'Dec 6 19:10:00 hqnl0246134 sshd[246027]: Disconnected from invalid user deploy 206.42.33.143 port 37942 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0318 seconds
WARNING [2022-12-06 19:10:09,686] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:10:09,713] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0360 seconds
INFO [2022-12-06 19:10:13,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346613.4627647, 'message': 'Dec 6 19:10:12 hqnl0246134 sshd[246052]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 19:10:13,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346613.4630532, 'message': 'Dec 6 19:10:12 hqnl0246134 sshd[246052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 19:10:15,515] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346615.4646041, 'message': 'Dec 6 19:10:14 hqnl0246134 sshd[246052]: Failed password for root from 61.177.173.18 port 10741 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0495 seconds
INFO [2022-12-06 19:10:15,560] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346615.465025, 'message': 'Dec 6 19:10:14 hqnl0246134 sshd[246052]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0446 seconds
INFO [2022-12-06 19:10:17,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346617.4657152, 'message': 'Dec 6 19:10:17 hqnl0246134 sshd[246052]: Failed password for root from 61.177.173.18 port 10741 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0725 seconds
INFO [2022-12-06 19:10:19,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346619.4687881, 'message': 'Dec 6 19:10:19 hqnl0246134 sshd[246052]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 19:10:20,022] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:10:20,022] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:10:20,030] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:10:20,041] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 19:10:22,822] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:10:22,823] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:10:22,830] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:10:22,843] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 19:10:23,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346623.4749608, 'message': 'Dec 6 19:10:21 hqnl0246134 sshd[246052]: Failed password for root from 61.177.173.18 port 10741 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 19:10:25,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.123', 'timestamp': 1670346625.4788613, 'message': 'Dec 6 19:10:24 hqnl0246134 sshd[246087]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.123 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 19:10:25,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.123', 'timestamp': 1670346625.4791586, 'message': 'Dec 6 19:10:24 hqnl0246134 sshd[246087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.123 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 19:10:27,504] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '152.89.196.123', 'timestamp': 1670346627.4807372, 'message': 'Dec 6 19:10:26 hqnl0246134 sshd[246087]: Failed password for root from 152.89.196.123 port 42194 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0229 seconds
WARNING [2022-12-06 19:10:48,214] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:10:48,216] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:11:01,561] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346661.5323024, 'message': 'Dec 6 19:11:00 hqnl0246134 sshd[246103]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 19:11:01,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346661.5331745, 'message': 'Dec 6 19:11:00 hqnl0246134 sshd[246103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 19:11:01,748] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 19:11:01,817] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 19:11:01,818] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 19:11:01,819] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 19:11:01,819] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 19:11:01,819] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 19:11:01,831] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 19:11:01,849] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0289 seconds
WARNING [2022-12-06 19:11:01,857] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 19:11:01,859] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:11:01,881] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0380 seconds
INFO [2022-12-06 19:11:01,883] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0368 seconds
INFO [2022-12-06 19:11:03,561] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346663.5353065, 'message': 'Dec 6 19:11:01 hqnl0246134 sshd[246103]: Failed password for root from 61.177.173.18 port 49828 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 19:11:03,587] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346663.5355594, 'message': 'Dec 6 19:11:02 hqnl0246134 sshd[246103]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 19:11:05,559] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346665.5378358, 'message': 'Dec 6 19:11:04 hqnl0246134 sshd[246103]: Failed password for root from 61.177.173.18 port 49828 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 19:11:07,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346667.5457594, 'message': 'Dec 6 19:11:06 hqnl0246134 sshd[246103]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 19:11:09,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346669.5468116, 'message': 'Dec 6 19:11:08 hqnl0246134 sshd[246103]: Failed password for root from 61.177.173.18 port 49828 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0534 seconds
WARNING [2022-12-06 19:11:09,702] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:11:09,781] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.1007 seconds
INFO [2022-12-06 19:11:12,308] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:11:12,308] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:11:12,318] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:11:12,332] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0228 seconds
INFO [2022-12-06 19:11:18,096] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:11:18,097] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:11:18,107] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:11:18,120] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0223 seconds
INFO [2022-12-06 19:11:20,950] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:11:20,951] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:11:20,961] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:11:20,978] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0257 seconds
INFO [2022-12-06 19:11:31,949] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 19:11:31,950] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 19:11:31,951] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 19:11:37,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346697.5819833, 'message': 'Dec 6 19:11:35 hqnl0246134 sshd[246167]: Invalid user admin from 157.245.157.93 port 50162', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 19:11:37,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346697.582453, 'message': 'Dec 6 19:11:35 hqnl0246134 sshd[246167]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.245.157.93 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 19:11:37,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346697.5826209, 'message': 'Dec 6 19:11:35 hqnl0246134 sshd[246167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.157.93 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 19:11:37,660] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346697.5827608, 'message': 'Dec 6 19:11:37 hqnl0246134 sshd[246167]: Failed password for invalid user admin from 157.245.157.93 port 50162 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 19:11:39,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346699.5819433, 'message': 'Dec 6 19:11:37 hqnl0246134 sshd[246167]: Disconnected from invalid user admin 157.245.157.93 port 50162 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 19:11:47,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346707.5903935, 'message': 'Dec 6 19:11:46 hqnl0246134 sshd[246177]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 19:11:47,637] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346707.5943577, 'message': 'Dec 6 19:11:46 hqnl0246134 sshd[246177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 19:11:48,221] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:11:48,222] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:11:49,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346709.592769, 'message': 'Dec 6 19:11:47 hqnl0246134 sshd[246177]: Failed password for root from 61.177.173.18 port 27188 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 19:11:49,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346709.593073, 'message': 'Dec 6 19:11:48 hqnl0246134 sshd[246177]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 19:11:51,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346711.5958564, 'message': 'Dec 6 19:11:50 hqnl0246134 sshd[246177]: Failed password for root from 61.177.173.18 port 27188 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 19:11:51,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346711.5961957, 'message': 'Dec 6 19:11:51 hqnl0246134 sshd[246177]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
WARNING [2022-12-06 19:11:53,816] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 19:11:55,616] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346715.5983746, 'message': 'Dec 6 19:11:53 hqnl0246134 sshd[246177]: Failed password for root from 61.177.173.18 port 27188 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 19:12:09,692] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:12:09,714] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0294 seconds
INFO [2022-12-06 19:12:19,596] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:12:19,597] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:12:19,609] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:12:19,622] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-06 19:12:22,403] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:12:22,404] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:12:22,410] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:12:22,422] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-06 19:12:35,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346755.6548724, 'message': 'Dec 6 19:12:34 hqnl0246134 sshd[246223]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 19:12:35,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346755.6552866, 'message': 'Dec 6 19:12:34 hqnl0246134 sshd[246223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 19:12:37,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346757.6582189, 'message': 'Dec 6 19:12:36 hqnl0246134 sshd[246223]: Failed password for root from 61.177.173.18 port 62831 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 19:12:37,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346757.6586087, 'message': 'Dec 6 19:12:36 hqnl0246134 sshd[246223]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 19:12:39,688] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346759.6607058, 'message': 'Dec 6 19:12:38 hqnl0246134 sshd[246223]: Failed password for root from 61.177.173.18 port 62831 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 19:12:39,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346759.6610484, 'message': 'Dec 6 19:12:39 hqnl0246134 sshd[246223]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 19:12:41,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346761.66368, 'message': 'Dec 6 19:12:41 hqnl0246134 sshd[246223]: Failed password for root from 61.177.173.18 port 62831 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 19:12:46,190] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:12:46,191] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:12:46,205] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:12:46,222] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0291 seconds
WARNING [2022-12-06 19:12:48,225] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:12:48,226] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:13:02,782] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 19:13:02,790] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:13:02,805] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0223 seconds
INFO [2022-12-06 19:13:03,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346783.689353, 'message': 'Dec 6 19:13:01 hqnl0246134 sshd[246250]: Invalid user stefano from 133.130.99.35 port 34062', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 19:13:03,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346783.689576, 'message': 'Dec 6 19:13:02 hqnl0246134 sshd[246250]: pam_imunify(sshd:auth): [IM360_RBL] The IP 133.130.99.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:13:03,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346783.689816, 'message': 'Dec 6 19:13:02 hqnl0246134 sshd[246250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.99.35 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:13:05,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346785.6945422, 'message': 'Dec 6 19:13:04 hqnl0246134 sshd[246250]: Failed password for invalid user stefano from 133.130.99.35 port 34062 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 19:13:07,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346787.698393, 'message': 'Dec 6 19:13:06 hqnl0246134 sshd[246250]: Disconnected from invalid user stefano 133.130.99.35 port 34062 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0249 seconds
WARNING [2022-12-06 19:13:09,693] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:13:09,713] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0268 seconds
INFO [2022-12-06 19:13:17,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346797.7093558, 'message': 'Dec 6 19:13:16 hqnl0246134 sshd[246285]: Invalid user deborah from 79.225.71.198 port 51544', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 19:13:17,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346797.7098942, 'message': 'Dec 6 19:13:16 hqnl0246134 sshd[246285]: pam_imunify(sshd:auth): [IM360_RBL] The IP 79.225.71.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 19:13:17,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346797.7109966, 'message': 'Dec 6 19:13:16 hqnl0246134 sshd[246285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.225.71.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 19:13:18,127] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:13:18,127] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:13:18,136] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:13:18,158] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0298 seconds
INFO [2022-12-06 19:13:19,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346799.7111814, 'message': 'Dec 6 19:13:18 hqnl0246134 sshd[246285]: Failed password for invalid user deborah from 79.225.71.198 port 51544 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 19:13:19,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '79.225.71.198', 'timestamp': 1670346799.711394, 'message': 'Dec 6 19:13:18 hqnl0246134 sshd[246285]: Disconnected from invalid user deborah 79.225.71.198 port 51544 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 19:13:21,423] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:13:21,423] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:13:21,439] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:13:21,459] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0339 seconds
INFO [2022-12-06 19:13:21,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346801.7176042, 'message': 'Dec 6 19:13:21 hqnl0246134 sshd[246295]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 19:13:21,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346801.7178662, 'message': 'Dec 6 19:13:21 hqnl0246134 sshd[246295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 19:13:23,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346803.7203717, 'message': 'Dec 6 19:13:23 hqnl0246134 sshd[246295]: Failed password for root from 61.177.173.18 port 30203 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 19:13:25,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346805.7232702, 'message': 'Dec 6 19:13:25 hqnl0246134 sshd[246295]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 19:13:27,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346807.7289648, 'message': 'Dec 6 19:13:27 hqnl0246134 sshd[246295]: Failed password for root from 61.177.173.18 port 30203 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 19:13:31,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346811.7354014, 'message': 'Dec 6 19:13:29 hqnl0246134 sshd[246295]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 19:13:31,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346811.7357483, 'message': 'Dec 6 19:13:31 hqnl0246134 sshd[246295]: Failed password for root from 61.177.173.18 port 30203 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:13:33,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346813.7380953, 'message': 'Dec 6 19:13:32 hqnl0246134 sshd[246300]: Invalid user alex from 133.130.99.35 port 39784', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 19:13:33,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346813.7384152, 'message': 'Dec 6 19:13:32 hqnl0246134 sshd[246300]: pam_imunify(sshd:auth): [IM360_RBL] The IP 133.130.99.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 19:13:33,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346813.7385726, 'message': 'Dec 6 19:13:32 hqnl0246134 sshd[246300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.99.35 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 19:13:35,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346815.7409472, 'message': 'Dec 6 19:13:34 hqnl0246134 sshd[246300]: Failed password for invalid user alex from 133.130.99.35 port 39784 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:13:37,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346817.7424579, 'message': 'Dec 6 19:13:36 hqnl0246134 sshd[246300]: Disconnected from invalid user alex 133.130.99.35 port 39784 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0219 seconds
WARNING [2022-12-06 19:13:48,229] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:13:48,231] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:14:05,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346845.7833734, 'message': 'Dec 6 19:14:04 hqnl0246134 sshd[246325]: Invalid user linux from 133.130.99.35 port 45504', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 19:14:05,856] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346845.783897, 'message': 'Dec 6 19:14:04 hqnl0246134 sshd[246325]: pam_imunify(sshd:auth): [IM360_RBL] The IP 133.130.99.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 19:14:05,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346845.7841413, 'message': 'Dec 6 19:14:04 hqnl0246134 sshd[246325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.99.35 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:14:07,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346847.7854142, 'message': 'Dec 6 19:14:05 hqnl0246134 sshd[246325]: Failed password for invalid user linux from 133.130.99.35 port 45504 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 19:14:07,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '133.130.99.35', 'timestamp': 1670346847.7856793, 'message': 'Dec 6 19:14:07 hqnl0246134 sshd[246325]: Disconnected from invalid user linux 133.130.99.35 port 45504 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0327 seconds
WARNING [2022-12-06 19:14:09,697] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:14:09,721] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0316 seconds
INFO [2022-12-06 19:14:09,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346849.7858438, 'message': 'Dec 6 19:14:09 hqnl0246134 sshd[246329]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 19:14:09,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346849.78638, 'message': 'Dec 6 19:14:09 hqnl0246134 sshd[246329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 19:14:10,119] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:14:10,120] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:14:10,129] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:14:10,141] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 19:14:13,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346853.7943726, 'message': 'Dec 6 19:14:11 hqnl0246134 sshd[246329]: Failed password for root from 61.177.173.18 port 61262 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 19:14:13,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346853.794785, 'message': 'Dec 6 19:14:13 hqnl0246134 sshd[246329]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 19:14:15,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346855.797548, 'message': 'Dec 6 19:14:15 hqnl0246134 sshd[246329]: Failed password for root from 61.177.173.18 port 61262 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 19:14:17,833] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346857.7979467, 'message': 'Dec 6 19:14:15 hqnl0246134 sshd[246329]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 19:14:17,978] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:14:17,978] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:14:17,985] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:14:17,996] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 19:14:19,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346859.8043766, 'message': 'Dec 6 19:14:18 hqnl0246134 sshd[246329]: Failed password for root from 61.177.173.18 port 61262 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 19:14:20,882] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:14:20,882] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:14:20,894] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:14:20,908] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0254 seconds
INFO [2022-12-06 19:14:45,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346885.8494205, 'message': 'Dec 6 19:14:45 hqnl0246134 sshd[246360]: Invalid user taller from 157.245.157.93 port 38804', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 19:14:45,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346885.8499398, 'message': 'Dec 6 19:14:45 hqnl0246134 sshd[246360]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.245.157.93 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 19:14:45,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346885.8501282, 'message': 'Dec 6 19:14:45 hqnl0246134 sshd[246360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.157.93 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
WARNING [2022-12-06 19:14:48,233] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:14:48,234] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:14:49,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346889.8547187, 'message': 'Dec 6 19:14:48 hqnl0246134 sshd[246360]: Failed password for invalid user taller from 157.245.157.93 port 38804 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 19:14:51,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.245.157.93', 'timestamp': 1670346891.8570144, 'message': 'Dec 6 19:14:49 hqnl0246134 sshd[246360]: Disconnected from invalid user taller 157.245.157.93 port 38804 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 19:14:57,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346897.8650985, 'message': 'Dec 6 19:14:57 hqnl0246134 sshd[246373]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 19:14:57,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346897.8654299, 'message': 'Dec 6 19:14:57 hqnl0246134 sshd[246373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 19:14:59,894] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346899.8697817, 'message': 'Dec 6 19:14:59 hqnl0246134 sshd[246373]: Failed password for root from 61.177.173.18 port 34054 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 19:15:01,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346901.8741586, 'message': 'Dec 6 19:15:01 hqnl0246134 sshd[246373]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 19:15:03,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346903.8774445, 'message': 'Dec 6 19:15:03 hqnl0246134 sshd[246373]: Failed password for root from 61.177.173.18 port 34054 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 19:15:05,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346905.8796966, 'message': 'Dec 6 19:15:05 hqnl0246134 sshd[246373]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 19:15:07,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346907.884994, 'message': 'Dec 6 19:15:07 hqnl0246134 sshd[246373]: Failed password for root from 61.177.173.18 port 34054 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
WARNING [2022-12-06 19:15:09,699] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:15:09,726] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0341 seconds
INFO [2022-12-06 19:15:18,001] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:15:18,002] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:15:18,013] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:15:18,029] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0241 seconds
INFO [2022-12-06 19:15:20,631] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:15:20,632] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:15:20,640] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:15:20,651] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 19:15:45,984] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346945.9594808, 'message': 'Dec 6 19:15:45 hqnl0246134 sshd[246452]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 19:15:46,017] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346945.960055, 'message': 'Dec 6 19:15:45 hqnl0246134 sshd[246452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 19:15:47,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346947.9611297, 'message': 'Dec 6 19:15:47 hqnl0246134 sshd[246452]: Failed password for root from 61.177.173.18 port 63191 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
WARNING [2022-12-06 19:15:48,239] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:15:48,240] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:15:49,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346949.964458, 'message': 'Dec 6 19:15:49 hqnl0246134 sshd[246452]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 19:15:51,990] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346951.967368, 'message': 'Dec 6 19:15:51 hqnl0246134 sshd[246452]: Failed password for root from 61.177.173.18 port 63191 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 19:15:52,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346951.9675825, 'message': 'Dec 6 19:15:51 hqnl0246134 sshd[246452]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 19:15:55,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346955.9725175, 'message': 'Dec 6 19:15:54 hqnl0246134 sshd[246452]: Failed password for root from 61.177.173.18 port 63191 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 19:16:00,194] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:16:00,195] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:16:00,206] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:16:00,218] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0226 seconds
WARNING [2022-12-06 19:16:09,702] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:16:09,721] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0263 seconds
INFO [2022-12-06 19:16:18,320] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:16:18,321] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:16:18,329] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:16:18,340] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 19:16:21,006] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:16:21,007] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:16:21,018] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:16:21,031] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-06 19:16:32,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346992.0350778, 'message': 'Dec 6 19:16:31 hqnl0246134 sshd[246500]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 19:16:32,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346992.0358486, 'message': 'Dec 6 19:16:31 hqnl0246134 sshd[246500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 19:16:34,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346994.0418987, 'message': 'Dec 6 19:16:33 hqnl0246134 sshd[246500]: Failed password for root from 61.177.173.18 port 34091 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 19:16:36,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346996.0447748, 'message': 'Dec 6 19:16:34 hqnl0246134 sshd[246500]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 19:16:38,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670346998.0538807, 'message': 'Dec 6 19:16:36 hqnl0246134 sshd[246500]: Failed password for root from 61.177.173.18 port 34091 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 19:16:40,082] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347000.0535767, 'message': 'Dec 6 19:16:38 hqnl0246134 sshd[246500]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 19:16:40,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347000.0542703, 'message': 'Dec 6 19:16:40 hqnl0246134 sshd[246500]: Failed password for root from 61.177.173.18 port 34091 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0244 seconds
WARNING [2022-12-06 19:16:48,244] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:16:48,246] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 19:17:09,708] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:17:09,732] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0335 seconds
INFO [2022-12-06 19:17:15,656] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 19:17:15,757] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 19:17:15,758] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 19:17:15,759] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 19:17:15,759] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 19:17:15,759] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 19:17:15,774] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 19:17:15,796] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0359 seconds
WARNING [2022-12-06 19:17:15,808] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 19:17:15,812] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:17:15,844] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0550 seconds
INFO [2022-12-06 19:17:15,846] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0533 seconds
INFO [2022-12-06 19:17:18,019] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:17:18,020] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:17:18,030] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:17:18,043] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 19:17:20,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347040.103154, 'message': 'Dec 6 19:17:19 hqnl0246134 sshd[246553]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:17:20,142] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347040.103413, 'message': 'Dec 6 19:17:20 hqnl0246134 sshd[246553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:17:20,984] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:17:20,985] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:17:20,994] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:17:21,005] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 19:17:24,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347044.1060894, 'message': 'Dec 6 19:17:22 hqnl0246134 sshd[246553]: Failed password for root from 61.177.173.18 port 19357 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-06 19:17:26,142] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347046.1091223, 'message': 'Dec 6 19:17:24 hqnl0246134 sshd[246553]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 19:17:26,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347046.1094642, 'message': 'Dec 6 19:17:25 hqnl0246134 sshd[246553]: Failed password for root from 61.177.173.18 port 19357 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 19:17:28,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347048.1099734, 'message': 'Dec 6 19:17:26 hqnl0246134 sshd[246553]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0763 seconds
INFO [2022-12-06 19:17:30,133] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347050.1126366, 'message': 'Dec 6 19:17:28 hqnl0246134 sshd[246553]: Failed password for root from 61.177.173.18 port 19357 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 19:17:33,447] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:17:33,448] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:17:33,455] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:17:33,469] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
WARNING [2022-12-06 19:17:48,247] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:17:48,248] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:17:48,571] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 19:17:48,572] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 19:17:48,573] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 19:18:08,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347088.1543505, 'message': 'Dec 6 19:18:06 hqnl0246134 sshd[246591]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 19:18:08,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347088.154746, 'message': 'Dec 6 19:18:06 hqnl0246134 sshd[246591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0272 seconds
WARNING [2022-12-06 19:18:09,708] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:18:09,727] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0258 seconds
INFO [2022-12-06 19:18:10,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347090.1570807, 'message': 'Dec 6 19:18:08 hqnl0246134 sshd[246591]: Failed password for root from 61.177.173.18 port 51042 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:18:10,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347090.1572611, 'message': 'Dec 6 19:18:08 hqnl0246134 sshd[246591]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 19:18:12,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347092.1578536, 'message': 'Dec 6 19:18:11 hqnl0246134 sshd[246591]: Failed password for root from 61.177.173.18 port 51042 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:18:14,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347094.160367, 'message': 'Dec 6 19:18:13 hqnl0246134 sshd[246591]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:18:16,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347096.1635623, 'message': 'Dec 6 19:18:14 hqnl0246134 sshd[246591]: Failed password for root from 61.177.173.18 port 51042 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 19:18:18,219] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:18:18,219] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:18:18,230] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:18:18,252] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0316 seconds
INFO [2022-12-06 19:18:20,847] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:18:20,848] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:18:20,856] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:18:20,867] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
WARNING [2022-12-06 19:18:48,252] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:18:48,254] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:18:54,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347134.217816, 'message': 'Dec 6 19:18:53 hqnl0246134 sshd[246649]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 19:18:54,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347134.2190151, 'message': 'Dec 6 19:18:53 hqnl0246134 sshd[246649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 19:18:56,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347136.2178912, 'message': 'Dec 6 19:18:54 hqnl0246134 sshd[246649]: Failed password for root from 61.177.173.18 port 25410 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 19:18:56,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347136.2180965, 'message': 'Dec 6 19:18:55 hqnl0246134 sshd[246649]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 19:18:58,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347138.2201056, 'message': 'Dec 6 19:18:57 hqnl0246134 sshd[246649]: Failed password for root from 61.177.173.18 port 25410 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 19:19:00,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347140.2218444, 'message': 'Dec 6 19:18:59 hqnl0246134 sshd[246649]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 19:19:02,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347142.2248688, 'message': 'Dec 6 19:19:01 hqnl0246134 sshd[246649]: Failed password for root from 61.177.173.18 port 25410 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 19:19:04,560] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:19:04,560] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:19:04,567] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:19:04,578] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
WARNING [2022-12-06 19:19:09,714] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:19:09,736] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0292 seconds
INFO [2022-12-06 19:19:18,039] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:19:18,040] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:19:18,050] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:19:18,064] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0233 seconds
INFO [2022-12-06 19:19:20,700] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:19:20,701] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:19:20,708] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:19:20,719] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 19:19:40,294] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347180.2679496, 'message': 'Dec 6 19:19:39 hqnl0246134 sshd[246690]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 19:19:40,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347180.268542, 'message': 'Dec 6 19:19:39 hqnl0246134 sshd[246690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 19:19:42,290] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347182.2694857, 'message': 'Dec 6 19:19:41 hqnl0246134 sshd[246690]: Failed password for root from 61.177.173.18 port 58337 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:19:44,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347184.2697155, 'message': 'Dec 6 19:19:44 hqnl0246134 sshd[246690]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 19:19:48,259] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:19:48,261] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:19:48,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347188.2747967, 'message': 'Dec 6 19:19:46 hqnl0246134 sshd[246690]: Failed password for root from 61.177.173.18 port 58337 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 19:19:50,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347190.276959, 'message': 'Dec 6 19:19:48 hqnl0246134 sshd[246690]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 19:19:52,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347192.2834563, 'message': 'Dec 6 19:19:50 hqnl0246134 sshd[246690]: Failed password for root from 61.177.173.18 port 58337 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 19:20:09,717] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:20:09,736] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0262 seconds
INFO [2022-12-06 19:20:18,280] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:20:18,281] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:20:18,289] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:20:18,301] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 19:20:21,154] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:20:21,155] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:20:21,169] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:20:21,187] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0305 seconds
INFO [2022-12-06 19:20:28,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347228.3403761, 'message': 'Dec 6 19:20:26 hqnl0246134 sshd[246754]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 19:20:28,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347228.340624, 'message': 'Dec 6 19:20:26 hqnl0246134 sshd[246754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 19:20:30,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347230.3490038, 'message': 'Dec 6 19:20:29 hqnl0246134 sshd[246754]: Failed password for root from 61.177.173.18 port 34683 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 19:20:32,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347232.3553896, 'message': 'Dec 6 19:20:31 hqnl0246134 sshd[246754]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 19:20:34,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347234.3593724, 'message': 'Dec 6 19:20:33 hqnl0246134 sshd[246754]: Failed password for root from 61.177.173.18 port 34683 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 19:20:36,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347236.3623104, 'message': 'Dec 6 19:20:35 hqnl0246134 sshd[246754]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 19:20:38,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347238.3642256, 'message': 'Dec 6 19:20:37 hqnl0246134 sshd[246754]: Failed password for root from 61.177.173.18 port 34683 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 19:20:40,848] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:20:40,849] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:20:40,856] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:20:40,867] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
WARNING [2022-12-06 19:20:48,266] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:20:48,268] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 19:21:09,731] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:21:09,761] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0431 seconds
INFO [2022-12-06 19:21:16,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347276.4179957, 'message': 'Dec 6 19:21:15 hqnl0246134 sshd[246781]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 19:21:16,463] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347276.4184716, 'message': 'Dec 6 19:21:15 hqnl0246134 sshd[246781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 19:21:17,822] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:21:17,823] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 19:21:17,824] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
WARNING [2022-12-06 19:21:17,834] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:21:17,849] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0252 seconds
INFO [2022-12-06 19:21:17,890] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 19:21:17,890] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 19:21:17,891] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 19:21:17,891] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 19:21:17,891] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 19:21:17,900] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 19:21:17,916] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0244 seconds
WARNING [2022-12-06 19:21:17,923] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 19:21:17,925] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:21:17,942] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0314 seconds
INFO [2022-12-06 19:21:17,943] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0293 seconds
INFO [2022-12-06 19:21:18,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347278.417916, 'message': 'Dec 6 19:21:17 hqnl0246134 sshd[246781]: Failed password for root from 61.177.173.18 port 12901 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 19:21:20,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347280.4199128, 'message': 'Dec 6 19:21:19 hqnl0246134 sshd[246781]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 19:21:20,767] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:21:20,768] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:21:20,781] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:21:20,802] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0330 seconds
INFO [2022-12-06 19:21:22,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347282.4227033, 'message': 'Dec 6 19:21:21 hqnl0246134 sshd[246781]: Failed password for root from 61.177.173.18 port 12901 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 19:21:22,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347282.4230032, 'message': 'Dec 6 19:21:21 hqnl0246134 sshd[246781]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 19:21:24,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347284.4254754, 'message': 'Dec 6 19:21:24 hqnl0246134 sshd[246781]: Failed password for root from 61.177.173.18 port 12901 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 19:21:48,019] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 19:21:48,020] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 19:21:48,021] im360.plugins.client360: Waiting 6 minutes before retry...
WARNING [2022-12-06 19:21:48,270] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:21:48,271] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 19:21:53,819] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 19:22:04,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347324.4771807, 'message': 'Dec 6 19:22:03 hqnl0246134 sshd[246834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 19:22:04,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347324.477648, 'message': 'Dec 6 19:22:03 hqnl0246134 sshd[246834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 19:22:06,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347326.4778895, 'message': 'Dec 6 19:22:05 hqnl0246134 sshd[246834]: Failed password for root from 61.177.173.18 port 46948 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 19:22:08,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347328.4802585, 'message': 'Dec 6 19:22:07 hqnl0246134 sshd[246834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 19:22:09,736] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:22:09,759] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0377 seconds
INFO [2022-12-06 19:22:10,514] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347330.4835079, 'message': 'Dec 6 19:22:09 hqnl0246134 sshd[246834]: Failed password for root from 61.177.173.18 port 46948 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 19:22:12,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347332.4857452, 'message': 'Dec 6 19:22:12 hqnl0246134 sshd[246834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 19:22:14,524] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347334.4862382, 'message': 'Dec 6 19:22:14 hqnl0246134 sshd[246834]: Failed password for root from 61.177.173.18 port 46948 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 19:22:19,703] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:22:19,704] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:22:19,735] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:22:19,768] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0507 seconds
INFO [2022-12-06 19:22:21,067] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:22:21,068] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:22:21,078] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:22:21,090] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-06 19:22:24,155] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:22:24,155] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:22:24,167] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:22:24,190] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0343 seconds
WARNING [2022-12-06 19:22:48,275] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:22:48,276] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:22:52,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347372.5368686, 'message': 'Dec 6 19:22:50 hqnl0246134 sshd[246900]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 19:22:52,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347372.5372186, 'message': 'Dec 6 19:22:50 hqnl0246134 sshd[246900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 19:22:54,560] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347374.537641, 'message': 'Dec 6 19:22:53 hqnl0246134 sshd[246900]: Failed password for root from 61.177.173.18 port 22534 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 19:22:56,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347376.5428634, 'message': 'Dec 6 19:22:55 hqnl0246134 sshd[246900]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 19:22:56,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347376.5431495, 'message': 'Dec 6 19:22:56 hqnl0246134 sshd[246900]: Failed password for root from 61.177.173.18 port 22534 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 19:22:58,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347378.5447977, 'message': 'Dec 6 19:22:57 hqnl0246134 sshd[246900]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 19:23:00,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347380.548498, 'message': 'Dec 6 19:22:59 hqnl0246134 sshd[246900]: Failed password for root from 61.177.173.18 port 22534 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
WARNING [2022-12-06 19:23:09,737] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:23:09,768] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0429 seconds
INFO [2022-12-06 19:23:18,098] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:23:18,099] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:23:18,114] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:23:18,136] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0356 seconds
INFO [2022-12-06 19:23:20,842] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:23:20,842] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:23:20,849] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:23:20,860] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 19:23:38,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347418.5906675, 'message': 'Dec 6 19:23:37 hqnl0246134 sshd[246944]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 19:23:38,632] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347418.5910811, 'message': 'Dec 6 19:23:37 hqnl0246134 sshd[246944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 19:23:40,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347420.593271, 'message': 'Dec 6 19:23:39 hqnl0246134 sshd[246944]: Failed password for root from 61.177.173.18 port 44161 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 19:23:40,637] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347420.59354, 'message': 'Dec 6 19:23:39 hqnl0246134 sshd[246944]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 19:23:42,624] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347422.593796, 'message': 'Dec 6 19:23:41 hqnl0246134 sshd[246944]: Failed password for root from 61.177.173.18 port 44161 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 19:23:44,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347424.5948222, 'message': 'Dec 6 19:23:43 hqnl0246134 sshd[246944]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 19:23:46,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347426.596044, 'message': 'Dec 6 19:23:45 hqnl0246134 sshd[246944]: Failed password for root from 61.177.173.18 port 44161 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 19:23:48,278] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:23:48,279] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:23:48,722] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:23:48,722] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:23:48,731] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:23:48,743] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
WARNING [2022-12-06 19:24:09,735] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:24:09,763] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0355 seconds
INFO [2022-12-06 19:24:18,055] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:24:18,056] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:24:18,068] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:24:18,081] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0238 seconds
INFO [2022-12-06 19:24:20,918] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:24:20,919] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:24:20,927] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:24:20,939] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 19:24:24,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347464.6335447, 'message': 'Dec 6 19:24:24 hqnl0246134 sshd[246997]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 19:24:24,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347464.634481, 'message': 'Dec 6 19:24:24 hqnl0246134 sshd[246997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 19:24:26,654] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347466.635838, 'message': 'Dec 6 19:24:25 hqnl0246134 sshd[246997]: Failed password for root from 61.177.173.18 port 21581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 19:24:26,675] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347466.6360822, 'message': 'Dec 6 19:24:26 hqnl0246134 sshd[246997]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 19:24:28,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347468.6378658, 'message': 'Dec 6 19:24:28 hqnl0246134 sshd[246997]: Failed password for root from 61.177.173.18 port 21581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 19:24:28,703] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347468.6381464, 'message': 'Dec 6 19:24:28 hqnl0246134 sshd[246997]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 19:24:30,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347470.6397169, 'message': 'Dec 6 19:24:30 hqnl0246134 sshd[246997]: Failed password for root from 61.177.173.18 port 21581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0259 seconds
WARNING [2022-12-06 19:24:48,283] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:24:48,285] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 19:25:09,743] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:25:09,766] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0335 seconds
INFO [2022-12-06 19:25:12,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347512.6793523, 'message': 'Dec 6 19:25:10 hqnl0246134 sshd[247043]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 19:25:12,724] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347512.6797676, 'message': 'Dec 6 19:25:10 hqnl0246134 sshd[247043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 19:25:14,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347514.678085, 'message': 'Dec 6 19:25:12 hqnl0246134 sshd[247043]: Failed password for root from 61.177.173.18 port 52830 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 19:25:14,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347514.678277, 'message': 'Dec 6 19:25:13 hqnl0246134 sshd[247043]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 19:25:16,721] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347516.6808136, 'message': 'Dec 6 19:25:14 hqnl0246134 sshd[247043]: Failed password for root from 61.177.173.18 port 52830 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 19:25:16,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347516.6810913, 'message': 'Dec 6 19:25:15 hqnl0246134 sshd[247043]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 19:25:18,524] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:25:18,524] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:25:18,534] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:25:18,548] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
INFO [2022-12-06 19:25:18,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347518.6824784, 'message': 'Dec 6 19:25:17 hqnl0246134 sshd[247043]: Failed password for root from 61.177.173.18 port 52830 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 19:25:21,494] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:25:21,494] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:25:21,502] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:25:21,515] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 19:25:22,383] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:25:22,384] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:25:22,391] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:25:22,402] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
WARNING [2022-12-06 19:25:48,287] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:25:48,288] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:25:58,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347558.7357748, 'message': 'Dec 6 19:25:58 hqnl0246134 sshd[247095]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 19:25:58,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347558.7368042, 'message': 'Dec 6 19:25:58 hqnl0246134 sshd[247095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 19:26:00,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347560.7348375, 'message': 'Dec 6 19:26:00 hqnl0246134 sshd[247095]: Failed password for root from 61.177.173.18 port 26340 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 19:26:04,778] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347564.7412822, 'message': 'Dec 6 19:26:02 hqnl0246134 sshd[247095]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 19:26:04,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347564.7416131, 'message': 'Dec 6 19:26:03 hqnl0246134 sshd[247129]: Invalid user t from 190.120.254.76 port 42443', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 19:26:04,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347564.7418227, 'message': 'Dec 6 19:26:03 hqnl0246134 sshd[247129]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.120.254.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 19:26:04,819] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347564.742003, 'message': 'Dec 6 19:26:03 hqnl0246134 sshd[247129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.120.254.76 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 19:26:06,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347566.743049, 'message': 'Dec 6 19:26:04 hqnl0246134 sshd[247095]: Failed password for root from 61.177.173.18 port 26340 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1615 seconds
INFO [2022-12-06 19:26:06,918] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347566.7437067, 'message': 'Dec 6 19:26:05 hqnl0246134 sshd[247129]: Failed password for invalid user t from 190.120.254.76 port 42443 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1717 seconds
INFO [2022-12-06 19:26:06,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347566.7434509, 'message': 'Dec 6 19:26:05 hqnl0246134 sshd[247095]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0733 seconds
INFO [2022-12-06 19:26:08,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347568.7456214, 'message': 'Dec 6 19:26:06 hqnl0246134 sshd[247095]: Failed password for root from 61.177.173.18 port 26340 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 19:26:08,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347568.7459335, 'message': 'Dec 6 19:26:07 hqnl0246134 sshd[247129]: Disconnected from invalid user t 190.120.254.76 port 42443 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0342 seconds
WARNING [2022-12-06 19:26:09,742] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:26:09,764] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0285 seconds
INFO [2022-12-06 19:26:18,234] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:26:18,235] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:26:18,246] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:26:18,258] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 19:26:21,063] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:26:21,064] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:26:21,089] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:26:21,107] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0277 seconds
INFO [2022-12-06 19:26:46,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347606.8001664, 'message': 'Dec 6 19:26:46 hqnl0246134 sshd[247168]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 19:26:46,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347606.8005714, 'message': 'Dec 6 19:26:46 hqnl0246134 sshd[247168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
WARNING [2022-12-06 19:26:48,304] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:26:48,305] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:26:48,825] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347608.80276, 'message': 'Dec 6 19:26:48 hqnl0246134 sshd[247168]: Failed password for root from 61.177.173.18 port 59705 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 19:26:50,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347610.8060575, 'message': 'Dec 6 19:26:50 hqnl0246134 sshd[247168]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 19:26:54,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347614.812016, 'message': 'Dec 6 19:26:52 hqnl0246134 sshd[247168]: Failed password for root from 61.177.173.18 port 59705 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 19:26:56,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347616.8137944, 'message': 'Dec 6 19:26:54 hqnl0246134 sshd[247168]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 19:26:56,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347616.8141954, 'message': 'Dec 6 19:26:56 hqnl0246134 sshd[247168]: Failed password for root from 61.177.173.18 port 59705 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:27:00,188] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:27:00,188] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:27:00,200] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:27:00,214] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0243 seconds
WARNING [2022-12-06 19:27:09,749] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:27:09,776] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0354 seconds
INFO [2022-12-06 19:27:17,888] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:27:17,888] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:27:17,897] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:27:17,909] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 19:27:21,134] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:27:21,135] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:27:21,149] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:27:21,166] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0292 seconds
INFO [2022-12-06 19:27:36,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347656.8723516, 'message': 'Dec 6 19:27:34 hqnl0246134 sshd[247237]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 19:27:36,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347656.8727071, 'message': 'Dec 6 19:27:34 hqnl0246134 sshd[247237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 19:27:38,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347658.8732722, 'message': 'Dec 6 19:27:37 hqnl0246134 sshd[247237]: Failed password for root from 61.177.173.18 port 37263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 19:27:40,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347660.8769228, 'message': 'Dec 6 19:27:39 hqnl0246134 sshd[247237]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 19:27:42,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347662.8800313, 'message': 'Dec 6 19:27:41 hqnl0246134 sshd[247237]: Failed password for root from 61.177.173.18 port 37263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 19:27:44,901] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347664.8810673, 'message': 'Dec 6 19:27:43 hqnl0246134 sshd[247237]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 19:27:46,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347666.883226, 'message': 'Dec 6 19:27:45 hqnl0246134 sshd[247237]: Failed password for root from 61.177.173.18 port 37263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 19:27:48,307] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:27:48,308] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:27:50,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670347670.8888874, 'message': 'Dec 6 19:27:49 hqnl0246134 sshd[247240]: Invalid user manager from 210.19.254.6 port 34275', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 19:27:50,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.19.254.6', 'timestamp': 1670347670.8892741, 'message': 'Dec 6 19:27:49 hqnl0246134 sshd[247240]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.19.254.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 19:27:50,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.19.254.6', 'timestamp': 1670347670.8894117, 'message': 'Dec 6 19:27:49 hqnl0246134 sshd[247240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.19.254.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 19:27:52,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670347672.89392, 'message': 'Dec 6 19:27:51 hqnl0246134 sshd[247240]: Failed password for invalid user manager from 210.19.254.6 port 34275 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 19:27:54,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670347674.89528, 'message': 'Dec 6 19:27:53 hqnl0246134 sshd[247240]: Disconnected from invalid user manager 210.19.254.6 port 34275 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 19:28:09,753] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:28:09,777] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0324 seconds
INFO [2022-12-06 19:28:18,340] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:28:18,342] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:28:18,381] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:28:18,410] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0637 seconds
INFO [2022-12-06 19:28:21,919] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:28:21,919] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:28:21,939] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:28:21,959] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0388 seconds
INFO [2022-12-06 19:28:22,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347702.9285712, 'message': 'Dec 6 19:28:22 hqnl0246134 sshd[247287]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 19:28:22,971] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347702.9331524, 'message': 'Dec 6 19:28:22 hqnl0246134 sshd[247287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 19:28:23,307] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 19:28:23,380] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 19:28:23,381] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 19:28:23,381] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 19:28:23,381] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 19:28:23,382] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 19:28:23,399] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 19:28:23,424] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0420 seconds
WARNING [2022-12-06 19:28:23,436] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 19:28:23,440] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:28:23,462] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0477 seconds
INFO [2022-12-06 19:28:23,464] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0443 seconds
INFO [2022-12-06 19:28:26,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347706.9348552, 'message': 'Dec 6 19:28:25 hqnl0246134 sshd[247287]: Failed password for root from 61.177.173.18 port 14143 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 19:28:28,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347708.9403687, 'message': 'Dec 6 19:28:27 hqnl0246134 sshd[247287]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 19:28:30,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347710.9456117, 'message': 'Dec 6 19:28:29 hqnl0246134 sshd[247287]: Failed password for root from 61.177.173.18 port 14143 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 19:28:32,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347712.9500852, 'message': 'Dec 6 19:28:31 hqnl0246134 sshd[247287]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 19:28:34,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347714.954124, 'message': 'Dec 6 19:28:33 hqnl0246134 sshd[247287]: Failed password for root from 61.177.173.18 port 14143 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 19:28:36,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347716.9608972, 'message': 'Dec 6 19:28:35 hqnl0246134 sshd[247289]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.120.254.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 19:28:37,000] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347716.961179, 'message': 'Dec 6 19:28:35 hqnl0246134 sshd[247289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.120.254.76 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 19:28:38,418] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:28:38,419] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:28:38,426] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:28:38,437] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 19:28:38,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347718.9666457, 'message': 'Dec 6 19:28:37 hqnl0246134 sshd[247289]: Failed password for root from 190.120.254.76 port 53747 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:28:40,924] defence360agent.files: Updating all files
INFO [2022-12-06 19:28:41,262] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 19:28:41,262] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 19:28:41,550] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 19:28:41,550] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 19:28:41,874] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 19:28:41,874] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 19:28:42,212] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 19:28:42,213] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 19:28:42,213] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 19:28:42,519] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 17:28:42 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E44675A4949E7'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 19:28:42,521] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 19:28:42,521] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 19:28:43,119] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 19:28:43,120] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 19:28:43,389] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 19:28:43,390] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 19:28:43,713] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 19:28:43,713] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 19:28:44,061] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 19:28:44,061] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 19:28:44,450] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 19:28:44,451] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 19:28:46,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '130.61.12.206', 'timestamp': 1670347726.9796603, 'message': 'Dec 6 19:28:45 hqnl0246134 sshd[247297]: Invalid user python from 130.61.12.206 port 47374', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 19:28:47,017] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '130.61.12.206', 'timestamp': 1670347726.9798717, 'message': 'Dec 6 19:28:45 hqnl0246134 sshd[247297]: pam_imunify(sshd:auth): [IM360_RBL] The IP 130.61.12.206 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 19:28:47,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '130.61.12.206', 'timestamp': 1670347726.979986, 'message': 'Dec 6 19:28:45 hqnl0246134 sshd[247297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.12.206 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
WARNING [2022-12-06 19:28:48,311] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:28:48,312] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:28:49,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '130.61.12.206', 'timestamp': 1670347729.0025823, 'message': 'Dec 6 19:28:47 hqnl0246134 sshd[247297]: Failed password for invalid user python from 130.61.12.206 port 47374 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 19:28:51,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '130.61.12.206', 'timestamp': 1670347730.9838648, 'message': 'Dec 6 19:28:49 hqnl0246134 sshd[247297]: Disconnected from invalid user python 130.61.12.206 port 47374 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:29:04,930] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 19:29:04,932] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 19:29:04,933] im360.plugins.client360: Waiting 5 minutes before retry...
WARNING [2022-12-06 19:29:09,767] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:29:09,848] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0986 seconds
INFO [2022-12-06 19:29:11,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347751.0090604, 'message': 'Dec 6 19:29:09 hqnl0246134 sshd[247324]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 19:29:11,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347751.009314, 'message': 'Dec 6 19:29:09 hqnl0246134 sshd[247324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 19:29:13,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347753.010938, 'message': 'Dec 6 19:29:11 hqnl0246134 sshd[247324]: Failed password for root from 61.177.173.18 port 35798 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 19:29:13,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347753.0111835, 'message': 'Dec 6 19:29:11 hqnl0246134 sshd[247324]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 19:29:15,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.46.164.14', 'timestamp': 1670347755.0151165, 'message': 'Dec 6 19:29:13 hqnl0246134 sshd[247327]: Invalid user john from 181.46.164.14 port 56296', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0503 seconds
INFO [2022-12-06 19:29:15,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347755.0153923, 'message': 'Dec 6 19:29:13 hqnl0246134 sshd[247324]: Failed password for root from 61.177.173.18 port 35798 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0507 seconds
INFO [2022-12-06 19:29:15,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '181.46.164.14', 'timestamp': 1670347755.0175319, 'message': 'Dec 6 19:29:14 hqnl0246134 sshd[247327]: pam_imunify(sshd:auth): [IM360_RBL] The IP 181.46.164.14 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0471 seconds
INFO [2022-12-06 19:29:15,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347755.0178854, 'message': 'Dec 6 19:29:14 hqnl0246134 sshd[247324]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0473 seconds
INFO [2022-12-06 19:29:15,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '181.46.164.14', 'timestamp': 1670347755.0177073, 'message': 'Dec 6 19:29:14 hqnl0246134 sshd[247327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.46.164.14 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 19:29:17,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.46.164.14', 'timestamp': 1670347757.0248995, 'message': 'Dec 6 19:29:15 hqnl0246134 sshd[247327]: Failed password for invalid user john from 181.46.164.14 port 56296 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 19:29:17,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347757.0252068, 'message': 'Dec 6 19:29:16 hqnl0246134 sshd[247324]: Failed password for root from 61.177.173.18 port 35798 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 19:29:18,054] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:29:18,055] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:29:18,065] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:29:18,078] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-06 19:29:19,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '2.236.188.179', 'timestamp': 1670347759.042352, 'message': 'Dec 6 19:29:17 hqnl0246134 sshd[247331]: pam_imunify(sshd:auth): [IM360_RBL] The IP 2.236.188.179 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1205 seconds
INFO [2022-12-06 19:29:19,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.46.164.14', 'timestamp': 1670347759.0428524, 'message': 'Dec 6 19:29:17 hqnl0246134 sshd[247327]: Disconnected from invalid user john 181.46.164.14 port 56296 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1204 seconds
INFO [2022-12-06 19:29:19,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '2.236.188.179', 'timestamp': 1670347759.0427058, 'message': 'Dec 6 19:29:17 hqnl0246134 sshd[247331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.236.188.179 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 19:29:20,887] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:29:20,888] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:29:20,894] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:29:20,907] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 19:29:21,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '2.236.188.179', 'timestamp': 1670347761.0275779, 'message': 'Dec 6 19:29:20 hqnl0246134 sshd[247331]: Failed password for root from 2.236.188.179 port 49878 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
WARNING [2022-12-06 19:29:48,315] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:29:48,316] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:29:57,151] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347797.1150641, 'message': 'Dec 6 19:29:56 hqnl0246134 sshd[247387]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 19:29:57,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347797.1160743, 'message': 'Dec 6 19:29:56 hqnl0246134 sshd[247387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 19:29:59,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347799.1163437, 'message': 'Dec 6 19:29:58 hqnl0246134 sshd[247387]: Failed password for root from 61.177.173.18 port 16778 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 19:30:01,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347801.1172037, 'message': 'Dec 6 19:29:59 hqnl0246134 sshd[247387]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 19:30:03,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347803.1203182, 'message': 'Dec 6 19:30:02 hqnl0246134 sshd[247387]: Failed password for root from 61.177.173.18 port 16778 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0482 seconds
INFO [2022-12-06 19:30:05,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347805.1207762, 'message': 'Dec 6 19:30:03 hqnl0246134 sshd[247387]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 19:30:07,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347807.1716263, 'message': 'Dec 6 19:30:05 hqnl0246134 sshd[247387]: Failed password for root from 61.177.173.18 port 16778 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 19:30:09,762] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:30:09,788] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0342 seconds
INFO [2022-12-06 19:30:10,660] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:30:10,661] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:30:10,668] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:30:10,680] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 19:30:11,157] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.192.223.205', 'timestamp': 1670347811.1368873, 'message': 'Dec 6 19:30:10 hqnl0246134 sshd[247417]: Invalid user sammy from 50.192.223.205 port 35646', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 19:30:11,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '50.192.223.205', 'timestamp': 1670347811.1370878, 'message': 'Dec 6 19:30:10 hqnl0246134 sshd[247417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.192.223.205 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 19:30:13,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.192.223.205', 'timestamp': 1670347813.1370366, 'message': 'Dec 6 19:30:12 hqnl0246134 sshd[247417]: Failed password for invalid user sammy from 50.192.223.205 port 35646 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 19:30:15,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347815.1400487, 'message': 'Dec 6 19:30:13 hqnl0246134 sshd[247423]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.120.254.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 19:30:15,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.192.223.205', 'timestamp': 1670347815.140383, 'message': 'Dec 6 19:30:13 hqnl0246134 sshd[247417]: Disconnected from invalid user sammy 50.192.223.205 port 35646 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 19:30:15,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347815.1402574, 'message': 'Dec 6 19:30:13 hqnl0246134 sshd[247423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.120.254.76 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 19:30:15,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347815.1404972, 'message': 'Dec 6 19:30:14 hqnl0246134 sshd[247423]: Failed password for root from 190.120.254.76 port 33805 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 19:30:17,702] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:30:17,702] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:30:17,709] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:30:17,720] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 19:30:20,664] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:30:20,664] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:30:20,673] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:30:20,686] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 19:30:45,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347845.2279568, 'message': 'Dec 6 19:30:43 hqnl0246134 sshd[247455]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 19:30:45,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347845.2284884, 'message': 'Dec 6 19:30:43 hqnl0246134 sshd[247455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 19:30:47,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347847.2298317, 'message': 'Dec 6 19:30:45 hqnl0246134 sshd[247455]: Failed password for root from 61.177.173.18 port 47889 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 19:30:47,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347847.2301817, 'message': 'Dec 6 19:30:46 hqnl0246134 sshd[247455]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-06 19:30:48,318] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:30:48,319] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:30:49,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347849.2316263, 'message': 'Dec 6 19:30:48 hqnl0246134 sshd[247455]: Failed password for root from 61.177.173.18 port 47889 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 19:30:51,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347851.2343698, 'message': 'Dec 6 19:30:50 hqnl0246134 sshd[247455]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 19:30:53,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347853.2373405, 'message': 'Dec 6 19:30:52 hqnl0246134 sshd[247455]: Failed password for root from 61.177.173.18 port 47889 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-06 19:31:09,766] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:31:09,795] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0382 seconds
INFO [2022-12-06 19:31:18,343] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:31:18,344] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:31:18,356] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:31:18,368] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0229 seconds
INFO [2022-12-06 19:31:20,976] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:31:20,976] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:31:20,987] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:31:21,002] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0248 seconds
INFO [2022-12-06 19:31:31,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347891.2934039, 'message': 'Dec 6 19:31:30 hqnl0246134 sshd[247508]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 19:31:31,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347891.2936985, 'message': 'Dec 6 19:31:30 hqnl0246134 sshd[247508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 19:31:33,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347893.2953877, 'message': 'Dec 6 19:31:31 hqnl0246134 sshd[247508]: Failed password for root from 61.177.173.18 port 23229 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 19:31:33,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347893.2956097, 'message': 'Dec 6 19:31:32 hqnl0246134 sshd[247508]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 19:31:35,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347895.2984762, 'message': 'Dec 6 19:31:34 hqnl0246134 sshd[247508]: Failed password for root from 61.177.173.18 port 23229 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 19:31:35,463] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347895.2987483, 'message': 'Dec 6 19:31:34 hqnl0246134 sshd[247508]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1440 seconds
INFO [2022-12-06 19:31:37,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347897.3004148, 'message': 'Dec 6 19:31:36 hqnl0246134 sshd[247508]: Failed password for root from 61.177.173.18 port 23229 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 19:31:39,364] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:31:39,364] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:31:39,371] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:31:39,383] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
WARNING [2022-12-06 19:31:48,322] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:31:48,322] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:31:53,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347913.3214355, 'message': 'Dec 6 19:31:52 hqnl0246134 sshd[247528]: Invalid user altair from 190.120.254.76 port 42096', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0418 seconds
INFO [2022-12-06 19:31:53,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347913.3221827, 'message': 'Dec 6 19:31:52 hqnl0246134 sshd[247528]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.120.254.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 19:31:53,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347913.3224857, 'message': 'Dec 6 19:31:52 hqnl0246134 sshd[247528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.120.254.76 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0344 seconds
WARNING [2022-12-06 19:31:53,822] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 19:31:55,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347915.3238645, 'message': 'Dec 6 19:31:55 hqnl0246134 sshd[247528]: Failed password for invalid user altair from 190.120.254.76 port 42096 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 19:31:57,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.120.254.76', 'timestamp': 1670347917.3260462, 'message': 'Dec 6 19:31:56 hqnl0246134 sshd[247528]: Disconnected from invalid user altair 190.120.254.76 port 42096 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
WARNING [2022-12-06 19:32:09,771] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:32:09,797] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0345 seconds
INFO [2022-12-06 19:32:17,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347937.3691852, 'message': 'Dec 6 19:32:17 hqnl0246134 sshd[247553]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 19:32:17,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347937.3695874, 'message': 'Dec 6 19:32:17 hqnl0246134 sshd[247553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 19:32:18,025] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:32:18,026] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:32:18,033] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:32:18,045] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 19:32:19,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347939.371124, 'message': 'Dec 6 19:32:19 hqnl0246134 sshd[247553]: Failed password for root from 61.177.173.18 port 53686 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 19:32:20,709] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:32:20,709] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:32:20,718] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:32:20,731] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 19:32:23,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347943.3764248, 'message': 'Dec 6 19:32:21 hqnl0246134 sshd[247553]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 19:32:23,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347943.3766725, 'message': 'Dec 6 19:32:23 hqnl0246134 sshd[247553]: Failed password for root from 61.177.173.18 port 53686 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 19:32:25,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347945.3830984, 'message': 'Dec 6 19:32:23 hqnl0246134 sshd[247553]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 19:32:27,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347947.389155, 'message': 'Dec 6 19:32:25 hqnl0246134 sshd[247553]: Failed password for root from 61.177.173.18 port 53686 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 19:32:47,468] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '94.153.212.68', 'timestamp': 1670347967.448275, 'message': 'Dec 6 19:32:45 hqnl0246134 sshd[247577]: pam_imunify(sshd:auth): [IM360_RBL] The IP 94.153.212.68 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 19:32:47,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '94.153.212.68', 'timestamp': 1670347967.4485588, 'message': 'Dec 6 19:32:45 hqnl0246134 sshd[247577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.153.212.68 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 19:32:48,325] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:32:48,326] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:32:49,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '94.153.212.68', 'timestamp': 1670347969.454066, 'message': 'Dec 6 19:32:47 hqnl0246134 sshd[247577]: Failed password for root from 94.153.212.68 port 59656 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 19:32:52,274] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:32:52,275] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:32:52,285] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:32:52,299] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-06 19:33:05,556] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347985.527954, 'message': 'Dec 6 19:33:05 hqnl0246134 sshd[247600]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 19:33:05,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347985.5286486, 'message': 'Dec 6 19:33:05 hqnl0246134 sshd[247600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:33:09,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347989.5411289, 'message': 'Dec 6 19:33:07 hqnl0246134 sshd[247600]: Failed password for root from 61.177.173.18 port 33098 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 19:33:09,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347989.5413098, 'message': 'Dec 6 19:33:09 hqnl0246134 sshd[247600]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
WARNING [2022-12-06 19:33:09,779] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:33:09,817] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0518 seconds
INFO [2022-12-06 19:33:13,583] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347993.560277, 'message': 'Dec 6 19:33:11 hqnl0246134 sshd[247600]: Failed password for root from 61.177.173.18 port 33098 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 19:33:15,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347995.5615454, 'message': 'Dec 6 19:33:13 hqnl0246134 sshd[247600]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 19:33:17,583] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670347997.5642667, 'message': 'Dec 6 19:33:15 hqnl0246134 sshd[247600]: Failed password for root from 61.177.173.18 port 33098 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 19:33:18,034] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:33:18,035] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:33:18,042] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:33:18,053] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-06 19:33:20,609] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:33:20,609] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:33:20,620] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:33:20,633] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0230 seconds
INFO [2022-12-06 19:33:29,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.120.254.76', 'timestamp': 1670348009.638706, 'message': 'Dec 6 19:33:28 hqnl0246134 sshd[247644]: Invalid user centos from 190.120.254.76 port 50384', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:33:29,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.120.254.76', 'timestamp': 1670348009.6389916, 'message': 'Dec 6 19:33:28 hqnl0246134 sshd[247644]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.120.254.76 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 19:33:29,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.120.254.76', 'timestamp': 1670348009.6391747, 'message': 'Dec 6 19:33:28 hqnl0246134 sshd[247644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.120.254.76 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 19:33:31,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.120.254.76', 'timestamp': 1670348011.6400409, 'message': 'Dec 6 19:33:30 hqnl0246134 sshd[247644]: Failed password for invalid user centos from 190.120.254.76 port 50384 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 19:33:31,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.120.254.76', 'timestamp': 1670348011.6402535, 'message': 'Dec 6 19:33:31 hqnl0246134 sshd[247644]: Disconnected from invalid user centos 190.120.254.76 port 50384 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 19:33:48,331] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:33:48,332] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:33:53,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '169.239.220.35', 'timestamp': 1670348033.7436101, 'message': 'Dec 6 19:33:52 hqnl0246134 sshd[247663]: pam_imunify(sshd:auth): [IM360_RBL] The IP 169.239.220.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0503 seconds
INFO [2022-12-06 19:33:53,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348033.744771, 'message': 'Dec 6 19:33:53 hqnl0246134 sshd[247665]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-06 19:33:53,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '169.239.220.35', 'timestamp': 1670348033.7444534, 'message': 'Dec 6 19:33:52 hqnl0246134 sshd[247663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=169.239.220.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0489 seconds
INFO [2022-12-06 19:33:53,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348033.7450979, 'message': 'Dec 6 19:33:53 hqnl0246134 sshd[247665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0481 seconds
INFO [2022-12-06 19:33:55,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '169.239.220.35', 'timestamp': 1670348035.745503, 'message': 'Dec 6 19:33:54 hqnl0246134 sshd[247663]: Failed password for root from 169.239.220.35 port 59440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 19:33:55,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348035.7457108, 'message': 'Dec 6 19:33:55 hqnl0246134 sshd[247665]: Failed password for root from 61.177.173.18 port 60203 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 19:33:57,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348037.7504442, 'message': 'Dec 6 19:33:57 hqnl0246134 sshd[247665]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 19:34:01,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348041.7565289, 'message': 'Dec 6 19:34:00 hqnl0246134 sshd[247665]: Failed password for root from 61.177.173.18 port 60203 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 19:34:03,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348043.7579758, 'message': 'Dec 6 19:34:01 hqnl0246134 sshd[247665]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 19:34:05,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348045.758489, 'message': 'Dec 6 19:34:03 hqnl0246134 sshd[247665]: Failed password for root from 61.177.173.18 port 60203 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
WARNING [2022-12-06 19:34:09,777] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:34:09,799] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0296 seconds
INFO [2022-12-06 19:34:18,051] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:34:18,052] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:34:18,060] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:34:18,072] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 19:34:20,671] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:34:20,672] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:34:20,680] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:34:20,692] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 19:34:43,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348083.8273082, 'message': 'Dec 6 19:34:42 hqnl0246134 sshd[247715]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 19:34:43,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348083.827637, 'message': 'Dec 6 19:34:42 hqnl0246134 sshd[247715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 19:34:45,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348085.828357, 'message': 'Dec 6 19:34:44 hqnl0246134 sshd[247715]: Failed password for root from 61.177.173.18 port 43069 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 19:34:45,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348085.8292298, 'message': 'Dec 6 19:34:44 hqnl0246134 sshd[247715]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 19:34:47,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348087.8295662, 'message': 'Dec 6 19:34:47 hqnl0246134 sshd[247715]: Failed password for root from 61.177.173.18 port 43069 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 19:34:48,334] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:34:48,335] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:34:49,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348089.8324816, 'message': 'Dec 6 19:34:49 hqnl0246134 sshd[247715]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 19:34:51,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348091.8349962, 'message': 'Dec 6 19:34:50 hqnl0246134 sshd[247715]: Failed password for root from 61.177.173.18 port 43069 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 19:34:53,957] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:34:53,957] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:34:53,964] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:34:53,977] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 19:34:57,985] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 19:34:58,051] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 19:34:58,051] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 19:34:58,052] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 19:34:58,052] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 19:34:58,052] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 19:34:58,062] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 19:34:58,081] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0283 seconds
WARNING [2022-12-06 19:34:58,091] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 19:34:58,096] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:34:58,128] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0534 seconds
INFO [2022-12-06 19:34:58,131] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0523 seconds
WARNING [2022-12-06 19:35:09,781] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:35:09,800] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0280 seconds
INFO [2022-12-06 19:35:18,022] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:35:18,023] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:35:18,064] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:35:18,092] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0550 seconds
INFO [2022-12-06 19:35:20,825] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:35:20,825] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:35:20,835] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:35:20,849] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0229 seconds
INFO [2022-12-06 19:35:28,182] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 19:35:28,183] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 19:35:28,184] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 19:35:29,893] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348129.8728886, 'message': 'Dec 6 19:35:29 hqnl0246134 sshd[247791]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 19:35:29,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348129.8731804, 'message': 'Dec 6 19:35:29 hqnl0246134 sshd[247791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 19:35:33,897] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348133.8774388, 'message': 'Dec 6 19:35:31 hqnl0246134 sshd[247791]: Failed password for root from 61.177.173.18 port 64036 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 19:35:35,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348135.8803716, 'message': 'Dec 6 19:35:34 hqnl0246134 sshd[247791]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 19:35:37,919] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348137.8830924, 'message': 'Dec 6 19:35:36 hqnl0246134 sshd[247791]: Failed password for root from 61.177.173.18 port 64036 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 19:35:39,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348139.8838022, 'message': 'Dec 6 19:35:38 hqnl0246134 sshd[247791]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 19:35:41,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348141.8864748, 'message': 'Dec 6 19:35:40 hqnl0246134 sshd[247791]: Failed password for root from 61.177.173.18 port 64036 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 19:35:48,338] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:35:48,339] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:36:05,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.46.164.14', 'timestamp': 1670348165.916829, 'message': 'Dec 6 19:36:04 hqnl0246134 sshd[247818]: Invalid user ai from 181.46.164.14 port 52522', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 19:36:05,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '181.46.164.14', 'timestamp': 1670348165.918173, 'message': 'Dec 6 19:36:04 hqnl0246134 sshd[247818]: pam_imunify(sshd:auth): [IM360_RBL] The IP 181.46.164.14 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 19:36:05,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '181.46.164.14', 'timestamp': 1670348165.9184864, 'message': 'Dec 6 19:36:04 hqnl0246134 sshd[247818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.46.164.14 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 19:36:07,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.46.164.14', 'timestamp': 1670348167.9165275, 'message': 'Dec 6 19:36:06 hqnl0246134 sshd[247818]: Failed password for invalid user ai from 181.46.164.14 port 52522 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 19:36:09,789] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:36:09,814] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0372 seconds
INFO [2022-12-06 19:36:09,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.46.164.14', 'timestamp': 1670348169.9177399, 'message': 'Dec 6 19:36:08 hqnl0246134 sshd[247818]: Disconnected from invalid user ai 181.46.164.14 port 52522 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 19:36:11,203] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:36:11,204] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:36:11,211] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:36:11,222] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 19:36:17,941] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:36:17,941] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:36:17,959] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:36:17,992] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0490 seconds
INFO [2022-12-06 19:36:19,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348179.9273593, 'message': 'Dec 6 19:36:18 hqnl0246134 sshd[247828]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 19:36:19,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348179.9280162, 'message': 'Dec 6 19:36:19 hqnl0246134 sshd[247836]: pam_imunify(sshd:auth): [IM360_RBL] The IP 130.61.12.206 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 19:36:19,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348179.9276295, 'message': 'Dec 6 19:36:18 hqnl0246134 sshd[247828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 19:36:19,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348179.928174, 'message': 'Dec 6 19:36:19 hqnl0246134 sshd[247836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.12.206 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 19:36:20,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348179.9278212, 'message': 'Dec 6 19:36:19 hqnl0246134 sshd[247828]: Failed password for root from 61.177.173.18 port 47252 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 19:36:20,825] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:36:20,825] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:36:20,837] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:36:20,850] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0237 seconds
INFO [2022-12-06 19:36:21,958] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348181.9282115, 'message': 'Dec 6 19:36:20 hqnl0246134 sshd[247828]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 19:36:21,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348181.9284322, 'message': 'Dec 6 19:36:21 hqnl0246134 sshd[247836]: Failed password for root from 130.61.12.206 port 50608 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 19:36:23,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348183.9309776, 'message': 'Dec 6 19:36:22 hqnl0246134 sshd[247828]: Failed password for root from 61.177.173.18 port 47252 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 19:36:23,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348183.9311824, 'message': 'Dec 6 19:36:22 hqnl0246134 sshd[247828]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 19:36:25,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348185.9337986, 'message': 'Dec 6 19:36:24 hqnl0246134 sshd[247828]: Failed password for root from 61.177.173.18 port 47252 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 19:36:48,343] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:36:48,344] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:37:06,026] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348225.9858673, 'message': 'Dec 6 19:37:04 hqnl0246134 sshd[247886]: Invalid user xq from 50.192.223.205 port 41202', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-06 19:37:06,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348225.9866326, 'message': 'Dec 6 19:37:04 hqnl0246134 sshd[247884]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0389 seconds
INFO [2022-12-06 19:37:06,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348225.9870582, 'message': 'Dec 6 19:37:04 hqnl0246134 sshd[247886]: pam_imunify(sshd:auth): [IM360_RBL] The IP 50.192.223.205 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 19:37:06,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348225.9869206, 'message': 'Dec 6 19:37:04 hqnl0246134 sshd[247884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 19:37:06,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348225.9872203, 'message': 'Dec 6 19:37:04 hqnl0246134 sshd[247886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.192.223.205 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 19:37:08,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348227.9873953, 'message': 'Dec 6 19:37:06 hqnl0246134 sshd[247884]: Failed password for root from 61.177.173.18 port 19320 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0446 seconds
INFO [2022-12-06 19:37:08,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348227.9877036, 'message': 'Dec 6 19:37:06 hqnl0246134 sshd[247886]: Failed password for invalid user xq from 50.192.223.205 port 41202 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0455 seconds
INFO [2022-12-06 19:37:08,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348227.9878402, 'message': 'Dec 6 19:37:06 hqnl0246134 sshd[247884]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
WARNING [2022-12-06 19:37:09,789] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:37:09,829] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0484 seconds
INFO [2022-12-06 19:37:10,019] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348229.988383, 'message': 'Dec 6 19:37:08 hqnl0246134 sshd[247886]: Disconnected from invalid user xq 50.192.223.205 port 41202 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 19:37:10,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348229.988624, 'message': 'Dec 6 19:37:08 hqnl0246134 sshd[247884]: Failed password for root from 61.177.173.18 port 19320 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 19:37:10,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348229.9889805, 'message': 'Dec 6 19:37:09 hqnl0246134 sshd[247884]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 19:37:12,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348231.991246, 'message': 'Dec 6 19:37:10 hqnl0246134 sshd[247884]: Failed password for root from 61.177.173.18 port 19320 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 19:37:17,870] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:37:17,871] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:37:17,880] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:37:17,893] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
INFO [2022-12-06 19:37:20,617] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:37:20,618] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:37:20,626] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:37:20,638] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
WARNING [2022-12-06 19:37:48,348] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:37:48,349] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:37:52,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '181.46.164.14', 'timestamp': 1670348272.0453017, 'message': 'Dec 6 19:37:51 hqnl0246134 sshd[247937]: pam_imunify(sshd:auth): [IM360_RBL] The IP 181.46.164.14 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0393 seconds
INFO [2022-12-06 19:37:52,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348272.0458155, 'message': 'Dec 6 19:37:51 hqnl0246134 sshd[247939]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-06 19:37:52,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '181.46.164.14', 'timestamp': 1670348272.0456543, 'message': 'Dec 6 19:37:51 hqnl0246134 sshd[247937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.46.164.14 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 19:37:52,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348272.0459304, 'message': 'Dec 6 19:37:51 hqnl0246134 sshd[247939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 19:37:54,073] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '181.46.164.14', 'timestamp': 1670348274.045069, 'message': 'Dec 6 19:37:52 hqnl0246134 sshd[247937]: Failed password for root from 181.46.164.14 port 56838 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 19:37:54,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348274.0452554, 'message': 'Dec 6 19:37:53 hqnl0246134 sshd[247939]: Failed password for root from 61.177.173.18 port 52503 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 19:37:54,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348274.045397, 'message': 'Dec 6 19:37:53 hqnl0246134 sshd[247939]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 19:37:56,036] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:37:56,036] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:37:56,043] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:37:56,066] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0288 seconds
INFO [2022-12-06 19:37:56,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348276.0454345, 'message': 'Dec 6 19:37:55 hqnl0246134 sshd[247939]: Failed password for root from 61.177.173.18 port 52503 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 19:37:56,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348276.0456247, 'message': 'Dec 6 19:37:55 hqnl0246134 sshd[247939]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 19:37:58,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348278.0478914, 'message': 'Dec 6 19:37:57 hqnl0246134 sshd[247939]: Failed password for root from 61.177.173.18 port 52503 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
WARNING [2022-12-06 19:38:09,794] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:38:09,820] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0359 seconds
INFO [2022-12-06 19:38:17,981] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:38:17,982] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:38:17,990] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:38:18,004] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 19:38:20,823] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:38:20,824] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:38:20,836] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:38:20,848] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
INFO [2022-12-06 19:38:34,698] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 19:38:34,774] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 19:38:34,774] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 19:38:34,775] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 19:38:34,775] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 19:38:34,776] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 19:38:34,791] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 19:38:34,808] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0313 seconds
WARNING [2022-12-06 19:38:34,815] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 19:38:34,818] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:38:34,834] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0316 seconds
INFO [2022-12-06 19:38:34,836] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0296 seconds
INFO [2022-12-06 19:38:38,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348318.096486, 'message': 'Dec 6 19:38:38 hqnl0246134 sshd[247996]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 19:38:38,133] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348318.0967464, 'message': 'Dec 6 19:38:38 hqnl0246134 sshd[247996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 19:38:40,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348320.0976167, 'message': 'Dec 6 19:38:39 hqnl0246134 sshd[247996]: Failed password for root from 61.177.173.18 port 21285 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 19:38:42,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348322.1040304, 'message': 'Dec 6 19:38:40 hqnl0246134 sshd[247996]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 19:38:44,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348324.1078131, 'message': 'Dec 6 19:38:42 hqnl0246134 sshd[247996]: Failed password for root from 61.177.173.18 port 21285 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 19:38:46,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348326.1133175, 'message': 'Dec 6 19:38:44 hqnl0246134 sshd[247996]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 19:38:48,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348328.1145945, 'message': 'Dec 6 19:38:46 hqnl0246134 sshd[247996]: Failed password for root from 61.177.173.18 port 21285 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
WARNING [2022-12-06 19:38:48,352] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:38:48,353] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:38:50,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348330.1178133, 'message': 'Dec 6 19:38:49 hqnl0246134 sshd[248005]: Invalid user glassfish from 130.61.12.206 port 43732', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:38:52,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348332.1205704, 'message': 'Dec 6 19:38:50 hqnl0246134 sshd[248005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 130.61.12.206 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 19:38:52,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348332.1211333, 'message': 'Dec 6 19:38:50 hqnl0246134 sshd[248007]: Invalid user conectar from 94.153.212.68 port 51178', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 19:38:52,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348332.120973, 'message': 'Dec 6 19:38:50 hqnl0246134 sshd[248005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.12.206 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 19:38:52,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348332.1212537, 'message': 'Dec 6 19:38:50 hqnl0246134 sshd[248007]: pam_imunify(sshd:auth): [IM360_RBL] The IP 94.153.212.68 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 19:38:52,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348332.1213803, 'message': 'Dec 6 19:38:50 hqnl0246134 sshd[248007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.153.212.68 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 19:38:54,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348334.1224394, 'message': 'Dec 6 19:38:52 hqnl0246134 sshd[248005]: Failed password for invalid user glassfish from 130.61.12.206 port 43732 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 19:38:54,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348334.1227643, 'message': 'Dec 6 19:38:52 hqnl0246134 sshd[248007]: Failed password for invalid user conectar from 94.153.212.68 port 51178 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 19:38:54,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348334.123023, 'message': 'Dec 6 19:38:53 hqnl0246134 sshd[248005]: Disconnected from invalid user glassfish 130.61.12.206 port 43732 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 19:38:54,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348334.1229036, 'message': 'Dec 6 19:38:53 hqnl0246134 sshd[248007]: Disconnected from invalid user conectar 94.153.212.68 port 51178 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0318 seconds
WARNING [2022-12-06 19:39:09,797] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:39:09,823] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0352 seconds
INFO [2022-12-06 19:39:12,408] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 19:39:12,409] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 19:39:12,410] im360.plugins.client360: Waiting 7 minutes before retry...
INFO [2022-12-06 19:39:18,477] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:39:18,477] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:39:18,503] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:39:18,556] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0732 seconds
INFO [2022-12-06 19:39:22,843] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:39:22,845] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:39:22,859] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:39:22,880] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0342 seconds
INFO [2022-12-06 19:39:26,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348366.1596181, 'message': 'Dec 6 19:39:25 hqnl0246134 sshd[248188]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 19:39:26,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348366.1599145, 'message': 'Dec 6 19:39:25 hqnl0246134 sshd[248188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 19:39:28,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348368.1611946, 'message': 'Dec 6 19:39:27 hqnl0246134 sshd[248188]: Failed password for root from 61.177.173.18 port 54106 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 19:39:28,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348368.161442, 'message': 'Dec 6 19:39:27 hqnl0246134 sshd[248188]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 19:39:30,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348370.1621916, 'message': 'Dec 6 19:39:29 hqnl0246134 sshd[248188]: Failed password for root from 61.177.173.18 port 54106 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 19:39:32,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348372.1624115, 'message': 'Dec 6 19:39:30 hqnl0246134 sshd[248188]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 19:39:32,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348372.1626785, 'message': 'Dec 6 19:39:31 hqnl0246134 sshd[248188]: Failed password for root from 61.177.173.18 port 54106 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 19:39:35,095] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:39:35,095] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:39:35,102] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:39:35,113] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
WARNING [2022-12-06 19:39:48,355] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:39:48,356] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:39:56,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348396.1855283, 'message': 'Dec 6 19:39:54 hqnl0246134 sshd[248212]: Invalid user musikbot from 50.192.223.205 port 58786', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0466 seconds
INFO [2022-12-06 19:39:56,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348396.1860402, 'message': 'Dec 6 19:39:54 hqnl0246134 sshd[248212]: pam_imunify(sshd:auth): [IM360_RBL] The IP 50.192.223.205 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 19:39:56,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348396.1862543, 'message': 'Dec 6 19:39:54 hqnl0246134 sshd[248212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.192.223.205 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 19:39:58,208] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348398.1863277, 'message': 'Dec 6 19:39:56 hqnl0246134 sshd[248212]: Failed password for invalid user musikbot from 50.192.223.205 port 58786 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 19:39:58,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348398.1865997, 'message': 'Dec 6 19:39:57 hqnl0246134 sshd[248212]: Disconnected from invalid user musikbot 50.192.223.205 port 58786 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
WARNING [2022-12-06 19:40:09,800] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:40:09,829] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0389 seconds
INFO [2022-12-06 19:40:14,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348414.2066805, 'message': 'Dec 6 19:40:13 hqnl0246134 sshd[248238]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 19:40:14,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348414.2070594, 'message': 'Dec 6 19:40:13 hqnl0246134 sshd[248238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 19:40:16,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348416.208295, 'message': 'Dec 6 19:40:15 hqnl0246134 sshd[248238]: Failed password for root from 61.177.173.18 port 27416 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 19:40:16,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348416.2084763, 'message': 'Dec 6 19:40:16 hqnl0246134 sshd[248238]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:40:17,963] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:40:17,963] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:40:17,970] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:40:17,982] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 19:40:20,231] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348420.2135005, 'message': 'Dec 6 19:40:18 hqnl0246134 sshd[248238]: Failed password for root from 61.177.173.18 port 27416 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 19:40:20,907] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:40:20,907] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:40:20,916] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:40:20,928] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 19:40:22,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348422.2161143, 'message': 'Dec 6 19:40:20 hqnl0246134 sshd[248238]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 19:40:24,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348424.2192674, 'message': 'Dec 6 19:40:22 hqnl0246134 sshd[248238]: Failed password for root from 61.177.173.18 port 27416 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0221 seconds
WARNING [2022-12-06 19:40:48,359] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:40:48,360] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:41:02,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348462.2827, 'message': 'Dec 6 19:41:01 hqnl0246134 sshd[248303]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 19:41:02,328] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348462.283229, 'message': 'Dec 6 19:41:01 hqnl0246134 sshd[248303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 19:41:04,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348464.282755, 'message': 'Dec 6 19:41:03 hqnl0246134 sshd[248303]: Failed password for root from 61.177.173.18 port 55485 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 19:41:06,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348466.2854695, 'message': 'Dec 6 19:41:05 hqnl0246134 sshd[248303]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 19:41:08,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348468.2878165, 'message': 'Dec 6 19:41:07 hqnl0246134 sshd[248303]: Failed password for root from 61.177.173.18 port 55485 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 19:41:08,324] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348468.2879858, 'message': 'Dec 6 19:41:07 hqnl0246134 sshd[248303]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-06 19:41:09,899] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:41:09,921] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0302 seconds
INFO [2022-12-06 19:41:10,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348470.2898612, 'message': 'Dec 6 19:41:09 hqnl0246134 sshd[248303]: Failed password for root from 61.177.173.18 port 55485 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0757 seconds
INFO [2022-12-06 19:41:13,738] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:41:13,739] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:41:13,746] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:41:13,761] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 19:41:17,940] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:41:17,941] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:41:17,949] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:41:17,961] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 19:41:20,655] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:41:20,656] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:41:20,665] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:41:20,679] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 19:41:28,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348488.3106124, 'message': 'Dec 6 19:41:27 hqnl0246134 sshd[248343]: Invalid user ircd from 130.61.12.206 port 45110', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0457 seconds
INFO [2022-12-06 19:41:28,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348488.3114543, 'message': 'Dec 6 19:41:27 hqnl0246134 sshd[248343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 130.61.12.206 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 19:41:28,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348488.3117468, 'message': 'Dec 6 19:41:27 hqnl0246134 sshd[248343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.12.206 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 19:41:30,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348490.309752, 'message': 'Dec 6 19:41:29 hqnl0246134 sshd[248343]: Failed password for invalid user ircd from 130.61.12.206 port 45110 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0574 seconds
INFO [2022-12-06 19:41:30,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '130.61.12.206', 'timestamp': 1670348490.3099353, 'message': 'Dec 6 19:41:30 hqnl0246134 sshd[248343]: Disconnected from invalid user ircd 130.61.12.206 port 45110 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0507 seconds
INFO [2022-12-06 19:41:48,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348508.3305123, 'message': 'Dec 6 19:41:46 hqnl0246134 sshd[248350]: Invalid user applprod from 94.153.212.68 port 37650', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 19:41:48,361] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:41:48,362] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:41:48,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348508.3307998, 'message': 'Dec 6 19:41:46 hqnl0246134 sshd[248350]: pam_imunify(sshd:auth): [IM360_RBL] The IP 94.153.212.68 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 19:41:48,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348508.3309321, 'message': 'Dec 6 19:41:46 hqnl0246134 sshd[248350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.153.212.68 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 19:41:50,362] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348510.3328426, 'message': 'Dec 6 19:41:48 hqnl0246134 sshd[248350]: Failed password for invalid user applprod from 94.153.212.68 port 37650 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 19:41:50,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348510.3330746, 'message': 'Dec 6 19:41:48 hqnl0246134 sshd[248352]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 19:41:50,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348510.3333545, 'message': 'Dec 6 19:41:50 hqnl0246134 sshd[248350]: Disconnected from invalid user applprod 94.153.212.68 port 37650 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 19:41:50,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348510.3332472, 'message': 'Dec 6 19:41:48 hqnl0246134 sshd[248352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 19:41:50,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348510.3334713, 'message': 'Dec 6 19:41:50 hqnl0246134 sshd[248352]: Failed password for root from 61.177.173.18 port 30809 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 19:41:52,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348512.3345966, 'message': 'Dec 6 19:41:50 hqnl0246134 sshd[248352]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
WARNING [2022-12-06 19:41:53,824] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 19:41:54,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348514.3363845, 'message': 'Dec 6 19:41:52 hqnl0246134 sshd[248352]: Failed password for root from 61.177.173.18 port 30809 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 19:41:54,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348514.336617, 'message': 'Dec 6 19:41:53 hqnl0246134 sshd[248352]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 19:41:56,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348516.3374794, 'message': 'Dec 6 19:41:55 hqnl0246134 sshd[248352]: Failed password for root from 61.177.173.18 port 30809 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0620 seconds
WARNING [2022-12-06 19:42:09,908] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:42:09,938] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0424 seconds
INFO [2022-12-06 19:42:17,946] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:42:17,947] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:42:17,956] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:42:17,968] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 19:42:20,605] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:42:20,606] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:42:20,614] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:42:20,627] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 19:42:36,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348556.379315, 'message': 'Dec 6 19:42:36 hqnl0246134 sshd[248415]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0651 seconds
INFO [2022-12-06 19:42:36,487] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348556.3798616, 'message': 'Dec 6 19:42:36 hqnl0246134 sshd[248415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-06 19:42:38,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348558.3776402, 'message': 'Dec 6 19:42:38 hqnl0246134 sshd[248415]: Failed password for root from 61.177.173.18 port 62066 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 19:42:40,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348560.3799007, 'message': 'Dec 6 19:42:38 hqnl0246134 sshd[248415]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 19:42:40,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348560.380102, 'message': 'Dec 6 19:42:40 hqnl0246134 sshd[248415]: Failed password for root from 61.177.173.18 port 62066 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0468 seconds
INFO [2022-12-06 19:42:42,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348562.3829083, 'message': 'Dec 6 19:42:40 hqnl0246134 sshd[248415]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 19:42:44,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348564.3909361, 'message': 'Dec 6 19:42:43 hqnl0246134 sshd[248415]: Failed password for root from 61.177.173.18 port 62066 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 19:42:47,900] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:42:47,901] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:42:47,908] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:42:47,920] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
WARNING [2022-12-06 19:42:48,364] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:42:48,365] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:42:50,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348570.3982275, 'message': 'Dec 6 19:42:48 hqnl0246134 sshd[248429]: Invalid user movies from 50.192.223.205 port 48138', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 19:42:50,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348570.3985052, 'message': 'Dec 6 19:42:48 hqnl0246134 sshd[248429]: pam_imunify(sshd:auth): [IM360_RBL] The IP 50.192.223.205 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 19:42:50,458] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348570.3986304, 'message': 'Dec 6 19:42:48 hqnl0246134 sshd[248429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.192.223.205 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:42:52,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348572.4007075, 'message': 'Dec 6 19:42:51 hqnl0246134 sshd[248429]: Failed password for invalid user movies from 50.192.223.205 port 48138 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 19:42:54,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.192.223.205', 'timestamp': 1670348574.401822, 'message': 'Dec 6 19:42:53 hqnl0246134 sshd[248429]: Disconnected from invalid user movies 50.192.223.205 port 48138 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0319 seconds
WARNING [2022-12-06 19:43:09,920] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:43:09,943] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0395 seconds
INFO [2022-12-06 19:43:10,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '2.236.188.179', 'timestamp': 1670348590.430521, 'message': 'Dec 6 19:43:09 hqnl0246134 sshd[248453]: pam_imunify(sshd:auth): [IM360_RBL] The IP 2.236.188.179 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 19:43:10,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '2.236.188.179', 'timestamp': 1670348590.430755, 'message': 'Dec 6 19:43:09 hqnl0246134 sshd[248453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.236.188.179 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 19:43:12,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '2.236.188.179', 'timestamp': 1670348592.4323497, 'message': 'Dec 6 19:43:11 hqnl0246134 sshd[248453]: Failed password for root from 2.236.188.179 port 59078 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 19:43:17,845] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:43:17,846] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:43:17,853] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:43:17,863] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 19:43:20,554] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:43:20,554] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:43:20,561] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:43:20,572] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 19:43:24,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348604.4498026, 'message': 'Dec 6 19:43:24 hqnl0246134 sshd[248478]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 19:43:24,514] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348604.450317, 'message': 'Dec 6 19:43:24 hqnl0246134 sshd[248478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 19:43:28,487] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348608.4567394, 'message': 'Dec 6 19:43:26 hqnl0246134 sshd[248478]: Failed password for root from 61.177.173.18 port 40816 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 19:43:30,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348610.460028, 'message': 'Dec 6 19:43:28 hqnl0246134 sshd[248478]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 19:43:32,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348612.4653404, 'message': 'Dec 6 19:43:30 hqnl0246134 sshd[248478]: Failed password for root from 61.177.173.18 port 40816 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 19:43:32,502] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348612.4655802, 'message': 'Dec 6 19:43:31 hqnl0246134 sshd[248478]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 19:43:34,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348614.4669156, 'message': 'Dec 6 19:43:32 hqnl0246134 sshd[248478]: Failed password for root from 61.177.173.18 port 40816 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
WARNING [2022-12-06 19:43:48,368] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:43:48,370] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:43:50,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670348630.4870393, 'message': 'Dec 6 19:43:49 hqnl0246134 sshd[248485]: Invalid user g from 210.19.254.6 port 35390', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 19:43:50,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.19.254.6', 'timestamp': 1670348630.487471, 'message': 'Dec 6 19:43:49 hqnl0246134 sshd[248485]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.19.254.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 19:43:50,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.19.254.6', 'timestamp': 1670348630.4876504, 'message': 'Dec 6 19:43:49 hqnl0246134 sshd[248485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.19.254.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 19:43:52,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670348632.4907193, 'message': 'Dec 6 19:43:51 hqnl0246134 sshd[248485]: Failed password for invalid user g from 210.19.254.6 port 35390 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 19:43:52,549] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670348632.491773, 'message': 'Dec 6 19:43:51 hqnl0246134 sshd[248485]: Disconnected from invalid user g 210.19.254.6 port 35390 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 19:43:54,320] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:43:54,321] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:43:54,335] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:43:54,365] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0423 seconds
WARNING [2022-12-06 19:44:09,917] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:44:09,953] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0456 seconds
INFO [2022-12-06 19:44:12,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348652.5152414, 'message': 'Dec 6 19:44:11 hqnl0246134 sshd[248516]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 19:44:12,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348652.5155635, 'message': 'Dec 6 19:44:11 hqnl0246134 sshd[248516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 19:44:14,542] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348654.5163543, 'message': 'Dec 6 19:44:13 hqnl0246134 sshd[248516]: Failed password for root from 61.177.173.18 port 19764 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 19:44:16,540] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348656.5175304, 'message': 'Dec 6 19:44:15 hqnl0246134 sshd[248516]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 19:44:17,859] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:44:17,860] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:44:17,871] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:44:17,887] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0264 seconds
INFO [2022-12-06 19:44:18,545] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348658.5211978, 'message': 'Dec 6 19:44:17 hqnl0246134 sshd[248516]: Failed password for root from 61.177.173.18 port 19764 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 19:44:18,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348658.5214777, 'message': 'Dec 6 19:44:18 hqnl0246134 sshd[248516]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 19:44:20,625] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:44:20,625] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:44:20,645] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:44:20,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670348660.5259352, 'message': 'Dec 6 19:44:20 hqnl0246134 sshd[248552]: Invalid user admin from 152.89.196.220 port 44624', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1405 seconds
INFO [2022-12-06 19:44:20,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348660.5264196, 'message': 'Dec 6 19:44:20 hqnl0246134 sshd[248516]: Failed password for root from 61.177.173.18 port 19764 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1412 seconds
INFO [2022-12-06 19:44:20,675] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0488 seconds
INFO [2022-12-06 19:44:20,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670348660.5261934, 'message': 'Dec 6 19:44:20 hqnl0246134 sshd[248552]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 19:44:20,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670348660.5263104, 'message': 'Dec 6 19:44:20 hqnl0246134 sshd[248552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 19:44:22,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670348662.5273108, 'message': 'Dec 6 19:44:22 hqnl0246134 sshd[248552]: Failed password for invalid user admin from 152.89.196.220 port 44624 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 19:44:24,552] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670348664.5328634, 'message': 'Dec 6 19:44:23 hqnl0246134 sshd[248552]: Disconnected from invalid user admin 152.89.196.220 port 44624 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-06 19:44:48,373] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:44:48,375] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:44:52,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348692.575084, 'message': 'Dec 6 19:44:51 hqnl0246134 sshd[248573]: Invalid user customer from 94.153.212.68 port 52364', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 19:44:52,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348692.5754995, 'message': 'Dec 6 19:44:51 hqnl0246134 sshd[248573]: pam_imunify(sshd:auth): [IM360_RBL] The IP 94.153.212.68 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 19:44:52,654] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348692.5756598, 'message': 'Dec 6 19:44:51 hqnl0246134 sshd[248573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.153.212.68 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 19:44:54,599] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348694.580658, 'message': 'Dec 6 19:44:53 hqnl0246134 sshd[248573]: Failed password for invalid user customer from 94.153.212.68 port 52364 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 19:44:56,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '94.153.212.68', 'timestamp': 1670348696.5814173, 'message': 'Dec 6 19:44:55 hqnl0246134 sshd[248573]: Disconnected from invalid user customer 94.153.212.68 port 52364 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 19:44:58,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348698.584508, 'message': 'Dec 6 19:44:58 hqnl0246134 sshd[248583]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 19:44:58,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348698.5847633, 'message': 'Dec 6 19:44:58 hqnl0246134 sshd[248583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 19:45:00,624] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348700.5859194, 'message': 'Dec 6 19:45:00 hqnl0246134 sshd[248583]: Failed password for root from 61.177.173.18 port 41803 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 19:45:02,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348702.5888362, 'message': 'Dec 6 19:45:02 hqnl0246134 sshd[248583]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0565 seconds
INFO [2022-12-06 19:45:04,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348704.5900798, 'message': 'Dec 6 19:45:04 hqnl0246134 sshd[248583]: Failed password for root from 61.177.173.18 port 41803 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0507 seconds
INFO [2022-12-06 19:45:06,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348706.5942645, 'message': 'Dec 6 19:45:04 hqnl0246134 sshd[248583]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 19:45:08,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348708.6006558, 'message': 'Dec 6 19:45:06 hqnl0246134 sshd[248583]: Failed password for root from 61.177.173.18 port 41803 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
WARNING [2022-12-06 19:45:09,919] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:45:09,944] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0326 seconds
INFO [2022-12-06 19:45:18,149] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:45:18,150] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:45:18,164] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:45:18,184] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0322 seconds
INFO [2022-12-06 19:45:20,906] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:45:20,906] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:45:20,915] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:45:20,927] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
WARNING [2022-12-06 19:45:48,377] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:45:48,378] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:45:48,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348748.6542025, 'message': 'Dec 6 19:45:47 hqnl0246134 sshd[248646]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 19:45:48,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348748.6547744, 'message': 'Dec 6 19:45:47 hqnl0246134 sshd[248646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 19:45:50,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348750.6565306, 'message': 'Dec 6 19:45:49 hqnl0246134 sshd[248646]: Failed password for root from 61.177.173.18 port 27247 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 19:45:50,721] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348750.6567984, 'message': 'Dec 6 19:45:49 hqnl0246134 sshd[248646]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 19:45:52,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348752.6661706, 'message': 'Dec 6 19:45:51 hqnl0246134 sshd[248646]: Failed password for root from 61.177.173.18 port 27247 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 19:45:52,714] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348752.6665466, 'message': 'Dec 6 19:45:51 hqnl0246134 sshd[248646]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 19:45:54,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348754.660578, 'message': 'Dec 6 19:45:53 hqnl0246134 sshd[248646]: Failed password for root from 61.177.173.18 port 27247 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 19:45:58,084] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:45:58,085] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:45:58,092] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:45:58,104] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
WARNING [2022-12-06 19:46:09,928] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:46:09,971] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0550 seconds
INFO [2022-12-06 19:46:17,982] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:46:17,983] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:46:17,991] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:46:18,002] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 19:46:20,540] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:46:20,540] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:46:20,546] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:46:20,558] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 19:46:21,259] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 19:46:21,327] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 19:46:21,328] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 19:46:21,328] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 19:46:21,328] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 19:46:21,329] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 19:46:21,342] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 19:46:21,366] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0368 seconds
WARNING [2022-12-06 19:46:21,379] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 19:46:21,381] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:46:21,397] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0406 seconds
INFO [2022-12-06 19:46:21,399] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0365 seconds
INFO [2022-12-06 19:46:38,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348798.7080615, 'message': 'Dec 6 19:46:37 hqnl0246134 sshd[248699]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 19:46:38,778] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348798.7088826, 'message': 'Dec 6 19:46:37 hqnl0246134 sshd[248699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 19:46:40,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348800.7103636, 'message': 'Dec 6 19:46:38 hqnl0246134 sshd[248699]: Failed password for root from 61.177.173.18 port 60954 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 19:46:40,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348800.7106252, 'message': 'Dec 6 19:46:39 hqnl0246134 sshd[248699]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 19:46:42,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348802.7127063, 'message': 'Dec 6 19:46:41 hqnl0246134 sshd[248699]: Failed password for root from 61.177.173.18 port 60954 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 19:46:44,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348804.715004, 'message': 'Dec 6 19:46:43 hqnl0246134 sshd[248699]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 19:46:46,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348806.717793, 'message': 'Dec 6 19:46:45 hqnl0246134 sshd[248699]: Failed password for root from 61.177.173.18 port 60954 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
WARNING [2022-12-06 19:46:48,380] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:46:48,381] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:46:51,459] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 19:46:51,459] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 19:46:51,460] im360.plugins.client360: Waiting 4 minutes before retry...
WARNING [2022-12-06 19:47:09,934] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:47:09,960] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0386 seconds
INFO [2022-12-06 19:47:17,963] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:47:17,963] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:47:17,976] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:47:17,995] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0301 seconds
INFO [2022-12-06 19:47:20,721] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:47:20,721] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:47:20,729] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:47:20,741] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 19:47:24,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348844.7593453, 'message': 'Dec 6 19:47:23 hqnl0246134 sshd[248745]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 19:47:24,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348844.7599192, 'message': 'Dec 6 19:47:23 hqnl0246134 sshd[248745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 19:47:26,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348846.7613199, 'message': 'Dec 6 19:47:25 hqnl0246134 sshd[248745]: Failed password for root from 61.177.173.18 port 18268 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 19:47:28,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348848.7629235, 'message': 'Dec 6 19:47:27 hqnl0246134 sshd[248745]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 19:47:30,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348850.7663572, 'message': 'Dec 6 19:47:29 hqnl0246134 sshd[248745]: Failed password for root from 61.177.173.18 port 18268 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:47:30,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348850.7665424, 'message': 'Dec 6 19:47:30 hqnl0246134 sshd[248745]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 19:47:32,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348852.7689528, 'message': 'Dec 6 19:47:32 hqnl0246134 sshd[248745]: Failed password for root from 61.177.173.18 port 18268 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 19:47:35,148] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:47:35,149] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:47:35,160] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:47:35,178] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0279 seconds
WARNING [2022-12-06 19:47:48,388] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:47:48,389] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 19:48:09,942] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:48:09,966] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0390 seconds
INFO [2022-12-06 19:48:12,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348892.808938, 'message': 'Dec 6 19:48:10 hqnl0246134 sshd[248785]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 19:48:12,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348892.8096228, 'message': 'Dec 6 19:48:10 hqnl0246134 sshd[248785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 19:48:12,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348892.809899, 'message': 'Dec 6 19:48:12 hqnl0246134 sshd[248785]: Failed password for root from 61.177.173.18 port 41549 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 19:48:14,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348894.8066902, 'message': 'Dec 6 19:48:12 hqnl0246134 sshd[248785]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0403 seconds
INFO [2022-12-06 19:48:16,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348896.807071, 'message': 'Dec 6 19:48:15 hqnl0246134 sshd[248785]: Failed password for root from 61.177.173.18 port 41549 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 19:48:18,483] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:48:18,484] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:48:18,492] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:48:18,507] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0228 seconds
INFO [2022-12-06 19:48:18,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348898.8098862, 'message': 'Dec 6 19:48:17 hqnl0246134 sshd[248785]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 19:48:18,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348898.810099, 'message': 'Dec 6 19:48:18 hqnl0246134 sshd[248785]: Failed password for root from 61.177.173.18 port 41549 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 19:48:21,186] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:48:21,187] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:48:21,198] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:48:21,218] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0296 seconds
INFO [2022-12-06 19:48:38,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '169.239.220.35', 'timestamp': 1670348918.8265717, 'message': 'Dec 6 19:48:38 hqnl0246134 sshd[248835]: Invalid user test from 169.239.220.35 port 52774', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 19:48:38,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '169.239.220.35', 'timestamp': 1670348918.8269536, 'message': 'Dec 6 19:48:38 hqnl0246134 sshd[248835]: pam_imunify(sshd:auth): [IM360_RBL] The IP 169.239.220.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 19:48:38,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '169.239.220.35', 'timestamp': 1670348918.8271258, 'message': 'Dec 6 19:48:38 hqnl0246134 sshd[248835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=169.239.220.35 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 19:48:42,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '169.239.220.35', 'timestamp': 1670348922.8267374, 'message': 'Dec 6 19:48:40 hqnl0246134 sshd[248835]: Failed password for invalid user test from 169.239.220.35 port 52774 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 19:48:44,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '169.239.220.35', 'timestamp': 1670348924.8281088, 'message': 'Dec 6 19:48:43 hqnl0246134 sshd[248835]: Disconnected from invalid user test 169.239.220.35 port 52774 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 19:48:45,859] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:48:45,859] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:48:45,867] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:48:45,878] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
WARNING [2022-12-06 19:48:48,392] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:48:48,393] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:48:58,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348938.8396077, 'message': 'Dec 6 19:48:58 hqnl0246134 sshd[248856]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 19:48:58,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348938.840153, 'message': 'Dec 6 19:48:58 hqnl0246134 sshd[248856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 19:49:00,863] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348940.8405159, 'message': 'Dec 6 19:48:59 hqnl0246134 sshd[248856]: Failed password for root from 61.177.173.18 port 15781 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 19:49:00,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348940.840832, 'message': 'Dec 6 19:49:00 hqnl0246134 sshd[248856]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:49:02,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348942.8432524, 'message': 'Dec 6 19:49:01 hqnl0246134 sshd[248856]: Failed password for root from 61.177.173.18 port 15781 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 19:49:02,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348942.8435695, 'message': 'Dec 6 19:49:02 hqnl0246134 sshd[248856]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 19:49:04,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348944.8441904, 'message': 'Dec 6 19:49:04 hqnl0246134 sshd[248856]: Failed password for root from 61.177.173.18 port 15781 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
WARNING [2022-12-06 19:49:09,939] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:49:09,962] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0314 seconds
INFO [2022-12-06 19:49:17,904] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:49:17,904] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:49:17,910] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:49:17,922] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-06 19:49:20,578] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:49:20,578] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:49:20,590] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:49:20,618] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0387 seconds
INFO [2022-12-06 19:49:32,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670348972.8788567, 'message': 'Dec 6 19:49:32 hqnl0246134 sshd[248896]: Invalid user new from 210.19.254.6 port 53518', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1068 seconds
INFO [2022-12-06 19:49:33,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.19.254.6', 'timestamp': 1670348972.8793814, 'message': 'Dec 6 19:49:32 hqnl0246134 sshd[248896]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.19.254.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0949 seconds
INFO [2022-12-06 19:49:33,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.19.254.6', 'timestamp': 1670348972.8796096, 'message': 'Dec 6 19:49:32 hqnl0246134 sshd[248896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.19.254.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1196 seconds
INFO [2022-12-06 19:49:34,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670348974.8808353, 'message': 'Dec 6 19:49:34 hqnl0246134 sshd[248896]: Failed password for invalid user new from 210.19.254.6 port 53518 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 19:49:36,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670348976.8824706, 'message': 'Dec 6 19:49:36 hqnl0246134 sshd[248896]: Disconnected from invalid user new 210.19.254.6 port 53518 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 19:49:44,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348984.8939743, 'message': 'Dec 6 19:49:44 hqnl0246134 sshd[248904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 19:49:44,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348984.8943949, 'message': 'Dec 6 19:49:44 hqnl0246134 sshd[248904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 19:49:46,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348986.896978, 'message': 'Dec 6 19:49:46 hqnl0246134 sshd[248904]: Failed password for root from 61.177.173.18 port 46014 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
WARNING [2022-12-06 19:49:48,395] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:49:48,396] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:49:50,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348990.9022808, 'message': 'Dec 6 19:49:48 hqnl0246134 sshd[248904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 19:49:50,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348990.9025726, 'message': 'Dec 6 19:49:50 hqnl0246134 sshd[248904]: Failed password for root from 61.177.173.18 port 46014 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 19:49:52,920] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348992.9040344, 'message': 'Dec 6 19:49:51 hqnl0246134 sshd[248904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 19:49:54,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670348994.9058106, 'message': 'Dec 6 19:49:53 hqnl0246134 sshd[248904]: Failed password for root from 61.177.173.18 port 46014 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0246 seconds
WARNING [2022-12-06 19:50:09,966] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:50:10,018] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0821 seconds
INFO [2022-12-06 19:50:17,922] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:50:17,922] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:50:17,934] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:50:17,950] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0250 seconds
INFO [2022-12-06 19:50:20,511] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:50:20,512] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:50:20,522] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:50:20,541] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0287 seconds
INFO [2022-12-06 19:50:32,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349032.9520779, 'message': 'Dec 6 19:50:32 hqnl0246134 sshd[248973]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 19:50:32,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349032.9525373, 'message': 'Dec 6 19:50:32 hqnl0246134 sshd[248973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 19:50:34,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349034.954025, 'message': 'Dec 6 19:50:34 hqnl0246134 sshd[248973]: Failed password for root from 61.177.173.18 port 37322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 19:50:36,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349036.9564767, 'message': 'Dec 6 19:50:35 hqnl0246134 sshd[248973]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 19:50:36,993] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349036.956669, 'message': 'Dec 6 19:50:36 hqnl0246134 sshd[248973]: Failed password for root from 61.177.173.18 port 37322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 19:50:38,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349038.9590435, 'message': 'Dec 6 19:50:37 hqnl0246134 sshd[248973]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 19:50:40,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349040.9615166, 'message': 'Dec 6 19:50:39 hqnl0246134 sshd[248973]: Failed password for root from 61.177.173.18 port 37322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 19:50:44,421] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:50:44,422] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:50:44,437] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:50:44,463] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0407 seconds
WARNING [2022-12-06 19:50:48,402] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:50:48,403] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 19:51:09,953] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:51:09,981] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0389 seconds
INFO [2022-12-06 19:51:16,505] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 19:51:16,572] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 19:51:16,573] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 19:51:16,573] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 19:51:16,574] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 19:51:16,574] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 19:51:16,587] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 19:51:16,605] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0296 seconds
WARNING [2022-12-06 19:51:16,612] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 19:51:16,614] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:51:16,633] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0343 seconds
INFO [2022-12-06 19:51:16,635] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0326 seconds
INFO [2022-12-06 19:51:17,922] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:51:17,923] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:51:17,930] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:51:17,941] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 19:51:20,621] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:51:20,621] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:51:20,635] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:51:20,648] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 19:51:21,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349081.012722, 'message': 'Dec 6 19:51:19 hqnl0246134 sshd[249019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 19:51:21,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349081.0132208, 'message': 'Dec 6 19:51:19 hqnl0246134 sshd[249019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 19:51:23,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349083.014854, 'message': 'Dec 6 19:51:21 hqnl0246134 sshd[249019]: Failed password for root from 61.177.173.18 port 15290 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 19:51:23,051] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349083.0150802, 'message': 'Dec 6 19:51:22 hqnl0246134 sshd[249019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 19:51:25,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349085.0198221, 'message': 'Dec 6 19:51:23 hqnl0246134 sshd[249019]: Failed password for root from 61.177.173.18 port 15290 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 19:51:25,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349085.0203147, 'message': 'Dec 6 19:51:24 hqnl0246134 sshd[249019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 19:51:27,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349087.024132, 'message': 'Dec 6 19:51:26 hqnl0246134 sshd[249019]: Failed password for root from 61.177.173.18 port 15290 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 19:51:40,104] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 19:51:40,106] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 19:51:40,988] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-06 19:51:46,701] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 19:51:46,702] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 19:51:46,702] im360.plugins.client360: Waiting 4 minutes before retry...
WARNING [2022-12-06 19:51:48,405] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:51:48,406] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 19:51:53,883] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 19:52:09,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349129.0825536, 'message': 'Dec 6 19:52:07 hqnl0246134 sshd[249104]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 19:52:09,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349129.083545, 'message': 'Dec 6 19:52:07 hqnl0246134 sshd[249104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
WARNING [2022-12-06 19:52:09,962] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:52:09,984] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0345 seconds
INFO [2022-12-06 19:52:11,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349131.082719, 'message': 'Dec 6 19:52:09 hqnl0246134 sshd[249104]: Failed password for root from 61.177.173.18 port 46077 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 19:52:13,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349133.085122, 'message': 'Dec 6 19:52:11 hqnl0246134 sshd[249104]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 19:52:15,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349135.0861013, 'message': 'Dec 6 19:52:13 hqnl0246134 sshd[249104]: Failed password for root from 61.177.173.18 port 46077 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 19:52:15,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349135.0863526, 'message': 'Dec 6 19:52:14 hqnl0246134 sshd[249104]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:52:17,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349137.088331, 'message': 'Dec 6 19:52:16 hqnl0246134 sshd[249104]: Failed password for root from 61.177.173.18 port 46077 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 19:52:17,924] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:52:17,925] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:52:17,932] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:52:17,942] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-06 19:52:22,247] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:52:22,248] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:52:22,261] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:52:22,280] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0314 seconds
INFO [2022-12-06 19:52:22,780] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:52:22,781] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:52:22,789] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:52:22,800] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
WARNING [2022-12-06 19:52:48,408] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:52:48,409] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:52:55,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349175.1471727, 'message': 'Dec 6 19:52:54 hqnl0246134 sshd[249141]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 19:52:55,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349175.1479473, 'message': 'Dec 6 19:52:54 hqnl0246134 sshd[249141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 19:52:57,167] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349177.1485844, 'message': 'Dec 6 19:52:56 hqnl0246134 sshd[249141]: Failed password for root from 61.177.173.18 port 62400 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 19:52:57,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349177.1488388, 'message': 'Dec 6 19:52:56 hqnl0246134 sshd[249141]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 19:52:59,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349179.1500182, 'message': 'Dec 6 19:52:58 hqnl0246134 sshd[249141]: Failed password for root from 61.177.173.18 port 62400 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 19:53:01,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349181.1527703, 'message': 'Dec 6 19:53:01 hqnl0246134 sshd[249141]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 19:53:05,177] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349185.1574337, 'message': 'Dec 6 19:53:03 hqnl0246134 sshd[249141]: Failed password for root from 61.177.173.18 port 62400 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 19:53:09,961] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:53:09,981] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0285 seconds
INFO [2022-12-06 19:53:18,206] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:53:18,206] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:53:18,217] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:53:18,235] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0281 seconds
INFO [2022-12-06 19:53:21,237] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:53:21,237] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:53:21,248] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:53:21,266] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0280 seconds
INFO [2022-12-06 19:53:45,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349225.2076354, 'message': 'Dec 6 19:53:43 hqnl0246134 sshd[249184]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 19:53:45,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349225.2079597, 'message': 'Dec 6 19:53:43 hqnl0246134 sshd[249184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 19:53:47,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349227.2098632, 'message': 'Dec 6 19:53:46 hqnl0246134 sshd[249184]: Failed password for root from 61.177.173.18 port 44916 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0257 seconds
WARNING [2022-12-06 19:53:48,412] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:53:48,413] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:53:49,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349229.212917, 'message': 'Dec 6 19:53:48 hqnl0246134 sshd[249184]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 19:53:51,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349231.2165394, 'message': 'Dec 6 19:53:50 hqnl0246134 sshd[249184]: Failed password for root from 61.177.173.18 port 44916 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 19:53:53,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349233.219311, 'message': 'Dec 6 19:53:52 hqnl0246134 sshd[249184]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 19:53:55,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349235.2218022, 'message': 'Dec 6 19:53:54 hqnl0246134 sshd[249184]: Failed password for root from 61.177.173.18 port 44916 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0700 seconds
INFO [2022-12-06 19:53:58,017] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:53:58,018] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:53:58,026] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:53:58,038] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
WARNING [2022-12-06 19:54:09,967] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:54:09,989] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0317 seconds
INFO [2022-12-06 19:54:17,290] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.83.28.210', 'timestamp': 1670349257.2647452, 'message': 'Dec 6 19:54:16 hqnl0246134 sshd[249187]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.83.28.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 19:54:17,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.83.28.210', 'timestamp': 1670349257.2651517, 'message': 'Dec 6 19:54:16 hqnl0246134 sshd[249187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.83.28.210 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 19:54:17,991] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:54:17,992] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:54:18,000] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:54:18,019] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0259 seconds
INFO [2022-12-06 19:54:19,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '186.83.28.210', 'timestamp': 1670349259.2659636, 'message': 'Dec 6 19:54:18 hqnl0246134 sshd[249187]: Failed password for root from 186.83.28.210 port 40430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 19:54:20,912] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:54:20,913] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:54:20,921] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:54:20,934] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 19:54:31,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349271.2825816, 'message': 'Dec 6 19:54:31 hqnl0246134 sshd[249239]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 19:54:31,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349271.282958, 'message': 'Dec 6 19:54:31 hqnl0246134 sshd[249239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 19:54:33,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349273.2840464, 'message': 'Dec 6 19:54:33 hqnl0246134 sshd[249239]: Failed password for root from 61.177.173.18 port 17250 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 19:54:33,328] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349273.2845528, 'message': 'Dec 6 19:54:33 hqnl0246134 sshd[249239]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 19:54:37,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349277.2980545, 'message': 'Dec 6 19:54:35 hqnl0246134 sshd[249239]: Failed password for root from 61.177.173.18 port 17250 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 19:54:39,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349279.29893, 'message': 'Dec 6 19:54:37 hqnl0246134 sshd[249239]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 19:54:41,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349281.3017373, 'message': 'Dec 6 19:54:39 hqnl0246134 sshd[249239]: Failed password for root from 61.177.173.18 port 17250 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
WARNING [2022-12-06 19:54:48,415] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:54:48,415] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:55:01,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.19.254.6', 'timestamp': 1670349301.3244648, 'message': 'Dec 6 19:55:01 hqnl0246134 sshd[249254]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.19.254.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0477 seconds
INFO [2022-12-06 19:55:01,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.19.254.6', 'timestamp': 1670349301.326849, 'message': 'Dec 6 19:55:01 hqnl0246134 sshd[249254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.19.254.6 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0484 seconds
INFO [2022-12-06 19:55:03,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '210.19.254.6', 'timestamp': 1670349303.326923, 'message': 'Dec 6 19:55:03 hqnl0246134 sshd[249254]: Failed password for root from 210.19.254.6 port 35730 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 19:55:05,357] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '169.239.220.35', 'timestamp': 1670349305.32937, 'message': 'Dec 6 19:55:04 hqnl0246134 sshd[249275]: pam_imunify(sshd:auth): [IM360_RBL] The IP 169.239.220.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 19:55:05,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '169.239.220.35', 'timestamp': 1670349305.3300555, 'message': 'Dec 6 19:55:04 hqnl0246134 sshd[249275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=169.239.220.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 19:55:07,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '169.239.220.35', 'timestamp': 1670349307.3298678, 'message': 'Dec 6 19:55:05 hqnl0246134 sshd[249275]: Failed password for root from 169.239.220.35 port 48825 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 19:55:08,047] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:55:08,048] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:55:08,059] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:55:08,073] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0245 seconds
WARNING [2022-12-06 19:55:09,991] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:55:10,099] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.1375 seconds
INFO [2022-12-06 19:55:18,211] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:55:18,212] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:55:18,220] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:55:18,233] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 19:55:19,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349319.3532765, 'message': 'Dec 6 19:55:18 hqnl0246134 sshd[249297]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 19:55:19,406] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349319.3534913, 'message': 'Dec 6 19:55:18 hqnl0246134 sshd[249297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 19:55:21,043] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:55:21,044] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:55:21,051] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:55:21,062] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 19:55:21,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349321.35877, 'message': 'Dec 6 19:55:20 hqnl0246134 sshd[249297]: Failed password for root from 61.177.173.18 port 45047 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 19:55:21,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349321.3590167, 'message': 'Dec 6 19:55:20 hqnl0246134 sshd[249297]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 19:55:23,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349323.3650744, 'message': 'Dec 6 19:55:22 hqnl0246134 sshd[249297]: Failed password for root from 61.177.173.18 port 45047 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 19:55:25,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349325.3697388, 'message': 'Dec 6 19:55:24 hqnl0246134 sshd[249297]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 19:55:27,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349327.369882, 'message': 'Dec 6 19:55:26 hqnl0246134 sshd[249297]: Failed password for root from 61.177.173.18 port 45047 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 19:55:48,418] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:55:48,419] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:56:03,736] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 19:56:03,802] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 19:56:03,803] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 19:56:03,803] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 19:56:03,803] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 19:56:03,804] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 19:56:03,815] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 19:56:03,837] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0329 seconds
WARNING [2022-12-06 19:56:03,849] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 19:56:03,852] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:56:03,881] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0530 seconds
INFO [2022-12-06 19:56:03,883] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0494 seconds
INFO [2022-12-06 19:56:05,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349365.421639, 'message': 'Dec 6 19:56:04 hqnl0246134 sshd[249366]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 19:56:05,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349365.4219759, 'message': 'Dec 6 19:56:04 hqnl0246134 sshd[249366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 19:56:07,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349367.425147, 'message': 'Dec 6 19:56:07 hqnl0246134 sshd[249366]: Failed password for root from 61.177.173.18 port 15619 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 19:56:09,455] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349369.430133, 'message': 'Dec 6 19:56:09 hqnl0246134 sshd[249366]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
WARNING [2022-12-06 19:56:09,973] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:56:10,003] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0383 seconds
INFO [2022-12-06 19:56:11,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349371.4333801, 'message': 'Dec 6 19:56:11 hqnl0246134 sshd[249366]: Failed password for root from 61.177.173.18 port 15619 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 19:56:15,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349375.4384267, 'message': 'Dec 6 19:56:13 hqnl0246134 sshd[249366]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 19:56:15,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349375.4387538, 'message': 'Dec 6 19:56:15 hqnl0246134 sshd[249366]: Failed password for root from 61.177.173.18 port 15619 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 19:56:18,317] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:56:18,318] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:56:18,329] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:56:18,343] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 19:56:18,793] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:56:18,794] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:56:18,807] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:56:18,828] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0339 seconds
INFO [2022-12-06 19:56:21,115] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:56:21,116] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:56:21,124] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:56:21,135] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 19:56:27,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349387.4552803, 'message': 'Dec 6 19:56:26 hqnl0246134 sshd[249396]: Invalid user test from 165.22.213.171 port 53702', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 19:56:27,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349387.4558008, 'message': 'Dec 6 19:56:26 hqnl0246134 sshd[249396]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.22.213.171 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 19:56:27,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349387.4559655, 'message': 'Dec 6 19:56:26 hqnl0246134 sshd[249396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.213.171 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 19:56:29,515] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349389.4570189, 'message': 'Dec 6 19:56:28 hqnl0246134 sshd[249396]: Failed password for invalid user test from 165.22.213.171 port 53702 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0578 seconds
INFO [2022-12-06 19:56:31,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349391.457962, 'message': 'Dec 6 19:56:31 hqnl0246134 sshd[249396]: Disconnected from invalid user test 165.22.213.171 port 53702 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 19:56:34,342] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 19:56:34,342] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 19:56:34,343] im360.plugins.client360: Waiting 3 minutes before retry...
WARNING [2022-12-06 19:56:48,421] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:56:48,422] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:56:53,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349413.4940596, 'message': 'Dec 6 19:56:53 hqnl0246134 sshd[249405]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 19:56:53,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349413.4944558, 'message': 'Dec 6 19:56:53 hqnl0246134 sshd[249405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 19:56:55,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349415.495864, 'message': 'Dec 6 19:56:54 hqnl0246134 sshd[249405]: Failed password for root from 61.177.173.18 port 54258 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 19:56:57,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349417.498207, 'message': 'Dec 6 19:56:55 hqnl0246134 sshd[249405]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 19:56:59,531] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349419.5008805, 'message': 'Dec 6 19:56:57 hqnl0246134 sshd[249405]: Failed password for root from 61.177.173.18 port 54258 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 19:57:01,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349421.5039144, 'message': 'Dec 6 19:56:59 hqnl0246134 sshd[249405]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0399 seconds
INFO [2022-12-06 19:57:03,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349423.5077431, 'message': 'Dec 6 19:57:01 hqnl0246134 sshd[249405]: Failed password for root from 61.177.173.18 port 54258 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0278 seconds
WARNING [2022-12-06 19:57:09,977] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:57:10,001] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0326 seconds
INFO [2022-12-06 19:57:18,077] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:57:18,078] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:57:18,085] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:57:18,097] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 19:57:21,101] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:57:21,101] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:57:21,110] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:57:21,122] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 19:57:41,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349461.5607736, 'message': 'Dec 6 19:57:41 hqnl0246134 sshd[249461]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 19:57:41,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349461.5612502, 'message': 'Dec 6 19:57:41 hqnl0246134 sshd[249461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 19:57:43,583] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349463.5622044, 'message': 'Dec 6 19:57:43 hqnl0246134 sshd[249461]: Failed password for root from 61.177.173.18 port 27278 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 19:57:45,583] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349465.5649784, 'message': 'Dec 6 19:57:43 hqnl0246134 sshd[249461]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 19:57:45,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349465.565183, 'message': 'Dec 6 19:57:45 hqnl0246134 sshd[249461]: Failed password for root from 61.177.173.18 port 27278 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 19:57:47,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349467.5654786, 'message': 'Dec 6 19:57:45 hqnl0246134 sshd[249461]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0279 seconds
WARNING [2022-12-06 19:57:48,425] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:57:48,426] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 19:57:49,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349469.569347, 'message': 'Dec 6 19:57:47 hqnl0246134 sshd[249461]: Failed password for root from 61.177.173.18 port 27278 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0759 seconds
INFO [2022-12-06 19:57:49,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349469.5802236, 'message': 'Dec 6 19:57:48 hqnl0246134 sshd[249466]: Invalid user admin from 184.168.122.146 port 36154', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0690 seconds
INFO [2022-12-06 19:57:49,688] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349469.5810235, 'message': 'Dec 6 19:57:48 hqnl0246134 sshd[249466]: pam_imunify(sshd:auth): [IM360_RBL] The IP 184.168.122.146 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 19:57:49,722] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349469.5816536, 'message': 'Dec 6 19:57:48 hqnl0246134 sshd[249466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.168.122.146 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 19:57:51,177] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:57:51,178] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:57:51,199] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:57:51,235] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0421 seconds
INFO [2022-12-06 19:57:51,587] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349471.5701184, 'message': 'Dec 6 19:57:50 hqnl0246134 sshd[249466]: Failed password for invalid user admin from 184.168.122.146 port 36154 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 19:57:53,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349473.5709977, 'message': 'Dec 6 19:57:52 hqnl0246134 sshd[249466]: Disconnected from invalid user admin 184.168.122.146 port 36154 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0226 seconds
WARNING [2022-12-06 19:58:09,985] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:58:10,011] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0374 seconds
INFO [2022-12-06 19:58:17,855] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:58:17,855] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:58:17,865] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:58:17,879] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0229 seconds
INFO [2022-12-06 19:58:20,693] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:58:20,693] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:58:20,700] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:58:20,711] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-06 19:58:29,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349509.6241307, 'message': 'Dec 6 19:58:29 hqnl0246134 sshd[249518]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 19:58:29,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349509.6245124, 'message': 'Dec 6 19:58:29 hqnl0246134 sshd[249518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 19:58:31,654] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349511.6245124, 'message': 'Dec 6 19:58:31 hqnl0246134 sshd[249518]: Failed password for root from 61.177.173.18 port 52437 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 19:58:33,664] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349513.6342573, 'message': 'Dec 6 19:58:33 hqnl0246134 sshd[249518]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 19:58:37,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349517.648925, 'message': 'Dec 6 19:58:36 hqnl0246134 sshd[249518]: Failed password for root from 61.177.173.18 port 52437 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 19:58:39,688] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349519.655657, 'message': 'Dec 6 19:58:37 hqnl0246134 sshd[249518]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 19:58:39,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349519.6559567, 'message': 'Dec 6 19:58:39 hqnl0246134 sshd[249518]: Failed password for root from 61.177.173.18 port 52437 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 19:58:44,453] defence360agent.files: Updating all files
INFO [2022-12-06 19:58:44,739] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 19:58:44,740] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 19:58:45,026] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 19:58:45,027] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 19:58:45,355] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 19:58:45,355] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 19:58:45,642] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 19:58:45,643] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 19:58:45,643] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 19:58:45,965] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 17:58:45 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E460B3FF14926'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 19:58:45,967] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 19:58:45,967] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 19:58:46,606] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 19:58:46,606] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 19:58:46,927] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 19:58:46,928] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 19:58:47,192] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 19:58:47,193] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 19:58:47,587] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 19:58:47,588] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 19:58:48,034] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 19:58:48,035] defence360agent.files: geo files update finished (not updated)
WARNING [2022-12-06 19:58:48,429] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:58:48,430] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 19:59:09,994] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:59:10,016] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0370 seconds
INFO [2022-12-06 19:59:17,894] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:59:17,895] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:59:17,902] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:59:17,914] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 19:59:19,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349559.7164073, 'message': 'Dec 6 19:59:18 hqnl0246134 sshd[249542]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 19:59:19,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349559.716627, 'message': 'Dec 6 19:59:18 hqnl0246134 sshd[249542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 19:59:20,437] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:59:20,438] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:59:20,447] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:59:20,458] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 19:59:21,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349561.719255, 'message': 'Dec 6 19:59:20 hqnl0246134 sshd[249542]: Failed password for root from 61.177.173.18 port 31727 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 19:59:21,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349561.720393, 'message': 'Dec 6 19:59:21 hqnl0246134 sshd[249542]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 19:59:23,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349563.7221637, 'message': 'Dec 6 19:59:23 hqnl0246134 sshd[249542]: Failed password for root from 61.177.173.18 port 31727 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 19:59:25,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349565.7263222, 'message': 'Dec 6 19:59:25 hqnl0246134 sshd[249542]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 19:59:25,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349565.7265913, 'message': 'Dec 6 19:59:25 hqnl0246134 sshd[249572]: Invalid user zhang from 165.22.213.171 port 56236', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 19:59:25,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349565.7267485, 'message': 'Dec 6 19:59:25 hqnl0246134 sshd[249572]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.22.213.171 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 19:59:25,792] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349565.7268548, 'message': 'Dec 6 19:59:25 hqnl0246134 sshd[249572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.213.171 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 19:59:27,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349567.7365668, 'message': 'Dec 6 19:59:27 hqnl0246134 sshd[249542]: Failed password for root from 61.177.173.18 port 31727 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1299 seconds
INFO [2022-12-06 19:59:27,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349567.7375176, 'message': 'Dec 6 19:59:27 hqnl0246134 sshd[249572]: Failed password for invalid user zhang from 165.22.213.171 port 56236 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1345 seconds
INFO [2022-12-06 19:59:29,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349569.7346652, 'message': 'Dec 6 19:59:29 hqnl0246134 sshd[249572]: Disconnected from invalid user zhang 165.22.213.171 port 56236 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 19:59:30,417] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 19:59:30,417] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 19:59:30,426] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 19:59:30,438] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
WARNING [2022-12-06 19:59:48,433] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 19:59:48,433] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:00:07,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349607.8065622, 'message': 'Dec 6 20:00:06 hqnl0246134 sshd[249646]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 20:00:07,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349607.8070176, 'message': 'Dec 6 20:00:06 hqnl0246134 sshd[249646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 20:00:09,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349609.8110652, 'message': 'Dec 6 20:00:09 hqnl0246134 sshd[249646]: Failed password for root from 61.177.173.18 port 52972 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-06 20:00:09,994] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:00:10,013] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0289 seconds
INFO [2022-12-06 20:00:11,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349611.8173227, 'message': 'Dec 6 20:00:11 hqnl0246134 sshd[249646]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 20:00:13,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349613.8218064, 'message': 'Dec 6 20:00:12 hqnl0246134 sshd[249646]: Failed password for root from 61.177.173.18 port 52972 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:00:13,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349613.8254497, 'message': 'Dec 6 20:00:13 hqnl0246134 sshd[249646]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0162 seconds
INFO [2022-12-06 20:00:15,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349615.8247306, 'message': 'Dec 6 20:00:15 hqnl0246134 sshd[249646]: Failed password for root from 61.177.173.18 port 52972 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 20:00:16,608] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 20:00:16,682] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 20:00:16,683] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 20:00:16,683] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 20:00:16,683] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 20:00:16,683] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 20:00:16,699] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 20:00:16,716] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0325 seconds
WARNING [2022-12-06 20:00:16,723] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 20:00:16,725] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:00:16,745] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0348 seconds
INFO [2022-12-06 20:00:16,747] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0329 seconds
INFO [2022-12-06 20:00:17,869] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:00:17,869] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:00:17,880] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:00:17,899] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0289 seconds
INFO [2022-12-06 20:00:19,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349619.8261354, 'message': 'Dec 6 20:00:18 hqnl0246134 sshd[249663]: Invalid user philip from 184.168.122.146 port 39710', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 20:00:19,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349619.8263986, 'message': 'Dec 6 20:00:18 hqnl0246134 sshd[249663]: pam_imunify(sshd:auth): [IM360_RBL] The IP 184.168.122.146 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 20:00:19,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349619.8329144, 'message': 'Dec 6 20:00:18 hqnl0246134 sshd[249663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.168.122.146 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 20:00:20,645] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:00:20,645] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:00:20,652] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:00:20,664] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 20:00:21,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349621.8316803, 'message': 'Dec 6 20:00:20 hqnl0246134 sshd[249663]: Failed password for invalid user philip from 184.168.122.146 port 39710 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 20:00:23,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349623.833999, 'message': 'Dec 6 20:00:22 hqnl0246134 sshd[249663]: Disconnected from invalid user philip 184.168.122.146 port 39710 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 20:00:37,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.68.67', 'timestamp': 1670349637.854396, 'message': 'Dec 6 20:00:36 hqnl0246134 sshd[249685]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.68.67 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 20:00:37,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.68.67', 'timestamp': 1670349637.8549275, 'message': 'Dec 6 20:00:36 hqnl0246134 sshd[249685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.68.67 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:00:39,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.59.68.67', 'timestamp': 1670349639.8545763, 'message': 'Dec 6 20:00:39 hqnl0246134 sshd[249685]: Failed password for root from 139.59.68.67 port 33054 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 20:00:43,551] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:00:43,551] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:00:43,558] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:00:43,570] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 20:00:46,809] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 20:00:46,810] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 20:00:46,811] im360.plugins.client360: Waiting 6 minutes before retry...
WARNING [2022-12-06 20:00:48,437] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:00:48,438] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:00:55,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349655.8773901, 'message': 'Dec 6 20:00:54 hqnl0246134 sshd[249692]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 20:00:55,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349655.8783834, 'message': 'Dec 6 20:00:54 hqnl0246134 sshd[249692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:00:57,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349657.8784854, 'message': 'Dec 6 20:00:56 hqnl0246134 sshd[249692]: Failed password for root from 61.177.173.18 port 30158 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 20:00:57,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349657.878909, 'message': 'Dec 6 20:00:57 hqnl0246134 sshd[249692]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 20:00:59,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349659.8783252, 'message': 'Dec 6 20:00:59 hqnl0246134 sshd[249692]: Failed password for root from 61.177.173.18 port 30158 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:00:59,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349659.8785167, 'message': 'Dec 6 20:00:59 hqnl0246134 sshd[249692]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 20:01:01,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349661.8872614, 'message': 'Dec 6 20:01:01 hqnl0246134 sshd[249692]: Failed password for root from 61.177.173.18 port 30158 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
WARNING [2022-12-06 20:01:09,998] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:01:10,029] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0407 seconds
INFO [2022-12-06 20:01:17,904] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:01:17,904] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:01:17,911] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:01:17,923] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 20:01:21,297] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:01:21,298] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:01:21,306] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:01:21,317] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 20:01:31,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '169.239.220.35', 'timestamp': 1670349691.9545894, 'message': 'Dec 6 20:01:30 hqnl0246134 sshd[249741]: Invalid user ubuntu from 169.239.220.35 port 44875', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 20:01:32,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '169.239.220.35', 'timestamp': 1670349691.95515, 'message': 'Dec 6 20:01:31 hqnl0246134 sshd[249741]: pam_imunify(sshd:auth): [IM360_RBL] The IP 169.239.220.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:01:32,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '169.239.220.35', 'timestamp': 1670349691.9553292, 'message': 'Dec 6 20:01:31 hqnl0246134 sshd[249741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=169.239.220.35 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:01:33,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '169.239.220.35', 'timestamp': 1670349693.9544055, 'message': 'Dec 6 20:01:32 hqnl0246134 sshd[249741]: Failed password for invalid user ubuntu from 169.239.220.35 port 44875 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 20:01:33,993] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '169.239.220.35', 'timestamp': 1670349693.9546518, 'message': 'Dec 6 20:01:33 hqnl0246134 sshd[249741]: Disconnected from invalid user ubuntu 169.239.220.35 port 44875 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:01:35,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349695.9566746, 'message': 'Dec 6 20:01:35 hqnl0246134 sshd[249744]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.22.213.171 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 20:01:37,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349697.9578788, 'message': 'Dec 6 20:01:35 hqnl0246134 sshd[249744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.213.171 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 20:01:39,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349699.9604752, 'message': 'Dec 6 20:01:38 hqnl0246134 sshd[249744]: Failed password for root from 165.22.213.171 port 50716 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 20:01:43,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349703.965188, 'message': 'Dec 6 20:01:43 hqnl0246134 sshd[249750]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 20:01:44,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349703.965408, 'message': 'Dec 6 20:01:43 hqnl0246134 sshd[249750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 20:01:45,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349705.96567, 'message': 'Dec 6 20:01:44 hqnl0246134 sshd[249750]: Failed password for root from 61.177.173.18 port 61531 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 20:01:46,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349705.9658887, 'message': 'Dec 6 20:01:45 hqnl0246134 sshd[249750]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:01:48,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349707.9680603, 'message': 'Dec 6 20:01:47 hqnl0246134 sshd[249750]: Failed password for root from 61.177.173.18 port 61531 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0739 seconds
INFO [2022-12-06 20:01:48,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349707.9684126, 'message': 'Dec 6 20:01:47 hqnl0246134 sshd[249750]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0561 seconds
WARNING [2022-12-06 20:01:48,444] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:01:48,445] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:01:51,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349711.9725997, 'message': 'Dec 6 20:01:50 hqnl0246134 sshd[249750]: Failed password for root from 61.177.173.18 port 61531 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-06 20:01:53,887] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 20:02:10,004] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:02:10,031] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0365 seconds
INFO [2022-12-06 20:02:16,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349736.0083835, 'message': 'Dec 6 20:02:15 hqnl0246134 sshd[249790]: pam_imunify(sshd:auth): [IM360_RBL] The IP 184.168.122.146 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 20:02:16,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349736.008803, 'message': 'Dec 6 20:02:15 hqnl0246134 sshd[249790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.168.122.146 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 20:02:18,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349738.010028, 'message': 'Dec 6 20:02:17 hqnl0246134 sshd[249790]: Failed password for root from 184.168.122.146 port 38378 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0511 seconds
INFO [2022-12-06 20:02:18,202] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:02:18,202] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:02:18,209] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:02:18,221] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 20:02:20,461] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:02:20,462] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:02:20,469] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:02:20,481] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 20:02:20,938] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:02:20,939] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:02:20,945] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:02:20,956] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 20:02:32,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349752.0245862, 'message': 'Dec 6 20:02:30 hqnl0246134 sshd[249818]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 20:02:32,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349752.0253375, 'message': 'Dec 6 20:02:30 hqnl0246134 sshd[249818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 20:02:32,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349752.02552, 'message': 'Dec 6 20:02:31 hqnl0246134 sshd[249818]: Failed password for root from 61.177.173.18 port 39309 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:02:34,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349754.0266542, 'message': 'Dec 6 20:02:32 hqnl0246134 sshd[249818]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0416 seconds
INFO [2022-12-06 20:02:36,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349756.0307665, 'message': 'Dec 6 20:02:34 hqnl0246134 sshd[249818]: Failed password for root from 61.177.173.18 port 39309 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 20:02:36,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349756.0310209, 'message': 'Dec 6 20:02:35 hqnl0246134 sshd[249818]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 20:02:38,060] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349758.034487, 'message': 'Dec 6 20:02:36 hqnl0246134 sshd[249818]: Failed password for root from 61.177.173.18 port 39309 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0257 seconds
WARNING [2022-12-06 20:02:48,448] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:02:48,451] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 20:03:10,016] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:03:10,044] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0409 seconds
INFO [2022-12-06 20:03:18,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349798.078882, 'message': 'Dec 6 20:03:16 hqnl0246134 sshd[249878]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 20:03:18,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349798.079472, 'message': 'Dec 6 20:03:16 hqnl0246134 sshd[249878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 20:03:18,869] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:03:18,869] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:03:18,878] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:03:18,889] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 20:03:20,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349800.0782492, 'message': 'Dec 6 20:03:18 hqnl0246134 sshd[249878]: Failed password for root from 61.177.173.18 port 64074 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 20:03:20,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349800.0786111, 'message': 'Dec 6 20:03:18 hqnl0246134 sshd[249878]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:03:21,506] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:03:21,507] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:03:21,514] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:03:21,528] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 20:03:22,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349802.0844977, 'message': 'Dec 6 20:03:20 hqnl0246134 sshd[249878]: Failed password for root from 61.177.173.18 port 64074 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 20:03:22,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349802.0848405, 'message': 'Dec 6 20:03:20 hqnl0246134 sshd[249878]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 20:03:24,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349804.0895903, 'message': 'Dec 6 20:03:22 hqnl0246134 sshd[249878]: Failed password for root from 61.177.173.18 port 64074 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 20:03:34,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349814.1156716, 'message': 'Dec 6 20:03:33 hqnl0246134 sshd[249902]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.22.213.171 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 20:03:34,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349814.1162808, 'message': 'Dec 6 20:03:33 hqnl0246134 sshd[249902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.213.171 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 20:03:36,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.22.213.171', 'timestamp': 1670349816.1183643, 'message': 'Dec 6 20:03:36 hqnl0246134 sshd[249902]: Failed password for root from 165.22.213.171 port 45198 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 20:03:40,791] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:03:40,791] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:03:40,823] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:03:40,856] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0508 seconds
WARNING [2022-12-06 20:03:48,453] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:03:48,454] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:04:04,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349844.1545992, 'message': 'Dec 6 20:04:03 hqnl0246134 sshd[249936]: Invalid user epg from 184.168.122.146 port 37036', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 20:04:04,208] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349844.155551, 'message': 'Dec 6 20:04:04 hqnl0246134 sshd[249938]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0493 seconds
INFO [2022-12-06 20:04:04,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349844.155249, 'message': 'Dec 6 20:04:03 hqnl0246134 sshd[249936]: pam_imunify(sshd:auth): [IM360_RBL] The IP 184.168.122.146 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 20:04:04,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349844.1557097, 'message': 'Dec 6 20:04:04 hqnl0246134 sshd[249938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 20:04:04,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349844.1554248, 'message': 'Dec 6 20:04:03 hqnl0246134 sshd[249936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.168.122.146 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 20:04:08,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349848.15689, 'message': 'Dec 6 20:04:06 hqnl0246134 sshd[249936]: Failed password for invalid user epg from 184.168.122.146 port 37036 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 20:04:08,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349848.1571555, 'message': 'Dec 6 20:04:06 hqnl0246134 sshd[249938]: Failed password for root from 61.177.173.18 port 45430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 20:04:08,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '184.168.122.146', 'timestamp': 1670349848.1573093, 'message': 'Dec 6 20:04:07 hqnl0246134 sshd[249936]: Disconnected from invalid user epg 184.168.122.146 port 37036 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0421 seconds
WARNING [2022-12-06 20:04:10,021] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:04:10,049] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0402 seconds
INFO [2022-12-06 20:04:10,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349850.158647, 'message': 'Dec 6 20:04:08 hqnl0246134 sshd[249938]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:04:12,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349852.162361, 'message': 'Dec 6 20:04:10 hqnl0246134 sshd[249938]: Failed password for root from 61.177.173.18 port 45430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 20:04:14,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349854.1631603, 'message': 'Dec 6 20:04:12 hqnl0246134 sshd[249938]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 20:04:16,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349856.166829, 'message': 'Dec 6 20:04:14 hqnl0246134 sshd[249938]: Failed password for root from 61.177.173.18 port 45430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 20:04:18,063] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:04:18,063] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:04:18,070] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:04:18,082] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 20:04:20,749] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:04:20,750] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:04:20,766] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:04:20,786] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0255 seconds
WARNING [2022-12-06 20:04:48,457] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:04:48,458] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:04:52,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349892.225887, 'message': 'Dec 6 20:04:50 hqnl0246134 sshd[249980]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 20:04:52,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349892.226708, 'message': 'Dec 6 20:04:50 hqnl0246134 sshd[249980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:04:54,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349894.2277076, 'message': 'Dec 6 20:04:53 hqnl0246134 sshd[249980]: Failed password for root from 61.177.173.18 port 12440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 20:04:56,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349896.2302911, 'message': 'Dec 6 20:04:55 hqnl0246134 sshd[249980]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 20:04:58,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349898.2322934, 'message': 'Dec 6 20:04:57 hqnl0246134 sshd[249980]: Failed password for root from 61.177.173.18 port 12440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 20:04:58,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349898.2326796, 'message': 'Dec 6 20:04:57 hqnl0246134 sshd[249980]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:05:00,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349900.236602, 'message': 'Dec 6 20:04:59 hqnl0246134 sshd[249980]: Failed password for root from 61.177.173.18 port 12440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0377 seconds
WARNING [2022-12-06 20:05:10,544] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:05:10,575] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.5621 seconds
INFO [2022-12-06 20:05:17,769] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:05:17,770] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:05:17,777] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:05:17,789] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 20:05:20,336] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:05:20,336] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:05:20,343] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:05:20,354] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 20:05:40,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349940.2849486, 'message': 'Dec 6 20:05:39 hqnl0246134 sshd[250051]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 20:05:40,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349940.2855422, 'message': 'Dec 6 20:05:39 hqnl0246134 sshd[250051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 20:05:42,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349942.2864652, 'message': 'Dec 6 20:05:41 hqnl0246134 sshd[250051]: Failed password for root from 61.177.173.18 port 45491 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:05:42,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349942.286727, 'message': 'Dec 6 20:05:41 hqnl0246134 sshd[250051]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 20:05:44,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349944.2885513, 'message': 'Dec 6 20:05:43 hqnl0246134 sshd[250051]: Failed password for root from 61.177.173.18 port 45491 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 20:05:44,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349944.2888036, 'message': 'Dec 6 20:05:43 hqnl0246134 sshd[250051]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 20:05:46,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349946.290024, 'message': 'Dec 6 20:05:45 hqnl0246134 sshd[250051]: Failed password for root from 61.177.173.18 port 45491 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 20:05:48,461] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:05:48,462] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:05:48,811] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:05:48,812] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:05:48,831] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:05:48,862] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0369 seconds
WARNING [2022-12-06 20:06:10,026] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:06:10,048] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0310 seconds
INFO [2022-12-06 20:06:17,900] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:06:17,901] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:06:17,907] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:06:17,918] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0163 seconds
INFO [2022-12-06 20:06:20,481] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:06:20,481] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:06:20,492] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:06:20,505] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0230 seconds
INFO [2022-12-06 20:06:28,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349988.342678, 'message': 'Dec 6 20:06:27 hqnl0246134 sshd[250095]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 20:06:28,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349988.3432734, 'message': 'Dec 6 20:06:27 hqnl0246134 sshd[250095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:06:30,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349990.344791, 'message': 'Dec 6 20:06:30 hqnl0246134 sshd[250095]: Failed password for root from 61.177.173.18 port 22567 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 20:06:32,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349992.345716, 'message': 'Dec 6 20:06:31 hqnl0246134 sshd[250095]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 20:06:32,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.68.67', 'timestamp': 1670349992.3458843, 'message': 'Dec 6 20:06:32 hqnl0246134 sshd[250105]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.68.67 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 20:06:32,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.68.67', 'timestamp': 1670349992.3459983, 'message': 'Dec 6 20:06:32 hqnl0246134 sshd[250105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.68.67 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:06:34,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.59.68.67', 'timestamp': 1670349994.3510728, 'message': 'Dec 6 20:06:33 hqnl0246134 sshd[250105]: Failed password for root from 139.59.68.67 port 50294 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 20:06:34,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349994.3515112, 'message': 'Dec 6 20:06:33 hqnl0246134 sshd[250095]: Failed password for root from 61.177.173.18 port 22567 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 20:06:36,372] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349996.352347, 'message': 'Dec 6 20:06:36 hqnl0246134 sshd[250095]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 20:06:38,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670349998.3547518, 'message': 'Dec 6 20:06:37 hqnl0246134 sshd[250095]: Failed password for root from 61.177.173.18 port 22567 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
WARNING [2022-12-06 20:06:48,464] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:06:48,466] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 20:07:10,029] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:07:10,056] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0357 seconds
INFO [2022-12-06 20:07:14,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350034.3931782, 'message': 'Dec 6 20:07:14 hqnl0246134 sshd[250161]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 20:07:14,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350034.3934743, 'message': 'Dec 6 20:07:14 hqnl0246134 sshd[250161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:07:18,102] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:07:18,103] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:07:18,115] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:07:18,135] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0301 seconds
INFO [2022-12-06 20:07:18,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350038.3967001, 'message': 'Dec 6 20:07:16 hqnl0246134 sshd[250161]: Failed password for root from 61.177.173.18 port 44168 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 20:07:20,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350040.3978267, 'message': 'Dec 6 20:07:18 hqnl0246134 sshd[250161]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:07:20,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350040.3980107, 'message': 'Dec 6 20:07:20 hqnl0246134 sshd[250161]: Failed password for root from 61.177.173.18 port 44168 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 20:07:20,864] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:07:20,865] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:07:20,873] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:07:20,886] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 20:07:22,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350042.3986115, 'message': 'Dec 6 20:07:20 hqnl0246134 sshd[250161]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 20:07:22,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350042.398852, 'message': 'Dec 6 20:07:22 hqnl0246134 sshd[250161]: Failed password for root from 61.177.173.18 port 44168 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0162 seconds
INFO [2022-12-06 20:07:25,598] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:07:25,599] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:07:25,606] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:07:25,618] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 20:07:30,671] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 20:07:30,740] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 20:07:30,741] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 20:07:30,741] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 20:07:30,741] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 20:07:30,742] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 20:07:30,754] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 20:07:30,777] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0346 seconds
WARNING [2022-12-06 20:07:30,791] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 20:07:30,796] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:07:30,828] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0618 seconds
INFO [2022-12-06 20:07:30,830] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0566 seconds
WARNING [2022-12-06 20:07:48,467] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:07:48,472] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:07:48,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350068.4309542, 'message': 'Dec 6 20:07:46 hqnl0246134 sshd[250191]: Invalid user git from 200.11.141.86 port 55386', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0602 seconds
INFO [2022-12-06 20:07:48,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350068.4314222, 'message': 'Dec 6 20:07:47 hqnl0246134 sshd[250191]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.11.141.86 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 20:07:48,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350068.431549, 'message': 'Dec 6 20:07:47 hqnl0246134 sshd[250191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.11.141.86 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 20:07:50,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350070.4325635, 'message': 'Dec 6 20:07:48 hqnl0246134 sshd[250191]: Failed password for invalid user git from 200.11.141.86 port 55386 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 20:07:52,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350072.4350462, 'message': 'Dec 6 20:07:51 hqnl0246134 sshd[250191]: Disconnected from invalid user git 200.11.141.86 port 55386 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 20:08:01,068] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 20:08:01,069] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 20:08:01,070] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 20:08:02,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350082.4434738, 'message': 'Dec 6 20:08:02 hqnl0246134 sshd[250213]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 20:08:02,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350082.4438624, 'message': 'Dec 6 20:08:02 hqnl0246134 sshd[250213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 20:08:04,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350084.4470592, 'message': 'Dec 6 20:08:04 hqnl0246134 sshd[250213]: Failed password for root from 61.177.173.18 port 24286 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 20:08:06,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350086.4488792, 'message': 'Dec 6 20:08:04 hqnl0246134 sshd[250213]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 20:08:06,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350086.449096, 'message': 'Dec 6 20:08:06 hqnl0246134 sshd[250213]: Failed password for root from 61.177.173.18 port 24286 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 20:08:08,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350088.4511416, 'message': 'Dec 6 20:08:06 hqnl0246134 sshd[250213]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
WARNING [2022-12-06 20:08:10,035] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:08:10,062] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0380 seconds
INFO [2022-12-06 20:08:10,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350090.452555, 'message': 'Dec 6 20:08:08 hqnl0246134 sshd[250213]: Failed password for root from 61.177.173.18 port 24286 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 20:08:17,890] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:08:17,891] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:08:17,898] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:08:17,909] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 20:08:20,563] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:08:20,564] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:08:20,572] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:08:20,595] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0310 seconds
WARNING [2022-12-06 20:08:48,477] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:08:48,479] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:08:50,524] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350130.4972713, 'message': 'Dec 6 20:08:48 hqnl0246134 sshd[250247]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 20:08:50,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350130.497843, 'message': 'Dec 6 20:08:48 hqnl0246134 sshd[250247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:08:52,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350132.498438, 'message': 'Dec 6 20:08:50 hqnl0246134 sshd[250247]: Failed password for root from 61.177.173.18 port 47761 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 20:08:54,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350134.5005069, 'message': 'Dec 6 20:08:52 hqnl0246134 sshd[250247]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 20:08:54,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.103.229.174', 'timestamp': 1670350134.5006948, 'message': 'Dec 6 20:08:53 hqnl0246134 sshd[250249]: Invalid user albert from 95.103.229.174 port 34894', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 20:08:54,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.103.229.174', 'timestamp': 1670350134.5008745, 'message': 'Dec 6 20:08:53 hqnl0246134 sshd[250249]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.103.229.174 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 20:08:54,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.103.229.174', 'timestamp': 1670350134.5009892, 'message': 'Dec 6 20:08:53 hqnl0246134 sshd[250249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.103.229.174 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 20:08:56,537] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350136.5027654, 'message': 'Dec 6 20:08:54 hqnl0246134 sshd[250247]: Failed password for root from 61.177.173.18 port 47761 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 20:08:56,539] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.103.229.174', 'timestamp': 1670350136.5030887, 'message': 'Dec 6 20:08:55 hqnl0246134 sshd[250249]: Failed password for invalid user albert from 95.103.229.174 port 34894 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 20:08:56,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350136.5029778, 'message': 'Dec 6 20:08:55 hqnl0246134 sshd[250247]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 20:08:58,554] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350138.5059383, 'message': 'Dec 6 20:08:56 hqnl0246134 sshd[250247]: Failed password for root from 61.177.173.18 port 47761 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0473 seconds
INFO [2022-12-06 20:08:58,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '83.40.33.56', 'timestamp': 1670350138.5063055, 'message': 'Dec 6 20:08:56 hqnl0246134 sshd[250251]: Invalid user ronald from 83.40.33.56 port 60454', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 20:08:58,557] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.103.229.174', 'timestamp': 1670350138.5067422, 'message': 'Dec 6 20:08:57 hqnl0246134 sshd[250249]: Disconnected from invalid user albert 95.103.229.174 port 34894 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0473 seconds
INFO [2022-12-06 20:08:58,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '83.40.33.56', 'timestamp': 1670350138.5064843, 'message': 'Dec 6 20:08:57 hqnl0246134 sshd[250251]: pam_imunify(sshd:auth): [IM360_RBL] The IP 83.40.33.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:08:58,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '83.40.33.56', 'timestamp': 1670350138.5066156, 'message': 'Dec 6 20:08:57 hqnl0246134 sshd[250251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.40.33.56 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:08:59,952] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:08:59,953] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:08:59,962] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:08:59,975] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 20:09:00,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '83.40.33.56', 'timestamp': 1670350140.5094914, 'message': 'Dec 6 20:08:59 hqnl0246134 sshd[250251]: Failed password for invalid user ronald from 83.40.33.56 port 60454 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 20:09:00,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '83.40.33.56', 'timestamp': 1670350140.5097685, 'message': 'Dec 6 20:08:59 hqnl0246134 sshd[250251]: Disconnected from invalid user ronald 83.40.33.56 port 60454 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
WARNING [2022-12-06 20:09:10,037] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:09:10,081] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0521 seconds
INFO [2022-12-06 20:09:17,761] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:09:17,762] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:09:17,770] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:09:17,781] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 20:09:20,526] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:09:20,526] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:09:20,538] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:09:20,555] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0282 seconds
INFO [2022-12-06 20:09:36,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350176.5537784, 'message': 'Dec 6 20:09:36 hqnl0246134 sshd[250422]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 20:09:36,597] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350176.5541532, 'message': 'Dec 6 20:09:36 hqnl0246134 sshd[250422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 20:09:38,587] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.68.67', 'timestamp': 1670350178.5560498, 'message': 'Dec 6 20:09:36 hqnl0246134 sshd[250424]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.68.67 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 20:09:38,588] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350178.5564516, 'message': 'Dec 6 20:09:37 hqnl0246134 sshd[250422]: Failed password for root from 61.177.173.18 port 21469 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 20:09:38,616] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.68.67', 'timestamp': 1670350178.5563145, 'message': 'Dec 6 20:09:36 hqnl0246134 sshd[250424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.68.67 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 20:09:38,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350178.5567129, 'message': 'Dec 6 20:09:38 hqnl0246134 sshd[250422]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 20:09:38,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.59.68.67', 'timestamp': 1670350178.5565574, 'message': 'Dec 6 20:09:38 hqnl0246134 sshd[250424]: Failed password for root from 139.59.68.67 port 38626 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 20:09:40,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350180.5581725, 'message': 'Dec 6 20:09:40 hqnl0246134 sshd[250422]: Failed password for root from 61.177.173.18 port 21469 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 20:09:44,583] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350184.5656147, 'message': 'Dec 6 20:09:42 hqnl0246134 sshd[250422]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 20:09:44,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350184.5659554, 'message': 'Dec 6 20:09:44 hqnl0246134 sshd[250422]: Failed password for root from 61.177.173.18 port 21469 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0163 seconds
WARNING [2022-12-06 20:09:48,482] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:09:48,483] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 20:10:10,043] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:10:10,065] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0324 seconds
INFO [2022-12-06 20:10:17,821] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:10:17,822] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:10:17,830] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:10:17,843] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 20:10:20,501] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:10:20,502] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:10:20,510] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:10:20,522] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 20:10:24,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350224.6126277, 'message': 'Dec 6 20:10:23 hqnl0246134 sshd[250478]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 20:10:24,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350224.612981, 'message': 'Dec 6 20:10:23 hqnl0246134 sshd[250478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:10:26,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350226.6144614, 'message': 'Dec 6 20:10:25 hqnl0246134 sshd[250478]: Failed password for root from 61.177.173.18 port 47116 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 20:10:26,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350226.6148415, 'message': 'Dec 6 20:10:25 hqnl0246134 sshd[250478]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 20:10:28,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350228.6344004, 'message': 'Dec 6 20:10:27 hqnl0246134 sshd[250478]: Failed password for root from 61.177.173.18 port 47116 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0636 seconds
INFO [2022-12-06 20:10:28,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350228.6347468, 'message': 'Dec 6 20:10:28 hqnl0246134 sshd[250478]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:10:30,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350230.61783, 'message': 'Dec 6 20:10:30 hqnl0246134 sshd[250478]: Failed password for root from 61.177.173.18 port 47116 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 20:10:32,910] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:10:32,911] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:10:32,918] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:10:32,929] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 20:10:38,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '109.194.50.49', 'timestamp': 1670350238.6262894, 'message': 'Dec 6 20:10:37 hqnl0246134 sshd[250519]: pam_imunify(sshd:auth): [IM360_RBL] The IP 109.194.50.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 20:10:38,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '109.194.50.49', 'timestamp': 1670350238.6265786, 'message': 'Dec 6 20:10:37 hqnl0246134 sshd[250519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.50.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:10:40,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '109.194.50.49', 'timestamp': 1670350240.6282058, 'message': 'Dec 6 20:10:39 hqnl0246134 sshd[250519]: Failed password for root from 109.194.50.49 port 42508 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
WARNING [2022-12-06 20:10:48,487] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:10:48,488] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 20:11:10,052] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:11:10,076] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0346 seconds
INFO [2022-12-06 20:11:12,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350272.6593485, 'message': 'Dec 6 20:11:12 hqnl0246134 sshd[250541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 20:11:12,698] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350272.6595924, 'message': 'Dec 6 20:11:12 hqnl0246134 sshd[250541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 20:11:14,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350274.6609998, 'message': 'Dec 6 20:11:14 hqnl0246134 sshd[250541]: Failed password for root from 61.177.173.18 port 27284 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:11:18,310] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:11:18,310] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:11:18,320] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:11:18,331] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 20:11:18,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350278.6648574, 'message': 'Dec 6 20:11:16 hqnl0246134 sshd[250541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 20:11:20,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350280.6667259, 'message': 'Dec 6 20:11:19 hqnl0246134 sshd[250541]: Failed password for root from 61.177.173.18 port 27284 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 20:11:20,962] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:11:20,962] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:11:20,971] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:11:20,984] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 20:11:22,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350282.6717815, 'message': 'Dec 6 20:11:21 hqnl0246134 sshd[250541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 20:11:24,697] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350284.6774786, 'message': 'Dec 6 20:11:23 hqnl0246134 sshd[250541]: Failed password for root from 61.177.173.18 port 27284 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 20:11:36,735] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.179.198.14', 'timestamp': 1670350296.6918778, 'message': 'Dec 6 20:11:35 hqnl0246134 sshd[250567]: Invalid user sig from 103.179.198.14 port 58794', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0414 seconds
INFO [2022-12-06 20:11:36,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.179.198.14', 'timestamp': 1670350296.6925094, 'message': 'Dec 6 20:11:35 hqnl0246134 sshd[250567]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.179.198.14 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 20:11:36,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.179.198.14', 'timestamp': 1670350296.692742, 'message': 'Dec 6 20:11:35 hqnl0246134 sshd[250567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.198.14 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 20:11:38,735] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.179.198.14', 'timestamp': 1670350298.6926675, 'message': 'Dec 6 20:11:37 hqnl0246134 sshd[250567]: Failed password for invalid user sig from 103.179.198.14 port 58794 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 20:11:38,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.179.198.14', 'timestamp': 1670350298.6929202, 'message': 'Dec 6 20:11:38 hqnl0246134 sshd[250567]: Disconnected from invalid user sig 103.179.198.14 port 58794 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-06 20:11:42,422] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:11:42,423] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:11:42,434] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:11:42,455] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0307 seconds
WARNING [2022-12-06 20:11:48,490] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:11:48,491] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:11:48,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.198.42', 'timestamp': 1670350308.7047486, 'message': 'Dec 6 20:11:48 hqnl0246134 sshd[250580]: Invalid user cisco from 167.71.198.42 port 60906', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 20:11:48,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.71.198.42', 'timestamp': 1670350308.7049956, 'message': 'Dec 6 20:11:48 hqnl0246134 sshd[250580]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.71.198.42 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 20:11:48,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.71.198.42', 'timestamp': 1670350308.7051332, 'message': 'Dec 6 20:11:48 hqnl0246134 sshd[250580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.198.42 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 20:11:50,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.198.42', 'timestamp': 1670350310.7057705, 'message': 'Dec 6 20:11:50 hqnl0246134 sshd[250580]: Failed password for invalid user cisco from 167.71.198.42 port 60906 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 20:11:50,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.198.42', 'timestamp': 1670350310.705952, 'message': 'Dec 6 20:11:50 hqnl0246134 sshd[250580]: Disconnected from invalid user cisco 167.71.198.42 port 60906 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 20:11:53,890] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 20:12:00,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350320.7207294, 'message': 'Dec 6 20:12:00 hqnl0246134 sshd[250595]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 20:12:00,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350320.7212746, 'message': 'Dec 6 20:12:00 hqnl0246134 sshd[250595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 20:12:02,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350322.7225142, 'message': 'Dec 6 20:12:01 hqnl0246134 sshd[250595]: Failed password for root from 61.177.173.18 port 49005 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:12:02,758] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350322.7227015, 'message': 'Dec 6 20:12:02 hqnl0246134 sshd[250595]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 20:12:04,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350324.7248108, 'message': 'Dec 6 20:12:04 hqnl0246134 sshd[250595]: Failed password for root from 61.177.173.18 port 49005 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 20:12:08,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350328.7283313, 'message': 'Dec 6 20:12:06 hqnl0246134 sshd[250595]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:12:08,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350328.7285666, 'message': 'Dec 6 20:12:08 hqnl0246134 sshd[250595]: Failed password for root from 61.177.173.18 port 49005 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0258 seconds
WARNING [2022-12-06 20:12:10,054] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:12:10,077] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0310 seconds
INFO [2022-12-06 20:12:18,111] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:12:18,111] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:12:18,119] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:12:18,131] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 20:12:20,637] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:12:20,638] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:12:20,645] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:12:20,657] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 20:12:21,918] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 20:12:21,985] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 20:12:21,986] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 20:12:21,986] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 20:12:21,987] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 20:12:21,987] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 20:12:22,002] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 20:12:22,018] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0302 seconds
WARNING [2022-12-06 20:12:22,025] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 20:12:22,027] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:12:22,043] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0299 seconds
INFO [2022-12-06 20:12:22,044] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0284 seconds
INFO [2022-12-06 20:12:24,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670350344.7444031, 'message': 'Dec 6 20:12:23 hqnl0246134 sshd[250630]: Invalid user jboss from 75.30.64.54 port 51306', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 20:12:24,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '75.30.64.54', 'timestamp': 1670350344.7446945, 'message': 'Dec 6 20:12:23 hqnl0246134 sshd[250630]: pam_imunify(sshd:auth): [IM360_RBL] The IP 75.30.64.54 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:12:24,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '75.30.64.54', 'timestamp': 1670350344.7448049, 'message': 'Dec 6 20:12:23 hqnl0246134 sshd[250630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.30.64.54 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:12:26,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670350346.745946, 'message': 'Dec 6 20:12:25 hqnl0246134 sshd[250630]: Failed password for invalid user jboss from 75.30.64.54 port 51306 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0492 seconds
INFO [2022-12-06 20:12:28,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670350348.748391, 'message': 'Dec 6 20:12:27 hqnl0246134 sshd[250630]: Disconnected from invalid user jboss 75.30.64.54 port 51306 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0258 seconds
WARNING [2022-12-06 20:12:48,493] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:12:48,495] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:12:48,792] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.68.67', 'timestamp': 1670350368.7699869, 'message': 'Dec 6 20:12:48 hqnl0246134 sshd[250651]: Invalid user samuel from 139.59.68.67 port 55190', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 20:12:48,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.68.67', 'timestamp': 1670350368.7704556, 'message': 'Dec 6 20:12:48 hqnl0246134 sshd[250651]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.68.67 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 20:12:48,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.68.67', 'timestamp': 1670350368.7706325, 'message': 'Dec 6 20:12:48 hqnl0246134 sshd[250651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.68.67 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 20:12:50,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350370.7726643, 'message': 'Dec 6 20:12:49 hqnl0246134 sshd[250653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0423 seconds
INFO [2022-12-06 20:12:50,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.68.67', 'timestamp': 1670350370.7735817, 'message': 'Dec 6 20:12:50 hqnl0246134 sshd[250651]: Failed password for invalid user samuel from 139.59.68.67 port 55190 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0426 seconds
INFO [2022-12-06 20:12:50,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350370.7734184, 'message': 'Dec 6 20:12:49 hqnl0246134 sshd[250653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 20:12:50,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350370.7737036, 'message': 'Dec 6 20:12:50 hqnl0246134 sshd[250653]: Failed password for root from 61.177.173.18 port 22497 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 20:12:52,117] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 20:12:52,117] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 20:12:52,118] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 20:12:52,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350372.7759435, 'message': 'Dec 6 20:12:51 hqnl0246134 sshd[250653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 20:12:52,809] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.68.67', 'timestamp': 1670350372.7761238, 'message': 'Dec 6 20:12:51 hqnl0246134 sshd[250651]: Disconnected from invalid user samuel 139.59.68.67 port 55190 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 20:12:54,207] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:12:54,207] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:12:54,214] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:12:54,225] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-06 20:12:54,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350374.777789, 'message': 'Dec 6 20:12:53 hqnl0246134 sshd[250653]: Failed password for root from 61.177.173.18 port 22497 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 20:12:54,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350374.778022, 'message': 'Dec 6 20:12:53 hqnl0246134 sshd[250653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:12:56,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350376.7804496, 'message': 'Dec 6 20:12:56 hqnl0246134 sshd[250653]: Failed password for root from 61.177.173.18 port 22497 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 20:13:02,024] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 20:13:02,032] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:13:02,044] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0190 seconds
WARNING [2022-12-06 20:13:10,057] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:13:10,079] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0289 seconds
INFO [2022-12-06 20:13:17,923] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:13:17,923] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:13:17,932] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:13:17,944] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 20:13:20,545] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:13:20,546] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:13:20,558] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:13:20,577] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0298 seconds
INFO [2022-12-06 20:13:38,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350418.8369277, 'message': 'Dec 6 20:13:38 hqnl0246134 sshd[250722]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 20:13:38,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350418.837895, 'message': 'Dec 6 20:13:38 hqnl0246134 sshd[250722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 20:13:40,876] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350420.8389351, 'message': 'Dec 6 20:13:39 hqnl0246134 sshd[250722]: Failed password for root from 61.177.173.18 port 59432 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 20:13:40,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350420.8393345, 'message': 'Dec 6 20:13:40 hqnl0246134 sshd[250722]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 20:13:44,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350424.842234, 'message': 'Dec 6 20:13:43 hqnl0246134 sshd[250722]: Failed password for root from 61.177.173.18 port 59432 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 20:13:44,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350424.8424087, 'message': 'Dec 6 20:13:44 hqnl0246134 sshd[250722]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 20:13:46,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350426.8482995, 'message': 'Dec 6 20:13:46 hqnl0246134 sshd[250722]: Failed password for root from 61.177.173.18 port 59432 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0290 seconds
WARNING [2022-12-06 20:13:48,497] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:13:48,498] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:13:56,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.222.239', 'timestamp': 1670350436.8540509, 'message': 'Dec 6 20:13:55 hqnl0246134 sshd[250753]: Invalid user git from 143.198.222.239 port 39808', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 20:13:56,893] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.222.239', 'timestamp': 1670350436.8542905, 'message': 'Dec 6 20:13:55 hqnl0246134 sshd[250753]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.222.239 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 20:13:56,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.222.239', 'timestamp': 1670350436.854405, 'message': 'Dec 6 20:13:55 hqnl0246134 sshd[250753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.222.239 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:13:58,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.222.239', 'timestamp': 1670350438.8539867, 'message': 'Dec 6 20:13:57 hqnl0246134 sshd[250753]: Failed password for invalid user git from 143.198.222.239 port 39808 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 20:13:58,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.222.239', 'timestamp': 1670350438.8541892, 'message': 'Dec 6 20:13:57 hqnl0246134 sshd[250753]: Disconnected from invalid user git 143.198.222.239 port 39808 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 20:14:00,721] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:14:00,722] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:14:00,738] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:14:00,765] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0411 seconds
WARNING [2022-12-06 20:14:10,066] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:14:10,093] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0393 seconds
INFO [2022-12-06 20:14:17,898] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:14:17,899] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:14:17,905] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:14:17,916] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0166 seconds
INFO [2022-12-06 20:14:20,501] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:14:20,501] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:14:20,508] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:14:20,518] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 20:14:24,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350464.8881664, 'message': 'Dec 6 20:14:24 hqnl0246134 sshd[250794]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:14:24,922] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350464.888424, 'message': 'Dec 6 20:14:24 hqnl0246134 sshd[250794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 20:14:26,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350466.8896897, 'message': 'Dec 6 20:14:26 hqnl0246134 sshd[250794]: Failed password for root from 61.177.173.18 port 29178 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 20:14:28,924] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350468.890901, 'message': 'Dec 6 20:14:26 hqnl0246134 sshd[250794]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 20:14:28,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350468.8913007, 'message': 'Dec 6 20:14:28 hqnl0246134 sshd[250794]: Failed password for root from 61.177.173.18 port 29178 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 20:14:30,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350470.8931096, 'message': 'Dec 6 20:14:29 hqnl0246134 sshd[250794]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 20:14:32,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350472.8948762, 'message': 'Dec 6 20:14:31 hqnl0246134 sshd[250794]: Failed password for root from 61.177.173.18 port 29178 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 20:14:42,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350482.909973, 'message': 'Dec 6 20:14:41 hqnl0246134 sshd[250811]: Invalid user td from 200.11.141.86 port 45342', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 20:14:42,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350482.910708, 'message': 'Dec 6 20:14:41 hqnl0246134 sshd[250811]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.11.141.86 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:14:42,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350482.9109588, 'message': 'Dec 6 20:14:41 hqnl0246134 sshd[250811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.11.141.86 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:14:44,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350484.909663, 'message': 'Dec 6 20:14:43 hqnl0246134 sshd[250811]: Failed password for invalid user td from 200.11.141.86 port 45342 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 20:14:44,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350484.909939, 'message': 'Dec 6 20:14:44 hqnl0246134 sshd[250811]: Disconnected from invalid user td 200.11.141.86 port 45342 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 20:14:48,503] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:14:48,504] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 20:15:10,067] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:15:10,089] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0309 seconds
INFO [2022-12-06 20:15:12,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350512.9339352, 'message': 'Dec 6 20:15:11 hqnl0246134 sshd[250848]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 20:15:12,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350512.9343178, 'message': 'Dec 6 20:15:11 hqnl0246134 sshd[250848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:15:14,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350514.934016, 'message': 'Dec 6 20:15:13 hqnl0246134 sshd[250848]: Failed password for root from 61.177.173.18 port 58795 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 20:15:14,995] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350514.9342928, 'message': 'Dec 6 20:15:14 hqnl0246134 sshd[250848]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 20:15:17,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350516.9382436, 'message': 'Dec 6 20:15:16 hqnl0246134 sshd[250848]: Failed password for root from 61.177.173.18 port 58795 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0636 seconds
INFO [2022-12-06 20:15:17,060] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350516.9388394, 'message': 'Dec 6 20:15:16 hqnl0246134 sshd[250848]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0559 seconds
INFO [2022-12-06 20:15:18,422] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:15:18,422] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:15:18,434] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:15:18,453] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0288 seconds
INFO [2022-12-06 20:15:18,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350518.938248, 'message': 'Dec 6 20:15:18 hqnl0246134 sshd[250848]: Failed password for root from 61.177.173.18 port 58795 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 20:15:21,104] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:15:21,105] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:15:21,113] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:15:21,124] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
WARNING [2022-12-06 20:15:48,517] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:15:48,519] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:15:59,016] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350558.9873762, 'message': 'Dec 6 20:15:57 hqnl0246134 sshd[250884]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 20:15:59,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350558.9905877, 'message': 'Dec 6 20:15:57 hqnl0246134 sshd[250884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 20:16:01,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350560.989954, 'message': 'Dec 6 20:15:59 hqnl0246134 sshd[250884]: Failed password for root from 61.177.173.18 port 23887 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 20:16:01,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350560.9904814, 'message': 'Dec 6 20:16:00 hqnl0246134 sshd[250884]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 20:16:03,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350562.9950638, 'message': 'Dec 6 20:16:02 hqnl0246134 sshd[250884]: Failed password for root from 61.177.173.18 port 23887 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:16:03,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350562.9960213, 'message': 'Dec 6 20:16:02 hqnl0246134 sshd[250884]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:16:05,021] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350564.9980032, 'message': 'Dec 6 20:16:03 hqnl0246134 sshd[250884]: Failed password for root from 61.177.173.18 port 23887 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 20:16:07,467] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:16:07,467] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:16:07,474] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:16:07,485] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
WARNING [2022-12-06 20:16:10,068] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:16:10,099] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0375 seconds
INFO [2022-12-06 20:16:17,950] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:16:17,950] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:16:18,089] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:16:18,100] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1489 seconds
INFO [2022-12-06 20:16:20,674] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:16:20,675] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:16:20,684] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:16:20,697] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 20:16:43,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '66.43.250.3', 'timestamp': 1670350603.0417058, 'message': 'Dec 6 20:16:41 hqnl0246134 sshd[250938]: pam_imunify(sshd:auth): [IM360_RBL] The IP 66.43.250.3 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 20:16:43,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '66.43.250.3', 'timestamp': 1670350603.0425074, 'message': 'Dec 6 20:16:41 hqnl0246134 sshd[250938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.43.250.3 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 20:16:45,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '66.43.250.3', 'timestamp': 1670350605.0424774, 'message': 'Dec 6 20:16:43 hqnl0246134 sshd[250938]: Failed password for root from 66.43.250.3 port 60274 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 20:16:47,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350607.0473983, 'message': 'Dec 6 20:16:45 hqnl0246134 sshd[250941]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:16:47,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350607.0476127, 'message': 'Dec 6 20:16:45 hqnl0246134 sshd[250941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 20:16:48,522] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:16:48,523] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:16:49,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350609.0506456, 'message': 'Dec 6 20:16:47 hqnl0246134 sshd[250941]: Failed password for root from 61.177.173.18 port 55232 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 20:16:49,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350609.0508125, 'message': 'Dec 6 20:16:47 hqnl0246134 sshd[250941]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 20:16:51,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350611.053085, 'message': 'Dec 6 20:16:49 hqnl0246134 sshd[250941]: Failed password for root from 61.177.173.18 port 55232 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:16:51,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350611.0532694, 'message': 'Dec 6 20:16:49 hqnl0246134 sshd[250941]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:16:53,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350613.0568044, 'message': 'Dec 6 20:16:51 hqnl0246134 sshd[250941]: Failed password for root from 61.177.173.18 port 55232 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 20:17:01,090] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.50.255', 'timestamp': 1670350621.0686393, 'message': 'Dec 6 20:16:59 hqnl0246134 sshd[250954]: Invalid user test2 from 167.172.50.255 port 43504', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 20:17:01,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.50.255', 'timestamp': 1670350621.0689974, 'message': 'Dec 6 20:16:59 hqnl0246134 sshd[250954]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.50.255 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 20:17:01,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.50.255', 'timestamp': 1670350621.069132, 'message': 'Dec 6 20:16:59 hqnl0246134 sshd[250954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.50.255 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 20:17:03,088] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.50.255', 'timestamp': 1670350623.0703652, 'message': 'Dec 6 20:17:01 hqnl0246134 sshd[250954]: Failed password for invalid user test2 from 167.172.50.255 port 43504 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:17:05,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.172.50.255', 'timestamp': 1670350625.0733986, 'message': 'Dec 6 20:17:03 hqnl0246134 sshd[250954]: Disconnected from invalid user test2 167.172.50.255 port 43504 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 20:17:07,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '124.82.89.207', 'timestamp': 1670350627.0760317, 'message': 'Dec 6 20:17:05 hqnl0246134 sshd[250977]: pam_imunify(sshd:auth): [IM360_RBL] The IP 124.82.89.207 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 20:17:07,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '124.82.89.207', 'timestamp': 1670350627.076408, 'message': 'Dec 6 20:17:05 hqnl0246134 sshd[250977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.82.89.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 20:17:09,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '124.82.89.207', 'timestamp': 1670350629.0793147, 'message': 'Dec 6 20:17:08 hqnl0246134 sshd[250977]: Failed password for root from 124.82.89.207 port 49792 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0266 seconds
WARNING [2022-12-06 20:17:10,074] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:17:10,098] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0331 seconds
INFO [2022-12-06 20:17:12,636] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:17:12,636] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:17:12,645] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:17:12,659] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 20:17:17,856] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:17:17,857] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:17:17,866] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:17:17,879] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 20:17:20,592] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:17:20,592] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:17:20,601] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:17:20,613] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 20:17:29,146] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.249.50.242', 'timestamp': 1670350649.10739, 'message': 'Dec 6 20:17:27 hqnl0246134 sshd[250998]: Invalid user java from 115.249.50.242 port 50638', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 20:17:29,172] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.249.50.242', 'timestamp': 1670350649.1079092, 'message': 'Dec 6 20:17:27 hqnl0246134 sshd[250998]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.249.50.242 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 20:17:29,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.249.50.242', 'timestamp': 1670350649.1081905, 'message': 'Dec 6 20:17:27 hqnl0246134 sshd[250998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.249.50.242 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 20:17:31,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.249.50.242', 'timestamp': 1670350651.109314, 'message': 'Dec 6 20:17:29 hqnl0246134 sshd[250998]: Failed password for invalid user java from 115.249.50.242 port 50638 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 20:17:31,156] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.249.50.242', 'timestamp': 1670350651.1097713, 'message': 'Dec 6 20:17:30 hqnl0246134 sshd[250998]: Disconnected from invalid user java 115.249.50.242 port 50638 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 20:17:33,142] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350653.1104836, 'message': 'Dec 6 20:17:32 hqnl0246134 sshd[251010]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 20:17:33,167] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350653.1108437, 'message': 'Dec 6 20:17:32 hqnl0246134 sshd[251010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 20:17:35,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350655.112583, 'message': 'Dec 6 20:17:34 hqnl0246134 sshd[251010]: Failed password for root from 61.177.173.18 port 26476 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 20:17:37,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350657.1148078, 'message': 'Dec 6 20:17:36 hqnl0246134 sshd[251010]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 20:17:39,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350659.1175225, 'message': 'Dec 6 20:17:38 hqnl0246134 sshd[251010]: Failed password for root from 61.177.173.18 port 26476 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 20:17:39,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350659.1177642, 'message': 'Dec 6 20:17:38 hqnl0246134 sshd[251010]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 20:17:43,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350663.1205838, 'message': 'Dec 6 20:17:41 hqnl0246134 sshd[251010]: Failed password for root from 61.177.173.18 port 26476 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-06 20:17:48,526] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:17:48,527] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:17:52,150] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 20:17:52,216] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 20:17:52,216] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 20:17:52,217] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 20:17:52,217] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 20:17:52,217] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 20:17:52,227] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 20:17:52,244] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0261 seconds
WARNING [2022-12-06 20:17:52,252] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 20:17:52,255] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:17:52,279] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0418 seconds
INFO [2022-12-06 20:17:52,282] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0407 seconds
INFO [2022-12-06 20:18:09,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.32.211.250', 'timestamp': 1670350689.1434724, 'message': 'Dec 6 20:18:07 hqnl0246134 sshd[251057]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.32.211.250 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 20:18:09,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.32.211.250', 'timestamp': 1670350689.1440704, 'message': 'Dec 6 20:18:07 hqnl0246134 sshd[251057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.211.250 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 20:18:09,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '152.32.211.250', 'timestamp': 1670350689.1443794, 'message': 'Dec 6 20:18:09 hqnl0246134 sshd[251057]: Failed password for root from 152.32.211.250 port 8042 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 20:18:10,077] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:18:10,104] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0346 seconds
INFO [2022-12-06 20:18:18,084] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:18:18,085] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:18:18,092] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:18:18,103] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 20:18:20,994] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:18:20,995] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:18:21,004] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:18:21,016] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 20:18:22,368] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 20:18:22,369] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 20:18:22,370] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 20:18:23,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350703.15801, 'message': 'Dec 6 20:18:22 hqnl0246134 sshd[251075]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0484 seconds
INFO [2022-12-06 20:18:23,209] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670350703.158558, 'message': 'Dec 6 20:18:22 hqnl0246134 sshd[251077]: Invalid user test from 59.127.158.223 port 56944', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 20:18:23,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350703.1583273, 'message': 'Dec 6 20:18:22 hqnl0246134 sshd[251075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 20:18:23,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.127.158.223', 'timestamp': 1670350703.1587331, 'message': 'Dec 6 20:18:22 hqnl0246134 sshd[251077]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.127.158.223 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 20:18:23,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.127.158.223', 'timestamp': 1670350703.1589217, 'message': 'Dec 6 20:18:22 hqnl0246134 sshd[251077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.158.223 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:18:25,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350705.1599946, 'message': 'Dec 6 20:18:24 hqnl0246134 sshd[251075]: Failed password for root from 61.177.173.18 port 64111 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:18:27,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670350707.1630557, 'message': 'Dec 6 20:18:25 hqnl0246134 sshd[251077]: Failed password for invalid user test from 59.127.158.223 port 56944 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 20:18:27,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350707.1634493, 'message': 'Dec 6 20:18:26 hqnl0246134 sshd[251075]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 20:18:29,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670350709.1651292, 'message': 'Dec 6 20:18:27 hqnl0246134 sshd[251077]: Disconnected from invalid user test 59.127.158.223 port 56944 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0393 seconds
INFO [2022-12-06 20:18:29,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350709.1653922, 'message': 'Dec 6 20:18:28 hqnl0246134 sshd[251075]: Failed password for root from 61.177.173.18 port 64111 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0395 seconds
INFO [2022-12-06 20:18:31,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350711.1679556, 'message': 'Dec 6 20:18:30 hqnl0246134 sshd[251075]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 20:18:33,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350713.1699936, 'message': 'Dec 6 20:18:32 hqnl0246134 sshd[251075]: Failed password for root from 61.177.173.18 port 64111 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 20:18:35,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '50.73.44.36', 'timestamp': 1670350715.1734128, 'message': 'Dec 6 20:18:34 hqnl0246134 sshd[251092]: pam_imunify(sshd:auth): [IM360_RBL] The IP 50.73.44.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 20:18:35,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '50.73.44.36', 'timestamp': 1670350715.1737416, 'message': 'Dec 6 20:18:34 hqnl0246134 sshd[251092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.73.44.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 20:18:35,573] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:18:35,574] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:18:35,582] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:18:35,596] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 20:18:37,211] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '50.73.44.36', 'timestamp': 1670350717.1804128, 'message': 'Dec 6 20:18:37 hqnl0246134 sshd[251092]: Failed password for root from 50.73.44.36 port 38934 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
WARNING [2022-12-06 20:18:48,647] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:18:48,648] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:19:09,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350749.214292, 'message': 'Dec 6 20:19:08 hqnl0246134 sshd[251116]: Invalid user bp from 200.11.141.86 port 57894', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 20:19:09,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350749.2147238, 'message': 'Dec 6 20:19:08 hqnl0246134 sshd[251116]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.11.141.86 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 20:19:09,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350749.2148764, 'message': 'Dec 6 20:19:08 hqnl0246134 sshd[251116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.11.141.86 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
WARNING [2022-12-06 20:19:10,084] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:19:10,110] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0336 seconds
INFO [2022-12-06 20:19:11,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350751.2157423, 'message': 'Dec 6 20:19:10 hqnl0246134 sshd[251118]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0395 seconds
INFO [2022-12-06 20:19:11,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350751.216255, 'message': 'Dec 6 20:19:10 hqnl0246134 sshd[251116]: Failed password for invalid user bp from 200.11.141.86 port 57894 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 20:19:11,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350751.2160444, 'message': 'Dec 6 20:19:10 hqnl0246134 sshd[251118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:19:13,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.11.141.86', 'timestamp': 1670350753.2180846, 'message': 'Dec 6 20:19:11 hqnl0246134 sshd[251116]: Disconnected from invalid user bp 200.11.141.86 port 57894 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 20:19:13,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350753.218316, 'message': 'Dec 6 20:19:13 hqnl0246134 sshd[251118]: Failed password for root from 61.177.173.18 port 35305 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 20:19:15,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350755.2182374, 'message': 'Dec 6 20:19:14 hqnl0246134 sshd[251118]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 20:19:17,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350757.2207422, 'message': 'Dec 6 20:19:16 hqnl0246134 sshd[251118]: Failed password for root from 61.177.173.18 port 35305 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:19:17,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350757.220959, 'message': 'Dec 6 20:19:16 hqnl0246134 sshd[251118]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 20:19:18,002] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:19:18,003] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:19:18,012] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:19:18,024] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 20:19:19,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350759.222169, 'message': 'Dec 6 20:19:18 hqnl0246134 sshd[251118]: Failed password for root from 61.177.173.18 port 35305 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:19:20,611] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:19:20,612] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:19:20,620] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:19:20,631] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
WARNING [2022-12-06 20:19:48,652] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:19:48,654] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:19:59,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350799.2740474, 'message': 'Dec 6 20:19:57 hqnl0246134 sshd[251150]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 20:19:59,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350799.274893, 'message': 'Dec 6 20:19:57 hqnl0246134 sshd[251150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:20:01,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350801.2749813, 'message': 'Dec 6 20:19:59 hqnl0246134 sshd[251150]: Failed password for root from 61.177.173.18 port 58674 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0465 seconds
INFO [2022-12-06 20:20:03,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350803.277539, 'message': 'Dec 6 20:20:01 hqnl0246134 sshd[251150]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 20:20:03,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350803.2777195, 'message': 'Dec 6 20:20:03 hqnl0246134 sshd[251150]: Failed password for root from 61.177.173.18 port 58674 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 20:20:05,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350805.2797468, 'message': 'Dec 6 20:20:04 hqnl0246134 sshd[251150]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 20:20:07,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350807.2824364, 'message': 'Dec 6 20:20:06 hqnl0246134 sshd[251150]: Failed password for root from 61.177.173.18 port 58674 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 20:20:10,086] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:20:10,105] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0271 seconds
INFO [2022-12-06 20:20:10,925] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:20:10,925] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:20:10,932] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:20:10,943] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 20:20:17,748] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:20:17,748] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:20:17,757] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:20:17,768] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 20:20:19,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670350819.2984726, 'message': 'Dec 6 20:20:17 hqnl0246134 sshd[251200]: Invalid user telecomadmin from 152.89.196.220 port 40560', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 20:20:19,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670350819.2986617, 'message': 'Dec 6 20:20:17 hqnl0246134 sshd[251200]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:20:19,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670350819.298785, 'message': 'Dec 6 20:20:17 hqnl0246134 sshd[251200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:20:20,538] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:20:20,538] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:20:20,545] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:20:20,557] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 20:20:21,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670350821.301055, 'message': 'Dec 6 20:20:19 hqnl0246134 sshd[251200]: Failed password for invalid user telecomadmin from 152.89.196.220 port 40560 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 20:20:23,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670350823.3042078, 'message': 'Dec 6 20:20:21 hqnl0246134 sshd[251200]: Disconnected from invalid user telecomadmin 152.89.196.220 port 40560 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:20:47,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350847.331687, 'message': 'Dec 6 20:20:45 hqnl0246134 sshd[251224]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 20:20:47,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350847.3325863, 'message': 'Dec 6 20:20:45 hqnl0246134 sshd[251224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 20:20:47,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350847.3372111, 'message': 'Dec 6 20:20:47 hqnl0246134 sshd[251224]: Failed password for root from 61.177.173.18 port 31554 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 20:20:48,660] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:20:48,661] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:20:49,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350849.333336, 'message': 'Dec 6 20:20:47 hqnl0246134 sshd[251224]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 20:20:49,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.50.255', 'timestamp': 1670350849.3336291, 'message': 'Dec 6 20:20:49 hqnl0246134 sshd[251226]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.50.255 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 20:20:49,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.50.255', 'timestamp': 1670350849.3345013, 'message': 'Dec 6 20:20:49 hqnl0246134 sshd[251226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.50.255 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 20:20:51,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350851.336984, 'message': 'Dec 6 20:20:49 hqnl0246134 sshd[251224]: Failed password for root from 61.177.173.18 port 31554 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0461 seconds
INFO [2022-12-06 20:20:51,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '167.172.50.255', 'timestamp': 1670350851.3373427, 'message': 'Dec 6 20:20:50 hqnl0246134 sshd[251226]: Failed password for root from 167.172.50.255 port 44004 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0465 seconds
INFO [2022-12-06 20:20:53,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350853.3396242, 'message': 'Dec 6 20:20:51 hqnl0246134 sshd[251224]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 20:20:55,359] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350855.34155, 'message': 'Dec 6 20:20:53 hqnl0246134 sshd[251224]: Failed password for root from 61.177.173.18 port 31554 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 20:21:10,099] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:21:10,131] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0475 seconds
INFO [2022-12-06 20:21:15,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '109.194.50.49', 'timestamp': 1670350875.3657458, 'message': 'Dec 6 20:21:13 hqnl0246134 sshd[251246]: Invalid user ronald from 109.194.50.49 port 34282', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 20:21:15,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '109.194.50.49', 'timestamp': 1670350875.365978, 'message': 'Dec 6 20:21:14 hqnl0246134 sshd[251246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 109.194.50.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 20:21:15,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '109.194.50.49', 'timestamp': 1670350875.3661106, 'message': 'Dec 6 20:21:14 hqnl0246134 sshd[251246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.50.49 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:21:17,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '109.194.50.49', 'timestamp': 1670350877.366075, 'message': 'Dec 6 20:21:15 hqnl0246134 sshd[251246]: Failed password for invalid user ronald from 109.194.50.49 port 34282 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 20:21:17,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '109.194.50.49', 'timestamp': 1670350877.3663895, 'message': 'Dec 6 20:21:16 hqnl0246134 sshd[251246]: Disconnected from invalid user ronald 109.194.50.49 port 34282 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 20:21:18,014] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:21:18,015] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:21:18,022] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:21:18,032] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-06 20:21:19,140] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:21:19,140] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:21:19,378] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:21:19,400] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1055 seconds
INFO [2022-12-06 20:21:20,923] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:21:20,924] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:21:20,931] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:21:20,942] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 20:21:33,387] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 20:21:33,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350893.3837306, 'message': 'Dec 6 20:21:32 hqnl0246134 sshd[251273]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 20:21:33,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350893.3845341, 'message': 'Dec 6 20:21:32 hqnl0246134 sshd[251273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 20:21:33,460] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 20:21:33,461] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 20:21:33,461] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 20:21:33,461] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 20:21:33,462] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 20:21:33,471] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 20:21:33,486] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0239 seconds
WARNING [2022-12-06 20:21:33,492] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 20:21:33,494] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:21:33,511] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0304 seconds
INFO [2022-12-06 20:21:33,512] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0284 seconds
INFO [2022-12-06 20:21:35,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350895.3857274, 'message': 'Dec 6 20:21:33 hqnl0246134 sshd[251273]: Failed password for root from 61.177.173.18 port 62193 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 20:21:35,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350895.3861663, 'message': 'Dec 6 20:21:34 hqnl0246134 sshd[251273]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 20:21:37,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350897.388133, 'message': 'Dec 6 20:21:36 hqnl0246134 sshd[251273]: Failed password for root from 61.177.173.18 port 62193 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 20:21:39,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350899.3898191, 'message': 'Dec 6 20:21:39 hqnl0246134 sshd[251273]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 20:21:41,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350901.3923218, 'message': 'Dec 6 20:21:40 hqnl0246134 sshd[251273]: Failed password for root from 61.177.173.18 port 62193 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 20:21:43,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.249.50.242', 'timestamp': 1670350903.3949203, 'message': 'Dec 6 20:21:41 hqnl0246134 sshd[251298]: Invalid user test from 115.249.50.242 port 40186', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 20:21:43,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.249.50.242', 'timestamp': 1670350903.395172, 'message': 'Dec 6 20:21:41 hqnl0246134 sshd[251298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.249.50.242 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 20:21:43,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.249.50.242', 'timestamp': 1670350903.3953016, 'message': 'Dec 6 20:21:41 hqnl0246134 sshd[251298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.249.50.242 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 20:21:45,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.249.50.242', 'timestamp': 1670350905.3971822, 'message': 'Dec 6 20:21:43 hqnl0246134 sshd[251298]: Failed password for invalid user test from 115.249.50.242 port 40186 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 20:21:47,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.249.50.242', 'timestamp': 1670350907.398281, 'message': 'Dec 6 20:21:46 hqnl0246134 sshd[251298]: Disconnected from invalid user test 115.249.50.242 port 40186 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 20:21:47,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.103.229.174', 'timestamp': 1670350907.3986459, 'message': 'Dec 6 20:21:47 hqnl0246134 sshd[251301]: Invalid user romain from 95.103.229.174 port 44034', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0343 seconds
WARNING [2022-12-06 20:21:48,667] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:21:48,668] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:21:49,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.103.229.174', 'timestamp': 1670350909.4551935, 'message': 'Dec 6 20:21:47 hqnl0246134 sshd[251301]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.103.229.174 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:21:49,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.103.229.174', 'timestamp': 1670350909.455408, 'message': 'Dec 6 20:21:47 hqnl0246134 sshd[251301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.103.229.174 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 20:21:51,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.103.229.174', 'timestamp': 1670350911.4021044, 'message': 'Dec 6 20:21:49 hqnl0246134 sshd[251301]: Failed password for invalid user romain from 95.103.229.174 port 44034 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 20:21:51,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.103.229.174', 'timestamp': 1670350911.4023798, 'message': 'Dec 6 20:21:49 hqnl0246134 sshd[251301]: Disconnected from invalid user romain 95.103.229.174 port 44034 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 20:21:53,892] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 20:22:10,098] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:22:10,127] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0389 seconds
INFO [2022-12-06 20:22:12,896] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 20:22:12,897] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 20:22:12,897] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 20:22:17,892] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:22:17,893] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:22:17,901] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:22:17,913] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 20:22:19,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350939.620512, 'message': 'Dec 6 20:22:18 hqnl0246134 sshd[251335]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 20:22:19,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350939.6208076, 'message': 'Dec 6 20:22:18 hqnl0246134 sshd[251335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:22:20,979] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:22:20,980] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:22:20,991] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:22:21,010] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0301 seconds
INFO [2022-12-06 20:22:21,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350941.4321003, 'message': 'Dec 6 20:22:20 hqnl0246134 sshd[251335]: Failed password for root from 61.177.173.18 port 26695 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 20:22:23,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350943.4335828, 'message': 'Dec 6 20:22:22 hqnl0246134 sshd[251335]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:22:25,463] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350945.4393282, 'message': 'Dec 6 20:22:24 hqnl0246134 sshd[251335]: Failed password for root from 61.177.173.18 port 26695 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 20:22:25,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350945.4396508, 'message': 'Dec 6 20:22:25 hqnl0246134 sshd[251335]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 20:22:27,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350947.43848, 'message': 'Dec 6 20:22:26 hqnl0246134 sshd[251335]: Failed password for root from 61.177.173.18 port 26695 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 20:22:27,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.179.198.14', 'timestamp': 1670350947.4386733, 'message': 'Dec 6 20:22:27 hqnl0246134 sshd[251345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.198.14 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 20:22:29,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.179.198.14', 'timestamp': 1670350949.440835, 'message': 'Dec 6 20:22:29 hqnl0246134 sshd[251345]: Failed password for root from 103.179.198.14 port 57690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 20:22:43,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.71.198.42', 'timestamp': 1670350963.4554434, 'message': 'Dec 6 20:22:41 hqnl0246134 sshd[251356]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.71.198.42 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 20:22:43,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.71.198.42', 'timestamp': 1670350963.456088, 'message': 'Dec 6 20:22:41 hqnl0246134 sshd[251356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.198.42 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 20:22:43,528] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '167.71.198.42', 'timestamp': 1670350963.4563792, 'message': 'Dec 6 20:22:43 hqnl0246134 sshd[251356]: Failed password for root from 167.71.198.42 port 51852 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 20:22:48,289] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:22:48,290] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:22:48,298] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:22:48,311] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
WARNING [2022-12-06 20:22:48,671] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:22:48,672] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:23:03,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.222.239', 'timestamp': 1670350983.4793522, 'message': 'Dec 6 20:23:03 hqnl0246134 sshd[251386]: Invalid user simon from 143.198.222.239 port 48370', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 20:23:03,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.222.239', 'timestamp': 1670350983.4799027, 'message': 'Dec 6 20:23:03 hqnl0246134 sshd[251386]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.222.239 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 20:23:03,585] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.222.239', 'timestamp': 1670350983.4801319, 'message': 'Dec 6 20:23:03 hqnl0246134 sshd[251386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.222.239 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 20:23:05,512] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.222.239', 'timestamp': 1670350985.4805408, 'message': 'Dec 6 20:23:05 hqnl0246134 sshd[251386]: Failed password for invalid user simon from 143.198.222.239 port 48370 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 20:23:07,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.222.239', 'timestamp': 1670350987.4837716, 'message': 'Dec 6 20:23:06 hqnl0246134 sshd[251386]: Disconnected from invalid user simon 143.198.222.239 port 48370 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 20:23:07,528] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350987.4840927, 'message': 'Dec 6 20:23:07 hqnl0246134 sshd[251389]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 20:23:07,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350987.4844425, 'message': 'Dec 6 20:23:07 hqnl0246134 sshd[251389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:23:09,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350989.485654, 'message': 'Dec 6 20:23:08 hqnl0246134 sshd[251389]: Failed password for root from 61.177.173.18 port 12719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0249 seconds
WARNING [2022-12-06 20:23:10,098] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:23:10,125] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0346 seconds
INFO [2022-12-06 20:23:11,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670350991.485992, 'message': 'Dec 6 20:23:09 hqnl0246134 sshd[251392]: Invalid user shen from 75.30.64.54 port 57100', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0411 seconds
INFO [2022-12-06 20:23:11,546] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350991.4928844, 'message': 'Dec 6 20:23:09 hqnl0246134 sshd[251389]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0521 seconds
INFO [2022-12-06 20:23:11,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.32.211.250', 'timestamp': 1670350991.4932504, 'message': 'Dec 6 20:23:10 hqnl0246134 sshd[251394]: Invalid user minecraft from 152.32.211.250 port 2870', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0523 seconds
INFO [2022-12-06 20:23:11,599] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '75.30.64.54', 'timestamp': 1670350991.4930289, 'message': 'Dec 6 20:23:09 hqnl0246134 sshd[251392]: pam_imunify(sshd:auth): [IM360_RBL] The IP 75.30.64.54 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0709 seconds
INFO [2022-12-06 20:23:11,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.32.211.250', 'timestamp': 1670350991.493353, 'message': 'Dec 6 20:23:10 hqnl0246134 sshd[251394]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.32.211.250 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0657 seconds
INFO [2022-12-06 20:23:11,615] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350991.493551, 'message': 'Dec 6 20:23:11 hqnl0246134 sshd[251389]: Failed password for root from 61.177.173.18 port 12719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0661 seconds
INFO [2022-12-06 20:23:11,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '75.30.64.54', 'timestamp': 1670350991.4931347, 'message': 'Dec 6 20:23:09 hqnl0246134 sshd[251392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.30.64.54 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 20:23:11,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.32.211.250', 'timestamp': 1670350991.4934518, 'message': 'Dec 6 20:23:10 hqnl0246134 sshd[251394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.211.250 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 20:23:13,554] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670350993.4885466, 'message': 'Dec 6 20:23:11 hqnl0246134 sshd[251392]: Failed password for invalid user shen from 75.30.64.54 port 57100 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0650 seconds
INFO [2022-12-06 20:23:13,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350993.4888444, 'message': 'Dec 6 20:23:11 hqnl0246134 sshd[251389]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0653 seconds
INFO [2022-12-06 20:23:13,560] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.32.211.250', 'timestamp': 1670350993.498865, 'message': 'Dec 6 20:23:12 hqnl0246134 sshd[251394]: Failed password for invalid user minecraft from 152.32.211.250 port 2870 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0605 seconds
INFO [2022-12-06 20:23:13,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670350993.4986405, 'message': 'Dec 6 20:23:12 hqnl0246134 sshd[251392]: Disconnected from invalid user shen 75.30.64.54 port 57100 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 20:23:15,588] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670350995.4893413, 'message': 'Dec 6 20:23:13 hqnl0246134 sshd[251389]: Failed password for root from 61.177.173.18 port 12719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0989 seconds
INFO [2022-12-06 20:23:15,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.32.211.250', 'timestamp': 1670350995.4907694, 'message': 'Dec 6 20:23:14 hqnl0246134 sshd[251394]: Disconnected from invalid user minecraft 152.32.211.250 port 2870 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0983 seconds
INFO [2022-12-06 20:23:15,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '50.73.44.36', 'timestamp': 1670350995.490951, 'message': 'Dec 6 20:23:14 hqnl0246134 sshd[251398]: pam_imunify(sshd:auth): [IM360_RBL] The IP 50.73.44.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0976 seconds
INFO [2022-12-06 20:23:15,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '50.73.44.36', 'timestamp': 1670350995.4911392, 'message': 'Dec 6 20:23:14 hqnl0246134 sshd[251398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.73.44.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-06 20:23:17,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '50.73.44.36', 'timestamp': 1670350997.4921966, 'message': 'Dec 6 20:23:16 hqnl0246134 sshd[251398]: Failed password for root from 50.73.44.36 port 43129 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0605 seconds
INFO [2022-12-06 20:23:19,214] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:23:19,215] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:23:19,224] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:23:19,235] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 20:23:21,835] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:23:21,835] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:23:21,843] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:23:21,855] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 20:23:31,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.50.255', 'timestamp': 1670351011.5409591, 'message': 'Dec 6 20:23:31 hqnl0246134 sshd[251420]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.50.255 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0762 seconds
INFO [2022-12-06 20:23:31,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.50.255', 'timestamp': 1670351011.541457, 'message': 'Dec 6 20:23:31 hqnl0246134 sshd[251420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.50.255 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 20:23:33,531] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '167.172.50.255', 'timestamp': 1670351013.5124848, 'message': 'Dec 6 20:23:33 hqnl0246134 sshd[251420]: Failed password for root from 167.172.50.255 port 32962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 20:23:48,675] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:23:48,677] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:23:55,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351035.5433006, 'message': 'Dec 6 20:23:54 hqnl0246134 sshd[251437]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 20:23:55,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351035.5437963, 'message': 'Dec 6 20:23:54 hqnl0246134 sshd[251437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:23:57,578] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '109.194.50.49', 'timestamp': 1670351037.5471315, 'message': 'Dec 6 20:23:56 hqnl0246134 sshd[251443]: pam_imunify(sshd:auth): [IM360_RBL] The IP 109.194.50.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 20:23:57,580] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351037.5474486, 'message': 'Dec 6 20:23:56 hqnl0246134 sshd[251437]: Failed password for root from 61.177.173.18 port 31974 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 20:23:57,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '109.194.50.49', 'timestamp': 1670351037.547336, 'message': 'Dec 6 20:23:56 hqnl0246134 sshd[251443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.50.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:23:59,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351039.5476077, 'message': 'Dec 6 20:23:58 hqnl0246134 sshd[251437]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 20:23:59,580] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '109.194.50.49', 'timestamp': 1670351039.5478418, 'message': 'Dec 6 20:23:58 hqnl0246134 sshd[251443]: Failed password for root from 109.194.50.49 port 34656 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 20:24:01,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351041.5515587, 'message': 'Dec 6 20:24:00 hqnl0246134 sshd[251437]: Failed password for root from 61.177.173.18 port 31974 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 20:24:01,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351041.5518148, 'message': 'Dec 6 20:24:00 hqnl0246134 sshd[251437]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 20:24:03,578] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351043.5556748, 'message': 'Dec 6 20:24:03 hqnl0246134 sshd[251437]: Failed password for root from 61.177.173.18 port 31974 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
WARNING [2022-12-06 20:24:10,102] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:24:10,133] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0390 seconds
INFO [2022-12-06 20:24:13,606] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351053.5757873, 'message': 'Dec 6 20:24:13 hqnl0246134 sshd[251461]: Invalid user ftpuser from 59.127.158.223 port 47938', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 20:24:13,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351053.5760758, 'message': 'Dec 6 20:24:13 hqnl0246134 sshd[251461]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.127.158.223 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 20:24:13,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351053.576355, 'message': 'Dec 6 20:24:13 hqnl0246134 sshd[251461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.158.223 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:24:15,595] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351055.577922, 'message': 'Dec 6 20:24:14 hqnl0246134 sshd[251461]: Failed password for invalid user ftpuser from 59.127.158.223 port 47938 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 20:24:17,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351057.5820355, 'message': 'Dec 6 20:24:16 hqnl0246134 sshd[251461]: Disconnected from invalid user ftpuser 59.127.158.223 port 47938 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 20:24:17,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.71.198.42', 'timestamp': 1670351057.5823262, 'message': 'Dec 6 20:24:17 hqnl0246134 sshd[251465]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.71.198.42 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 20:24:17,632] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.71.198.42', 'timestamp': 1670351057.5825233, 'message': 'Dec 6 20:24:17 hqnl0246134 sshd[251465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.198.42 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 20:24:18,127] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:24:18,128] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:24:18,135] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:24:18,146] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 20:24:18,920] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:24:18,920] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:24:18,927] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:24:18,939] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 20:24:19,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '167.71.198.42', 'timestamp': 1670351059.5840845, 'message': 'Dec 6 20:24:19 hqnl0246134 sshd[251465]: Failed password for root from 167.71.198.42 port 44086 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 20:24:21,062] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:24:21,063] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:24:21,073] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:24:21,089] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0260 seconds
INFO [2022-12-06 20:24:25,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.83.28.210', 'timestamp': 1670351065.5935285, 'message': 'Dec 6 20:24:25 hqnl0246134 sshd[251441]: Invalid user ubuntu from 186.83.28.210 port 35234', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 20:24:25,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.83.28.210', 'timestamp': 1670351065.593711, 'message': 'Dec 6 20:24:25 hqnl0246134 sshd[251441]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.83.28.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 20:24:25,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.83.28.210', 'timestamp': 1670351065.593844, 'message': 'Dec 6 20:24:25 hqnl0246134 sshd[251441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.83.28.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 20:24:27,617] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.83.28.210', 'timestamp': 1670351067.596585, 'message': 'Dec 6 20:24:27 hqnl0246134 sshd[251441]: Failed password for invalid user ubuntu from 186.83.28.210 port 35234 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 20:24:29,617] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.83.28.210', 'timestamp': 1670351069.5994277, 'message': 'Dec 6 20:24:27 hqnl0246134 sshd[251441]: Disconnected from invalid user ubuntu 186.83.28.210 port 35234 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:24:33,628] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.249.50.242', 'timestamp': 1670351073.6049778, 'message': 'Dec 6 20:24:31 hqnl0246134 sshd[251484]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.249.50.242 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 20:24:33,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.249.50.242', 'timestamp': 1670351073.6053364, 'message': 'Dec 6 20:24:31 hqnl0246134 sshd[251484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.249.50.242 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:24:35,625] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '115.249.50.242', 'timestamp': 1670351075.6068485, 'message': 'Dec 6 20:24:34 hqnl0246134 sshd[251484]: Failed password for root from 115.249.50.242 port 44566 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:24:43,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351083.6261435, 'message': 'Dec 6 20:24:43 hqnl0246134 sshd[251496]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 20:24:43,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351083.6266835, 'message': 'Dec 6 20:24:43 hqnl0246134 sshd[251496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 20:24:45,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351085.629421, 'message': 'Dec 6 20:24:45 hqnl0246134 sshd[251496]: Failed password for root from 61.177.173.18 port 13016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 20:24:47,653] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351087.632899, 'message': 'Dec 6 20:24:45 hqnl0246134 sshd[251496]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 20:24:47,672] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351087.6330786, 'message': 'Dec 6 20:24:47 hqnl0246134 sshd[251496]: Failed password for root from 61.177.173.18 port 13016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-06 20:24:48,681] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:24:48,682] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:24:49,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351089.6365783, 'message': 'Dec 6 20:24:48 hqnl0246134 sshd[251496]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 20:24:51,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351091.639519, 'message': 'Dec 6 20:24:50 hqnl0246134 sshd[251496]: Failed password for root from 61.177.173.18 port 13016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 20:25:09,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '83.40.33.56', 'timestamp': 1670351109.6643164, 'message': 'Dec 6 20:25:09 hqnl0246134 sshd[251530]: pam_imunify(sshd:auth): [IM360_RBL] The IP 83.40.33.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0413 seconds
INFO [2022-12-06 20:25:09,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '83.40.33.56', 'timestamp': 1670351109.665135, 'message': 'Dec 6 20:25:09 hqnl0246134 sshd[251530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.40.33.56 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0234 seconds
WARNING [2022-12-06 20:25:10,107] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:25:10,153] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0559 seconds
INFO [2022-12-06 20:25:11,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '83.40.33.56', 'timestamp': 1670351111.6655066, 'message': 'Dec 6 20:25:11 hqnl0246134 sshd[251530]: Failed password for root from 83.40.33.56 port 55118 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 20:25:17,856] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:25:17,857] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:25:17,864] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:25:17,877] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 20:25:20,516] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:25:20,517] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:25:20,523] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:25:20,534] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 20:25:27,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351127.686859, 'message': 'Dec 6 20:25:26 hqnl0246134 sshd[251556]: Invalid user tiago from 75.30.64.54 port 47596', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 20:25:27,722] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.210.117.90', 'timestamp': 1670351127.6877599, 'message': 'Dec 6 20:25:27 hqnl0246134 sshd[251554]: Invalid user admin from 210.210.117.90 port 39049', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 20:25:27,752] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351127.6870477, 'message': 'Dec 6 20:25:26 hqnl0246134 sshd[251556]: pam_imunify(sshd:auth): [IM360_RBL] The IP 75.30.64.54 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 20:25:27,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351127.6874633, 'message': 'Dec 6 20:25:26 hqnl0246134 sshd[251556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.30.64.54 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 20:25:29,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.210.117.90', 'timestamp': 1670351129.689778, 'message': 'Dec 6 20:25:27 hqnl0246134 sshd[251554]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.210.117.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 20:25:29,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351129.6900635, 'message': 'Dec 6 20:25:28 hqnl0246134 sshd[251556]: Failed password for invalid user tiago from 75.30.64.54 port 47596 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 20:25:29,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.210.117.90', 'timestamp': 1670351129.6899467, 'message': 'Dec 6 20:25:27 hqnl0246134 sshd[251554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.210.117.90 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 20:25:31,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351131.6933503, 'message': 'Dec 6 20:25:30 hqnl0246134 sshd[251556]: Disconnected from invalid user tiago 75.30.64.54 port 47596 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0763 seconds
INFO [2022-12-06 20:25:31,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.210.117.90', 'timestamp': 1670351131.6936975, 'message': 'Dec 6 20:25:30 hqnl0246134 sshd[251554]: Failed password for invalid user admin from 210.210.117.90 port 39049 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0763 seconds
INFO [2022-12-06 20:25:31,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351131.6947572, 'message': 'Dec 6 20:25:30 hqnl0246134 sshd[251559]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0760 seconds
INFO [2022-12-06 20:25:31,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351131.6949039, 'message': 'Dec 6 20:25:30 hqnl0246134 sshd[251559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:25:32,789] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:25:32,789] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:25:32,798] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:25:32,810] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 20:25:33,714] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351133.695577, 'message': 'Dec 6 20:25:33 hqnl0246134 sshd[251559]: Failed password for root from 61.177.173.18 port 31263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 20:25:35,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '124.82.89.207', 'timestamp': 1670351135.6984272, 'message': 'Dec 6 20:25:34 hqnl0246134 sshd[251558]: pam_imunify(sshd:auth): [IM360_RBL] The IP 124.82.89.207 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 20:25:35,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.221.11.21', 'timestamp': 1670351135.6987824, 'message': 'Dec 6 20:25:34 hqnl0246134 sshd[251574]: Invalid user admin from 45.221.11.21 port 58413', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 20:25:35,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '124.82.89.207', 'timestamp': 1670351135.698627, 'message': 'Dec 6 20:25:34 hqnl0246134 sshd[251558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.82.89.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 20:25:35,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351135.6991153, 'message': 'Dec 6 20:25:35 hqnl0246134 sshd[251559]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0414 seconds
INFO [2022-12-06 20:25:35,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.221.11.21', 'timestamp': 1670351135.698911, 'message': 'Dec 6 20:25:34 hqnl0246134 sshd[251574]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.221.11.21 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0411 seconds
INFO [2022-12-06 20:25:35,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.221.11.21', 'timestamp': 1670351135.6990147, 'message': 'Dec 6 20:25:34 hqnl0246134 sshd[251574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.221.11.21 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:25:37,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '124.82.89.207', 'timestamp': 1670351137.7009141, 'message': 'Dec 6 20:25:36 hqnl0246134 sshd[251558]: Failed password for root from 124.82.89.207 port 59274 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0408 seconds
INFO [2022-12-06 20:25:37,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.221.11.21', 'timestamp': 1670351137.7011242, 'message': 'Dec 6 20:25:37 hqnl0246134 sshd[251574]: Failed password for invalid user admin from 45.221.11.21 port 58413 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0411 seconds
INFO [2022-12-06 20:25:37,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351137.701265, 'message': 'Dec 6 20:25:37 hqnl0246134 sshd[251559]: Failed password for root from 61.177.173.18 port 31263 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0411 seconds
INFO [2022-12-06 20:25:39,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351139.702301, 'message': 'Dec 6 20:25:39 hqnl0246134 sshd[251559]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 20:25:43,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351143.70838, 'message': 'Dec 6 20:25:41 hqnl0246134 sshd[251559]: Failed password for root from 61.177.173.18 port 31263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 20:25:48,685] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:25:48,685] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:25:51,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.179.198.14', 'timestamp': 1670351151.7181807, 'message': 'Dec 6 20:25:51 hqnl0246134 sshd[251603]: Invalid user mobile from 103.179.198.14 port 33198', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-06 20:25:53,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.179.198.14', 'timestamp': 1670351153.7185745, 'message': 'Dec 6 20:25:51 hqnl0246134 sshd[251603]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.179.198.14 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0605 seconds
INFO [2022-12-06 20:25:53,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.179.198.14', 'timestamp': 1670351153.718952, 'message': 'Dec 6 20:25:51 hqnl0246134 sshd[251603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.198.14 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0677 seconds
INFO [2022-12-06 20:25:55,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.179.198.14', 'timestamp': 1670351155.7211847, 'message': 'Dec 6 20:25:54 hqnl0246134 sshd[251603]: Failed password for invalid user mobile from 103.179.198.14 port 33198 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 20:25:57,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.179.198.14', 'timestamp': 1670351157.7237606, 'message': 'Dec 6 20:25:57 hqnl0246134 sshd[251603]: Disconnected from invalid user mobile 103.179.198.14 port 33198 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 20:26:01,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.32.211.250', 'timestamp': 1670351161.7361274, 'message': 'Dec 6 20:26:00 hqnl0246134 sshd[251608]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.32.211.250 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 20:26:01,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.32.211.250', 'timestamp': 1670351161.7366247, 'message': 'Dec 6 20:26:00 hqnl0246134 sshd[251608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.211.250 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 20:26:03,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.198.42', 'timestamp': 1670351163.7389772, 'message': 'Dec 6 20:26:02 hqnl0246134 sshd[251610]: Invalid user deploy from 167.71.198.42 port 36316', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0475 seconds
INFO [2022-12-06 20:26:03,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '152.32.211.250', 'timestamp': 1670351163.740848, 'message': 'Dec 6 20:26:02 hqnl0246134 sshd[251608]: Failed password for root from 152.32.211.250 port 48052 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 20:26:03,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.71.198.42', 'timestamp': 1670351163.7394333, 'message': 'Dec 6 20:26:02 hqnl0246134 sshd[251610]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.71.198.42 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 20:26:03,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.71.198.42', 'timestamp': 1670351163.7396739, 'message': 'Dec 6 20:26:02 hqnl0246134 sshd[251610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.198.42 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 20:26:05,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.198.42', 'timestamp': 1670351165.7453003, 'message': 'Dec 6 20:26:04 hqnl0246134 sshd[251610]: Failed password for invalid user deploy from 167.71.198.42 port 36316 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 20:26:07,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '50.73.44.36', 'timestamp': 1670351167.7520325, 'message': 'Dec 6 20:26:06 hqnl0246134 sshd[251627]: pam_imunify(sshd:auth): [IM360_RBL] The IP 50.73.44.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 20:26:07,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.198.42', 'timestamp': 1670351167.7531378, 'message': 'Dec 6 20:26:06 hqnl0246134 sshd[251610]: Disconnected from invalid user deploy 167.71.198.42 port 36316 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 20:26:07,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '50.73.44.36', 'timestamp': 1670351167.7523792, 'message': 'Dec 6 20:26:06 hqnl0246134 sshd[251627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.73.44.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 20:26:09,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '50.73.44.36', 'timestamp': 1670351169.7623336, 'message': 'Dec 6 20:26:08 hqnl0246134 sshd[251627]: Failed password for root from 50.73.44.36 port 37664 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 20:26:10,110] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:26:10,149] defence360agent.internals.the_sink: SensorIncidentList(<29 item(s)>) processed in 0.0480 seconds
INFO [2022-12-06 20:26:13,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.222.239', 'timestamp': 1670351173.7725391, 'message': 'Dec 6 20:26:13 hqnl0246134 sshd[251630]: Invalid user gmodserver from 143.198.222.239 port 54630', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 20:26:13,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.222.239', 'timestamp': 1670351173.773266, 'message': 'Dec 6 20:26:13 hqnl0246134 sshd[251630]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.222.239 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 20:26:13,831] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.222.239', 'timestamp': 1670351173.7734618, 'message': 'Dec 6 20:26:13 hqnl0246134 sshd[251630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.222.239 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 20:26:15,809] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.222.239', 'timestamp': 1670351175.7735672, 'message': 'Dec 6 20:26:15 hqnl0246134 sshd[251630]: Failed password for invalid user gmodserver from 143.198.222.239 port 54630 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 20:26:15,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.222.239', 'timestamp': 1670351175.7738004, 'message': 'Dec 6 20:26:15 hqnl0246134 sshd[251630]: Disconnected from invalid user gmodserver 143.198.222.239 port 54630 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 20:26:17,906] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:26:17,906] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:26:17,914] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:26:17,925] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 20:26:19,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351179.7812645, 'message': 'Dec 6 20:26:19 hqnl0246134 sshd[251637]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-06 20:26:19,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.172.50.255', 'timestamp': 1670351179.7822618, 'message': 'Dec 6 20:26:19 hqnl0246134 sshd[251642]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.172.50.255 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-06 20:26:19,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351179.7821267, 'message': 'Dec 6 20:26:19 hqnl0246134 sshd[251637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-06 20:26:19,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.172.50.255', 'timestamp': 1670351179.782379, 'message': 'Dec 6 20:26:19 hqnl0246134 sshd[251642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.50.255 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 20:26:20,578] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:26:20,578] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:26:20,585] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:26:20,598] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 20:26:21,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351181.786438, 'message': 'Dec 6 20:26:20 hqnl0246134 sshd[251637]: Failed password for root from 61.177.173.18 port 63460 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0506 seconds
INFO [2022-12-06 20:26:21,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '167.172.50.255', 'timestamp': 1670351181.7867236, 'message': 'Dec 6 20:26:21 hqnl0246134 sshd[251642]: Failed password for root from 167.172.50.255 port 50160 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0508 seconds
INFO [2022-12-06 20:26:21,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351181.7869055, 'message': 'Dec 6 20:26:21 hqnl0246134 sshd[251637]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 20:26:25,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351185.7940102, 'message': 'Dec 6 20:26:24 hqnl0246134 sshd[251637]: Failed password for root from 61.177.173.18 port 63460 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:26:27,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351187.797651, 'message': 'Dec 6 20:26:25 hqnl0246134 sshd[251637]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0418 seconds
INFO [2022-12-06 20:26:27,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.103.229.174', 'timestamp': 1670351187.797833, 'message': 'Dec 6 20:26:26 hqnl0246134 sshd[251648]: Invalid user martin from 95.103.229.174 port 48818', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0447 seconds
INFO [2022-12-06 20:26:27,876] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351187.798149, 'message': 'Dec 6 20:26:27 hqnl0246134 sshd[251637]: Failed password for root from 61.177.173.18 port 63460 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 20:26:27,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.103.229.174', 'timestamp': 1670351187.7979417, 'message': 'Dec 6 20:26:26 hqnl0246134 sshd[251648]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.103.229.174 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 20:26:27,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.103.229.174', 'timestamp': 1670351187.7980459, 'message': 'Dec 6 20:26:26 hqnl0246134 sshd[251648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.103.229.174 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 20:26:29,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.103.229.174', 'timestamp': 1670351189.8023808, 'message': 'Dec 6 20:26:28 hqnl0246134 sshd[251648]: Failed password for invalid user martin from 95.103.229.174 port 48818 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:26:31,825] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.103.229.174', 'timestamp': 1670351191.804807, 'message': 'Dec 6 20:26:30 hqnl0246134 sshd[251648]: Disconnected from invalid user martin 95.103.229.174 port 48818 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 20:26:42,426] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 20:26:42,493] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 20:26:42,494] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 20:26:42,494] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 20:26:42,494] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 20:26:42,495] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 20:26:42,511] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 20:26:42,528] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0319 seconds
WARNING [2022-12-06 20:26:42,535] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 20:26:42,537] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:26:42,554] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0318 seconds
INFO [2022-12-06 20:26:42,555] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0301 seconds
INFO [2022-12-06 20:26:43,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '109.194.50.49', 'timestamp': 1670351203.8248053, 'message': 'Dec 6 20:26:41 hqnl0246134 sshd[251662]: pam_imunify(sshd:auth): [IM360_RBL] The IP 109.194.50.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 20:26:43,863] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '109.194.50.49', 'timestamp': 1670351203.8250399, 'message': 'Dec 6 20:26:41 hqnl0246134 sshd[251662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.50.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 20:26:43,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '109.194.50.49', 'timestamp': 1670351203.8252559, 'message': 'Dec 6 20:26:43 hqnl0246134 sshd[251662]: Failed password for root from 109.194.50.49 port 37472 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:26:46,599] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:26:46,600] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:26:46,616] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:26:46,638] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0370 seconds
WARNING [2022-12-06 20:26:48,688] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:26:48,691] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:27:07,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351227.8504584, 'message': 'Dec 6 20:27:06 hqnl0246134 sshd[251704]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 20:27:07,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351227.8510635, 'message': 'Dec 6 20:27:06 hqnl0246134 sshd[251704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 20:27:09,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351229.8508377, 'message': 'Dec 6 20:27:08 hqnl0246134 sshd[251704]: Failed password for root from 61.177.173.18 port 39834 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 20:27:09,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351229.8511055, 'message': 'Dec 6 20:27:08 hqnl0246134 sshd[251704]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0262 seconds
WARNING [2022-12-06 20:27:10,112] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:27:10,144] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0402 seconds
INFO [2022-12-06 20:27:11,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351231.8523893, 'message': 'Dec 6 20:27:11 hqnl0246134 sshd[251704]: Failed password for root from 61.177.173.18 port 39834 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 20:27:13,139] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 20:27:13,140] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 20:27:13,141] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 20:27:13,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351233.8536446, 'message': 'Dec 6 20:27:13 hqnl0246134 sshd[251704]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:27:15,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351235.8565235, 'message': 'Dec 6 20:27:14 hqnl0246134 sshd[251710]: Invalid user big from 59.127.158.223 port 37100', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0710 seconds
INFO [2022-12-06 20:27:15,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351235.8569593, 'message': 'Dec 6 20:27:14 hqnl0246134 sshd[251704]: Failed password for root from 61.177.173.18 port 39834 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0711 seconds
INFO [2022-12-06 20:27:15,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351235.856741, 'message': 'Dec 6 20:27:14 hqnl0246134 sshd[251710]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.127.158.223 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 20:27:16,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351235.8568532, 'message': 'Dec 6 20:27:14 hqnl0246134 sshd[251710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.158.223 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0395 seconds
INFO [2022-12-06 20:27:17,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351237.8578491, 'message': 'Dec 6 20:27:16 hqnl0246134 sshd[251710]: Failed password for invalid user big from 59.127.158.223 port 37100 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 20:27:17,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351237.8580332, 'message': 'Dec 6 20:27:17 hqnl0246134 sshd[251710]: Disconnected from invalid user big 59.127.158.223 port 37100 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:27:18,500] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:27:18,501] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:27:18,513] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:27:18,534] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0316 seconds
INFO [2022-12-06 20:27:21,232] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:27:21,232] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:27:21,239] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:27:21,250] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 20:27:39,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351259.8934562, 'message': 'Dec 6 20:27:38 hqnl0246134 sshd[251746]: Invalid user 3456! from 75.30.64.54 port 37810', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 20:27:39,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351259.8971128, 'message': 'Dec 6 20:27:38 hqnl0246134 sshd[251746]: pam_imunify(sshd:auth): [IM360_RBL] The IP 75.30.64.54 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0378 seconds
INFO [2022-12-06 20:27:39,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351259.8972528, 'message': 'Dec 6 20:27:38 hqnl0246134 sshd[251746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.30.64.54 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:27:41,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351261.8959475, 'message': 'Dec 6 20:27:40 hqnl0246134 sshd[251746]: Failed password for invalid user 3456! from 75.30.64.54 port 37810 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:27:41,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351261.8962338, 'message': 'Dec 6 20:27:41 hqnl0246134 sshd[251746]: Disconnected from invalid user 3456! 75.30.64.54 port 37810 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 20:27:48,697] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:27:48,699] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:27:55,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351275.917505, 'message': 'Dec 6 20:27:54 hqnl0246134 sshd[251755]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 20:27:55,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351275.9178665, 'message': 'Dec 6 20:27:54 hqnl0246134 sshd[251755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 20:27:57,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.249.50.242', 'timestamp': 1670351277.9222987, 'message': 'Dec 6 20:27:55 hqnl0246134 sshd[251757]: Invalid user test from 115.249.50.242 port 48940', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0459 seconds
INFO [2022-12-06 20:27:57,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351277.9231505, 'message': 'Dec 6 20:27:56 hqnl0246134 sshd[251755]: Failed password for root from 61.177.173.18 port 11496 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0461 seconds
INFO [2022-12-06 20:27:58,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.249.50.242', 'timestamp': 1670351277.922779, 'message': 'Dec 6 20:27:56 hqnl0246134 sshd[251757]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.249.50.242 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 20:27:58,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.249.50.242', 'timestamp': 1670351277.9229593, 'message': 'Dec 6 20:27:56 hqnl0246134 sshd[251757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.249.50.242 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 20:27:59,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.249.50.242', 'timestamp': 1670351279.9258857, 'message': 'Dec 6 20:27:57 hqnl0246134 sshd[251757]: Failed password for invalid user test from 115.249.50.242 port 48940 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 20:27:59,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351279.9290078, 'message': 'Dec 6 20:27:58 hqnl0246134 sshd[251755]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 20:27:59,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.249.50.242', 'timestamp': 1670351279.9291985, 'message': 'Dec 6 20:27:58 hqnl0246134 sshd[251757]: Disconnected from invalid user test 115.249.50.242 port 48940 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 20:28:01,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351281.9298227, 'message': 'Dec 6 20:28:00 hqnl0246134 sshd[251755]: Failed password for root from 61.177.173.18 port 11496 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 20:28:03,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351283.9341342, 'message': 'Dec 6 20:28:02 hqnl0246134 sshd[251755]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 20:28:05,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351285.9365847, 'message': 'Dec 6 20:28:04 hqnl0246134 sshd[251755]: Failed password for root from 61.177.173.18 port 11496 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
WARNING [2022-12-06 20:28:10,118] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:28:10,146] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0358 seconds
INFO [2022-12-06 20:28:18,472] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:28:18,473] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:28:18,480] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:28:18,509] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0350 seconds
INFO [2022-12-06 20:28:22,298] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:28:22,298] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:28:22,311] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:28:22,341] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0418 seconds
INFO [2022-12-06 20:28:42,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351321.9806645, 'message': 'Dec 6 20:28:41 hqnl0246134 sshd[251803]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 20:28:42,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351321.98103, 'message': 'Dec 6 20:28:41 hqnl0246134 sshd[251803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 20:28:44,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351323.9844267, 'message': 'Dec 6 20:28:43 hqnl0246134 sshd[251803]: Failed password for root from 61.177.173.18 port 47367 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 20:28:48,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351327.9909704, 'message': 'Dec 6 20:28:46 hqnl0246134 sshd[251803]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 20:28:48,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.32.211.250', 'timestamp': 1670351327.9913185, 'message': 'Dec 6 20:28:46 hqnl0246134 sshd[251808]: Invalid user ubuntu from 152.32.211.250 port 29262', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 20:28:48,037] defence360agent.files: Updating all files
INFO [2022-12-06 20:28:48,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351327.9917355, 'message': 'Dec 6 20:28:47 hqnl0246134 sshd[251803]: Failed password for root from 61.177.173.18 port 47367 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 20:28:48,073] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.32.211.250', 'timestamp': 1670351327.9915051, 'message': 'Dec 6 20:28:46 hqnl0246134 sshd[251808]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.32.211.250 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 20:28:48,097] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.32.211.250', 'timestamp': 1670351327.991612, 'message': 'Dec 6 20:28:46 hqnl0246134 sshd[251808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.211.250 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 20:28:48,387] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 20:28:48,388] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 20:28:48,690] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 20:28:48,690] defence360agent.files: static-whitelist files update finished (not updated)
WARNING [2022-12-06 20:28:48,700] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:28:48,701] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:28:48,942] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 20:28:48,943] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 20:28:49,281] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 20:28:49,282] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 20:28:49,282] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 20:28:49,545] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 18:28:49 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E47AF2DB42704'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 20:28:49,546] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 20:28:49,547] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 20:28:50,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.32.211.250', 'timestamp': 1670351329.9932036, 'message': 'Dec 6 20:28:48 hqnl0246134 sshd[251808]: Failed password for invalid user ubuntu from 152.32.211.250 port 29262 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1059 seconds
INFO [2022-12-06 20:28:50,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351329.9935548, 'message': 'Dec 6 20:28:48 hqnl0246134 sshd[251803]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1070 seconds
INFO [2022-12-06 20:28:50,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.73.44.36', 'timestamp': 1670351329.9939153, 'message': 'Dec 6 20:28:49 hqnl0246134 sshd[251810]: Invalid user jeff from 50.73.44.36 port 60429', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1069 seconds
INFO [2022-12-06 20:28:50,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.32.211.250', 'timestamp': 1670351329.993739, 'message': 'Dec 6 20:28:48 hqnl0246134 sshd[251808]: Disconnected from invalid user ubuntu 152.32.211.250 port 29262 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0583 seconds
INFO [2022-12-06 20:28:50,161] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '50.73.44.36', 'timestamp': 1670351329.9940908, 'message': 'Dec 6 20:28:49 hqnl0246134 sshd[251810]: pam_imunify(sshd:auth): [IM360_RBL] The IP 50.73.44.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0564 seconds
INFO [2022-12-06 20:28:50,180] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 20:28:50,181] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 20:28:50,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '50.73.44.36', 'timestamp': 1670351329.9942832, 'message': 'Dec 6 20:28:49 hqnl0246134 sshd[251810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.73.44.36 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 20:28:50,444] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 20:28:50,445] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 20:28:50,765] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 20:28:50,766] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 20:28:51,165] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 20:28:51,165] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 20:28:51,664] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:28:51,664] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 20:28:51,665] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 20:28:51,667] defence360agent.files: geo files update finished (not updated)
WARNING [2022-12-06 20:28:51,677] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:28:51,695] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0296 seconds
INFO [2022-12-06 20:28:52,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351331.9956725, 'message': 'Dec 6 20:28:50 hqnl0246134 sshd[251803]: Failed password for root from 61.177.173.18 port 47367 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 20:28:52,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.73.44.36', 'timestamp': 1670351331.9958577, 'message': 'Dec 6 20:28:51 hqnl0246134 sshd[251810]: Failed password for invalid user jeff from 50.73.44.36 port 60429 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 20:28:52,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '50.73.44.36', 'timestamp': 1670351331.9959798, 'message': 'Dec 6 20:28:51 hqnl0246134 sshd[251810]: Disconnected from invalid user jeff 50.73.44.36 port 60429 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 20:29:02,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.179.198.14', 'timestamp': 1670351342.0170274, 'message': 'Dec 6 20:29:01 hqnl0246134 sshd[251819]: Invalid user steve from 103.179.198.14 port 33044', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 20:29:02,064] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.179.198.14', 'timestamp': 1670351342.0175042, 'message': 'Dec 6 20:29:01 hqnl0246134 sshd[251819]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.179.198.14 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 20:29:02,083] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.179.198.14', 'timestamp': 1670351342.0176568, 'message': 'Dec 6 20:29:01 hqnl0246134 sshd[251819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.198.14 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:29:04,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.179.198.14', 'timestamp': 1670351344.0227463, 'message': 'Dec 6 20:29:02 hqnl0246134 sshd[251819]: Failed password for invalid user steve from 103.179.198.14 port 33044 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 20:29:04,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.179.198.14', 'timestamp': 1670351344.0231147, 'message': 'Dec 6 20:29:03 hqnl0246134 sshd[251819]: Disconnected from invalid user steve 103.179.198.14 port 33044 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0167 seconds
WARNING [2022-12-06 20:29:10,129] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:29:10,201] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0865 seconds
INFO [2022-12-06 20:29:14,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.222.239', 'timestamp': 1670351354.0363212, 'message': 'Dec 6 20:29:13 hqnl0246134 sshd[251843]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.222.239 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 20:29:14,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.222.239', 'timestamp': 1670351354.0365984, 'message': 'Dec 6 20:29:13 hqnl0246134 sshd[251843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.222.239 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 20:29:16,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '143.198.222.239', 'timestamp': 1670351356.038463, 'message': 'Dec 6 20:29:14 hqnl0246134 sshd[251843]: Failed password for root from 143.198.222.239 port 33404 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0506 seconds
INFO [2022-12-06 20:29:18,295] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:29:18,296] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:29:18,307] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:29:18,339] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0419 seconds
INFO [2022-12-06 20:29:21,245] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:29:21,245] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:29:21,252] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:29:21,263] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 20:29:30,079] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351370.059274, 'message': 'Dec 6 20:29:28 hqnl0246134 sshd[251856]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 20:29:30,101] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351370.0595536, 'message': 'Dec 6 20:29:28 hqnl0246134 sshd[251856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 20:29:32,084] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351372.0651505, 'message': 'Dec 6 20:29:30 hqnl0246134 sshd[251856]: Failed password for root from 61.177.173.18 port 13493 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:29:34,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351374.0702016, 'message': 'Dec 6 20:29:32 hqnl0246134 sshd[251856]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 20:29:36,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351376.0716429, 'message': 'Dec 6 20:29:34 hqnl0246134 sshd[251856]: Failed password for root from 61.177.173.18 port 13493 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 20:29:36,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351376.071922, 'message': 'Dec 6 20:29:34 hqnl0246134 sshd[251856]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:29:38,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351378.074025, 'message': 'Dec 6 20:29:37 hqnl0246134 sshd[251856]: Failed password for root from 61.177.173.18 port 13493 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 20:29:48,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351388.0865815, 'message': 'Dec 6 20:29:46 hqnl0246134 sshd[251890]: Invalid user user from 75.30.64.54 port 37438', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 20:29:48,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351388.0869458, 'message': 'Dec 6 20:29:46 hqnl0246134 sshd[251890]: pam_imunify(sshd:auth): [IM360_RBL] The IP 75.30.64.54 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0423 seconds
INFO [2022-12-06 20:29:48,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351388.0870926, 'message': 'Dec 6 20:29:46 hqnl0246134 sshd[251890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.30.64.54 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0463 seconds
WARNING [2022-12-06 20:29:48,703] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:29:48,704] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:29:50,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351390.0900803, 'message': 'Dec 6 20:29:49 hqnl0246134 sshd[251890]: Failed password for invalid user user from 75.30.64.54 port 37438 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 20:29:52,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '75.30.64.54', 'timestamp': 1670351392.0936275, 'message': 'Dec 6 20:29:50 hqnl0246134 sshd[251890]: Disconnected from invalid user user 75.30.64.54 port 37438 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 20:30:06,157] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351406.1110113, 'message': 'Dec 6 20:30:06 hqnl0246134 sshd[251924]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.127.158.223 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-06 20:30:06,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351406.1114466, 'message': 'Dec 6 20:30:06 hqnl0246134 sshd[251924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.158.223 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0400 seconds
WARNING [2022-12-06 20:30:10,173] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:30:10,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '59.127.158.223', 'timestamp': 1670351410.1133358, 'message': 'Dec 6 20:30:08 hqnl0246134 sshd[251924]: Failed password for root from 59.127.158.223 port 54492 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1426 seconds
INFO [2022-12-06 20:30:10,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.60.92.170', 'timestamp': 1670351410.1136775, 'message': 'Dec 6 20:30:08 hqnl0246134 sshd[251931]: Invalid user david from 200.60.92.170 port 60308', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1416 seconds
INFO [2022-12-06 20:30:10,259] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.1415 seconds
INFO [2022-12-06 20:30:10,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.60.92.170', 'timestamp': 1670351410.1139026, 'message': 'Dec 6 20:30:08 hqnl0246134 sshd[251931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.60.92.170 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 20:30:10,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.60.92.170', 'timestamp': 1670351410.1141558, 'message': 'Dec 6 20:30:08 hqnl0246134 sshd[251931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.92.170 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0446 seconds
INFO [2022-12-06 20:30:12,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.60.92.170', 'timestamp': 1670351412.1154025, 'message': 'Dec 6 20:30:10 hqnl0246134 sshd[251931]: Failed password for invalid user david from 200.60.92.170 port 60308 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 20:30:12,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.60.92.170', 'timestamp': 1670351412.11577, 'message': 'Dec 6 20:30:11 hqnl0246134 sshd[251931]: Disconnected from invalid user david 200.60.92.170 port 60308 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 20:30:13,191] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:30:13,191] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:30:13,213] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:30:13,226] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0333 seconds
INFO [2022-12-06 20:30:16,134] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351416.1157744, 'message': 'Dec 6 20:30:15 hqnl0246134 sshd[251946]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 20:30:16,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351416.116019, 'message': 'Dec 6 20:30:16 hqnl0246134 sshd[251946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:30:17,851] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:30:17,851] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:30:17,859] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:30:17,870] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 20:30:18,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '72.165.240.194', 'timestamp': 1670351418.1178331, 'message': 'Dec 6 20:30:16 hqnl0246134 sshd[251950]: Invalid user sysadmin from 72.165.240.194 port 41576', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0458 seconds
INFO [2022-12-06 20:30:18,167] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '124.82.89.207', 'timestamp': 1670351418.1184077, 'message': 'Dec 6 20:30:17 hqnl0246134 sshd[251937]: Invalid user gerencia from 124.82.89.207 port 51260', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0461 seconds
INFO [2022-12-06 20:30:18,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351418.1189647, 'message': 'Dec 6 20:30:17 hqnl0246134 sshd[251946]: Failed password for root from 61.177.173.18 port 39764 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0460 seconds
INFO [2022-12-06 20:30:18,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '72.165.240.194', 'timestamp': 1670351418.1180785, 'message': 'Dec 6 20:30:17 hqnl0246134 sshd[251950]: pam_imunify(sshd:auth): [IM360_RBL] The IP 72.165.240.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 20:30:18,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '124.82.89.207', 'timestamp': 1670351418.1191247, 'message': 'Dec 6 20:30:17 hqnl0246134 sshd[251937]: pam_imunify(sshd:auth): [IM360_RBL] The IP 124.82.89.207 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 20:30:18,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '72.165.240.194', 'timestamp': 1670351418.1182644, 'message': 'Dec 6 20:30:17 hqnl0246134 sshd[251950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.165.240.194 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 20:30:18,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '124.82.89.207', 'timestamp': 1670351418.1193204, 'message': 'Dec 6 20:30:17 hqnl0246134 sshd[251937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.82.89.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 20:30:20,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351420.1192756, 'message': 'Dec 6 20:30:18 hqnl0246134 sshd[251946]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0510 seconds
INFO [2022-12-06 20:30:20,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '72.165.240.194', 'timestamp': 1670351420.119442, 'message': 'Dec 6 20:30:19 hqnl0246134 sshd[251950]: Failed password for invalid user sysadmin from 72.165.240.194 port 41576 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0512 seconds
INFO [2022-12-06 20:30:20,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '124.82.89.207', 'timestamp': 1670351420.124849, 'message': 'Dec 6 20:30:20 hqnl0246134 sshd[251937]: Failed password for invalid user gerencia from 124.82.89.207 port 51260 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0477 seconds
INFO [2022-12-06 20:30:20,358] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:30:20,359] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:30:20,373] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:30:20,394] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0338 seconds
INFO [2022-12-06 20:30:22,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '72.165.240.194', 'timestamp': 1670351422.1223035, 'message': 'Dec 6 20:30:20 hqnl0246134 sshd[251950]: Disconnected from invalid user sysadmin 72.165.240.194 port 41576 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0402 seconds
INFO [2022-12-06 20:30:22,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351422.12249, 'message': 'Dec 6 20:30:20 hqnl0246134 sshd[251946]: Failed password for root from 61.177.173.18 port 39764 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 20:30:22,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '124.82.89.207', 'timestamp': 1670351422.123217, 'message': 'Dec 6 20:30:22 hqnl0246134 sshd[251937]: Disconnected from invalid user gerencia 124.82.89.207 port 51260 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0403 seconds
INFO [2022-12-06 20:30:24,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351424.12554, 'message': 'Dec 6 20:30:22 hqnl0246134 sshd[251946]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 20:30:26,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351426.1283405, 'message': 'Dec 6 20:30:24 hqnl0246134 sshd[251946]: Failed password for root from 61.177.173.18 port 39764 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-06 20:30:48,709] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:30:48,711] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:30:58,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.103.229.174', 'timestamp': 1670351458.1937242, 'message': 'Dec 6 20:30:57 hqnl0246134 sshd[251978]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.103.229.174 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 20:30:58,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.103.229.174', 'timestamp': 1670351458.1944995, 'message': 'Dec 6 20:30:57 hqnl0246134 sshd[251978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.103.229.174 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 20:31:00,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '95.103.229.174', 'timestamp': 1670351460.1955874, 'message': 'Dec 6 20:30:59 hqnl0246134 sshd[251978]: Failed password for root from 95.103.229.174 port 53594 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 20:31:06,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351466.205035, 'message': 'Dec 6 20:31:04 hqnl0246134 sshd[251989]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 20:31:06,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351466.205388, 'message': 'Dec 6 20:31:04 hqnl0246134 sshd[251989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 20:31:08,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351468.2069461, 'message': 'Dec 6 20:31:06 hqnl0246134 sshd[251989]: Failed password for root from 61.177.173.18 port 64595 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 20:31:08,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351468.2071393, 'message': 'Dec 6 20:31:06 hqnl0246134 sshd[251989]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
WARNING [2022-12-06 20:31:10,132] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:31:10,157] defence360agent.internals.the_sink: SensorIncidentList(<16 item(s)>) processed in 0.0357 seconds
INFO [2022-12-06 20:31:10,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351470.2081094, 'message': 'Dec 6 20:31:09 hqnl0246134 sshd[251989]: Failed password for root from 61.177.173.18 port 64595 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 20:31:12,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351472.2097082, 'message': 'Dec 6 20:31:11 hqnl0246134 sshd[251989]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0645 seconds
INFO [2022-12-06 20:31:14,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351474.2109811, 'message': 'Dec 6 20:31:13 hqnl0246134 sshd[251989]: Failed password for root from 61.177.173.18 port 64595 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 20:31:16,121] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:31:16,122] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:31:16,129] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:31:16,144] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 20:31:18,100] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:31:18,101] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:31:18,111] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:31:18,129] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0267 seconds
INFO [2022-12-06 20:31:20,926] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:31:20,926] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:31:20,934] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:31:20,947] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 20:31:24,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.104.25.215', 'timestamp': 1670351484.2180648, 'message': 'Dec 6 20:31:22 hqnl0246134 sshd[252020]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.104.25.215 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 20:31:24,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.104.25.215', 'timestamp': 1670351484.2182982, 'message': 'Dec 6 20:31:22 hqnl0246134 sshd[252020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.25.215 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:31:26,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '190.104.25.215', 'timestamp': 1670351486.2198727, 'message': 'Dec 6 20:31:24 hqnl0246134 sshd[252020]: Failed password for root from 190.104.25.215 port 40846 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 20:31:48,714] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:31:48,718] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 20:31:53,897] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 20:31:54,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351514.2544582, 'message': 'Dec 6 20:31:53 hqnl0246134 sshd[252038]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-06 20:31:54,321] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351514.2556539, 'message': 'Dec 6 20:31:53 hqnl0246134 sshd[252038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 20:31:56,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351516.2621422, 'message': 'Dec 6 20:31:55 hqnl0246134 sshd[252038]: Failed password for root from 61.177.173.18 port 38199 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 20:31:58,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351518.2537827, 'message': 'Dec 6 20:31:57 hqnl0246134 sshd[252038]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 20:32:00,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351520.2557967, 'message': 'Dec 6 20:31:59 hqnl0246134 sshd[252038]: Failed password for root from 61.177.173.18 port 38199 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:32:00,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351520.2559812, 'message': 'Dec 6 20:32:00 hqnl0246134 sshd[252038]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 20:32:04,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351524.2619565, 'message': 'Dec 6 20:32:02 hqnl0246134 sshd[252038]: Failed password for root from 61.177.173.18 port 38199 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 20:32:06,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351526.2649717, 'message': 'Dec 6 20:32:04 hqnl0246134 sshd[252059]: Invalid user xia from 210.19.254.6 port 47823', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 20:32:06,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351526.265249, 'message': 'Dec 6 20:32:04 hqnl0246134 sshd[252059]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.19.254.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:32:06,324] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351526.2664125, 'message': 'Dec 6 20:32:04 hqnl0246134 sshd[252059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.19.254.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:32:08,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351528.2676468, 'message': 'Dec 6 20:32:06 hqnl0246134 sshd[252059]: Failed password for invalid user xia from 210.19.254.6 port 47823 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 20:32:10,139] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:32:10,179] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0531 seconds
INFO [2022-12-06 20:32:10,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351530.2687018, 'message': 'Dec 6 20:32:08 hqnl0246134 sshd[252059]: Disconnected from invalid user xia 210.19.254.6 port 47823 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 20:32:18,221] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:32:18,222] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:32:18,238] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:32:18,255] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0299 seconds
INFO [2022-12-06 20:32:21,247] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:32:21,248] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:32:21,255] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:32:21,266] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 20:32:33,491] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 20:32:33,560] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 20:32:33,561] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 20:32:33,561] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 20:32:33,561] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 20:32:33,562] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 20:32:33,573] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 20:32:33,589] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0265 seconds
WARNING [2022-12-06 20:32:33,596] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 20:32:33,598] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:32:33,615] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0321 seconds
INFO [2022-12-06 20:32:33,617] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0300 seconds
INFO [2022-12-06 20:32:42,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351562.310806, 'message': 'Dec 6 20:32:41 hqnl0246134 sshd[252097]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0430 seconds
INFO [2022-12-06 20:32:42,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351562.311733, 'message': 'Dec 6 20:32:41 hqnl0246134 sshd[252097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:32:44,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351564.3100257, 'message': 'Dec 6 20:32:42 hqnl0246134 sshd[252097]: Failed password for root from 61.177.173.18 port 63872 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 20:32:44,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351564.3103786, 'message': 'Dec 6 20:32:43 hqnl0246134 sshd[252097]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 20:32:46,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351566.312474, 'message': 'Dec 6 20:32:45 hqnl0246134 sshd[252097]: Failed password for root from 61.177.173.18 port 63872 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 20:32:46,372] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351566.3128924, 'message': 'Dec 6 20:32:46 hqnl0246134 sshd[252097]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 20:32:48,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351568.3172975, 'message': 'Dec 6 20:32:47 hqnl0246134 sshd[252097]: Failed password for root from 61.177.173.18 port 63872 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0272 seconds
WARNING [2022-12-06 20:32:48,720] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:32:48,721] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:32:52,026] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:32:52,026] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:32:52,039] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:32:52,057] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0287 seconds
INFO [2022-12-06 20:33:04,107] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 20:33:04,108] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 20:33:04,110] im360.plugins.client360: Waiting 6 minutes before retry...
WARNING [2022-12-06 20:33:10,139] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:33:10,161] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0306 seconds
INFO [2022-12-06 20:33:18,021] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:33:18,022] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:33:18,030] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:33:18,041] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 20:33:20,776] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:33:20,776] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:33:20,783] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:33:20,795] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 20:33:28,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351608.384385, 'message': 'Dec 6 20:33:28 hqnl0246134 sshd[252157]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 20:33:28,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351608.3846767, 'message': 'Dec 6 20:33:28 hqnl0246134 sshd[252157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 20:33:30,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351610.3858197, 'message': 'Dec 6 20:33:29 hqnl0246134 sshd[252157]: Failed password for root from 61.177.173.18 port 34574 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 20:33:30,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351610.3863468, 'message': 'Dec 6 20:33:30 hqnl0246134 sshd[252157]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 20:33:32,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351612.3890905, 'message': 'Dec 6 20:33:32 hqnl0246134 sshd[252157]: Failed password for root from 61.177.173.18 port 34574 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 20:33:34,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351614.3906796, 'message': 'Dec 6 20:33:32 hqnl0246134 sshd[252157]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 20:33:36,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351616.3923156, 'message': 'Dec 6 20:33:34 hqnl0246134 sshd[252157]: Failed password for root from 61.177.173.18 port 34574 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 20:33:38,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.93.245.190', 'timestamp': 1670351618.395436, 'message': 'Dec 6 20:33:38 hqnl0246134 sshd[252170]: Invalid user user14 from 110.93.245.190 port 39539', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 20:33:40,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '110.93.245.190', 'timestamp': 1670351620.3961926, 'message': 'Dec 6 20:33:38 hqnl0246134 sshd[252170]: pam_imunify(sshd:auth): [IM360_RBL] The IP 110.93.245.190 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 20:33:40,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '110.93.245.190', 'timestamp': 1670351620.3965359, 'message': 'Dec 6 20:33:38 hqnl0246134 sshd[252170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.93.245.190 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 20:33:40,463] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.93.245.190', 'timestamp': 1670351620.3966954, 'message': 'Dec 6 20:33:40 hqnl0246134 sshd[252170]: Failed password for invalid user user14 from 110.93.245.190 port 39539 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 20:33:42,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.93.245.190', 'timestamp': 1670351622.4036627, 'message': 'Dec 6 20:33:40 hqnl0246134 sshd[252170]: Disconnected from invalid user user14 110.93.245.190 port 39539 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 20:33:48,726] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:33:48,728] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 20:34:10,144] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:34:10,174] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0396 seconds
INFO [2022-12-06 20:34:16,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351656.4746292, 'message': 'Dec 6 20:34:15 hqnl0246134 sshd[252194]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 20:34:16,513] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351656.4749393, 'message': 'Dec 6 20:34:15 hqnl0246134 sshd[252194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:34:18,049] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:34:18,050] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:34:18,058] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:34:18,070] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 20:34:18,496] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351658.477007, 'message': 'Dec 6 20:34:17 hqnl0246134 sshd[252194]: Failed password for root from 61.177.173.18 port 63131 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 20:34:20,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351660.4774647, 'message': 'Dec 6 20:34:19 hqnl0246134 sshd[252194]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 20:34:20,748] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:34:20,748] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:34:20,761] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:34:20,777] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0247 seconds
INFO [2022-12-06 20:34:22,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351662.4802806, 'message': 'Dec 6 20:34:21 hqnl0246134 sshd[252194]: Failed password for root from 61.177.173.18 port 63131 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:34:22,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351662.48048, 'message': 'Dec 6 20:34:21 hqnl0246134 sshd[252194]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 20:34:24,504] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351664.484806, 'message': 'Dec 6 20:34:23 hqnl0246134 sshd[252194]: Failed password for root from 61.177.173.18 port 63131 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 20:34:28,801] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:34:28,801] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:34:28,808] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:34:28,820] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 20:34:48,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '124.82.89.207', 'timestamp': 1670351688.5288842, 'message': 'Dec 6 20:34:47 hqnl0246134 sshd[252223]: pam_imunify(sshd:auth): [IM360_RBL] The IP 124.82.89.207 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0562 seconds
INFO [2022-12-06 20:34:48,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '124.82.89.207', 'timestamp': 1670351688.5307531, 'message': 'Dec 6 20:34:47 hqnl0246134 sshd[252223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.82.89.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0395 seconds
WARNING [2022-12-06 20:34:48,732] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:34:48,733] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:34:50,563] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '124.82.89.207', 'timestamp': 1670351690.5308945, 'message': 'Dec 6 20:34:48 hqnl0246134 sshd[252223]: Failed password for root from 124.82.89.207 port 49608 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 20:34:54,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '168.181.148.162', 'timestamp': 1670351694.5398986, 'message': 'Dec 6 20:34:54 hqnl0246134 sshd[252226]: pam_imunify(sshd:auth): [IM360_RBL] The IP 168.181.148.162 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 20:34:54,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.181.148.162', 'timestamp': 1670351694.5404146, 'message': 'Dec 6 20:34:54 hqnl0246134 sshd[252226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.181.148.162 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:34:56,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '168.181.148.162', 'timestamp': 1670351696.5444207, 'message': 'Dec 6 20:34:55 hqnl0246134 sshd[252226]: Failed password for root from 168.181.148.162 port 39094 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:35:04,578] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351704.553126, 'message': 'Dec 6 20:35:02 hqnl0246134 sshd[252230]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 20:35:04,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351704.5534966, 'message': 'Dec 6 20:35:02 hqnl0246134 sshd[252230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 20:35:06,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351706.5536716, 'message': 'Dec 6 20:35:04 hqnl0246134 sshd[252230]: Failed password for root from 61.177.173.18 port 37137 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 20:35:08,578] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351708.5569682, 'message': 'Dec 6 20:35:06 hqnl0246134 sshd[252230]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
WARNING [2022-12-06 20:35:10,147] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:35:10,170] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0309 seconds
INFO [2022-12-06 20:35:10,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351710.5615897, 'message': 'Dec 6 20:35:08 hqnl0246134 sshd[252230]: Failed password for root from 61.177.173.18 port 37137 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 20:35:10,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351710.5618844, 'message': 'Dec 6 20:35:09 hqnl0246134 sshd[252230]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 20:35:12,606] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351712.573744, 'message': 'Dec 6 20:35:11 hqnl0246134 sshd[252230]: Failed password for root from 61.177.173.18 port 37137 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 20:35:12,607] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.160.62.57', 'timestamp': 1670351712.5739899, 'message': 'Dec 6 20:35:12 hqnl0246134 sshd[252266]: Invalid user user from 122.160.62.57 port 55512', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 20:35:14,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.160.62.57', 'timestamp': 1670351714.569128, 'message': 'Dec 6 20:35:12 hqnl0246134 sshd[252266]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.160.62.57 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 20:35:14,608] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.160.62.57', 'timestamp': 1670351714.5693393, 'message': 'Dec 6 20:35:12 hqnl0246134 sshd[252266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.62.57 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 20:35:14,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.160.62.57', 'timestamp': 1670351714.5694642, 'message': 'Dec 6 20:35:14 hqnl0246134 sshd[252266]: Failed password for invalid user user from 122.160.62.57 port 55512 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:35:14,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.160.62.57', 'timestamp': 1670351714.5695684, 'message': 'Dec 6 20:35:14 hqnl0246134 sshd[252266]: Disconnected from invalid user user 122.160.62.57 port 55512 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 20:35:16,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351716.5709925, 'message': 'Dec 6 20:35:14 hqnl0246134 sshd[252272]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.19.254.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 20:35:16,629] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351716.5713282, 'message': 'Dec 6 20:35:14 hqnl0246134 sshd[252272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.19.254.6 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 20:35:17,947] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:35:17,948] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:35:17,955] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:35:17,966] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 20:35:18,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351718.5736182, 'message': 'Dec 6 20:35:16 hqnl0246134 sshd[252272]: Failed password for root from 210.19.254.6 port 41531 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 20:35:20,784] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:35:20,785] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:35:20,792] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:35:20,803] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
WARNING [2022-12-06 20:35:48,736] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:35:48,738] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:35:50,651] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351750.619424, 'message': 'Dec 6 20:35:49 hqnl0246134 sshd[252299]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 20:35:50,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351750.6212473, 'message': 'Dec 6 20:35:49 hqnl0246134 sshd[252299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1272 seconds
INFO [2022-12-06 20:35:52,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351752.6180284, 'message': 'Dec 6 20:35:51 hqnl0246134 sshd[252299]: Failed password for root from 61.177.173.18 port 63080 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 20:35:52,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351752.6182437, 'message': 'Dec 6 20:35:52 hqnl0246134 sshd[252299]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:35:54,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351754.6226852, 'message': 'Dec 6 20:35:54 hqnl0246134 sshd[252299]: Failed password for root from 61.177.173.18 port 63080 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:35:56,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351756.6252496, 'message': 'Dec 6 20:35:56 hqnl0246134 sshd[252299]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 20:35:58,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351758.6308112, 'message': 'Dec 6 20:35:58 hqnl0246134 sshd[252299]: Failed password for root from 61.177.173.18 port 63080 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 20:36:03,583] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:36:03,584] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:36:03,591] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:36:03,602] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
WARNING [2022-12-06 20:36:10,151] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:36:10,173] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0297 seconds
INFO [2022-12-06 20:36:17,750] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:36:17,751] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:36:17,758] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:36:17,771] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 20:36:20,447] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:36:20,449] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:36:20,458] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:36:20,469] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 20:36:38,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351798.667857, 'message': 'Dec 6 20:36:37 hqnl0246134 sshd[252350]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0459 seconds
INFO [2022-12-06 20:36:38,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351798.668891, 'message': 'Dec 6 20:36:37 hqnl0246134 sshd[252350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 20:36:40,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351800.6662314, 'message': 'Dec 6 20:36:38 hqnl0246134 sshd[252350]: Failed password for root from 61.177.173.18 port 28978 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0696 seconds
INFO [2022-12-06 20:36:40,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351800.666462, 'message': 'Dec 6 20:36:39 hqnl0246134 sshd[252350]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 20:36:42,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351802.6689866, 'message': 'Dec 6 20:36:41 hqnl0246134 sshd[252350]: Failed password for root from 61.177.173.18 port 28978 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 20:36:42,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351802.6693158, 'message': 'Dec 6 20:36:41 hqnl0246134 sshd[252350]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:36:44,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351804.6715872, 'message': 'Dec 6 20:36:43 hqnl0246134 sshd[252350]: Failed password for root from 61.177.173.18 port 28978 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
WARNING [2022-12-06 20:36:48,742] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:36:48,743] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 20:37:10,161] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:37:10,182] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0285 seconds
INFO [2022-12-06 20:37:17,808] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:37:17,809] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:37:17,816] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:37:17,827] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 20:37:20,442] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:37:20,443] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:37:20,454] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:37:20,473] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0292 seconds
INFO [2022-12-06 20:37:22,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '118.174.45.29', 'timestamp': 1670351842.710814, 'message': 'Dec 6 20:37:20 hqnl0246134 sshd[252413]: pam_imunify(sshd:auth): [IM360_RBL] The IP 118.174.45.29 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:37:22,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '118.174.45.29', 'timestamp': 1670351842.7110286, 'message': 'Dec 6 20:37:20 hqnl0246134 sshd[252413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1518 seconds
INFO [2022-12-06 20:37:24,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '118.174.45.29', 'timestamp': 1670351844.7128236, 'message': 'Dec 6 20:37:23 hqnl0246134 sshd[252413]: Failed password for root from 118.174.45.29 port 33310 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 20:37:26,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351846.7175426, 'message': 'Dec 6 20:37:26 hqnl0246134 sshd[252419]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 20:37:26,752] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.123.93', 'timestamp': 1670351846.7178605, 'message': 'Dec 6 20:37:26 hqnl0246134 sshd[252421]: Invalid user elk from 128.199.123.93 port 48876', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 20:37:26,777] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351846.717734, 'message': 'Dec 6 20:37:26 hqnl0246134 sshd[252419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 20:37:27,781] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:37:27,782] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:37:27,789] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:37:27,802] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 20:37:28,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.123.93', 'timestamp': 1670351848.7213435, 'message': 'Dec 6 20:37:26 hqnl0246134 sshd[252421]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.123.93 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 20:37:28,758] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351848.7217062, 'message': 'Dec 6 20:37:27 hqnl0246134 sshd[252419]: Failed password for root from 61.177.173.18 port 61207 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 20:37:28,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.123.93', 'timestamp': 1670351848.721528, 'message': 'Dec 6 20:37:26 hqnl0246134 sshd[252421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.93 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 20:37:28,792] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351848.7218106, 'message': 'Dec 6 20:37:28 hqnl0246134 sshd[252419]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 20:37:28,809] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.123.93', 'timestamp': 1670351848.7219267, 'message': 'Dec 6 20:37:28 hqnl0246134 sshd[252421]: Failed password for invalid user elk from 128.199.123.93 port 48876 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:37:30,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.123.93', 'timestamp': 1670351850.7250676, 'message': 'Dec 6 20:37:30 hqnl0246134 sshd[252421]: Disconnected from invalid user elk 128.199.123.93 port 48876 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 20:37:32,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351852.7278013, 'message': 'Dec 6 20:37:31 hqnl0246134 sshd[252419]: Failed password for root from 61.177.173.18 port 61207 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 20:37:34,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351854.7308164, 'message': 'Dec 6 20:37:32 hqnl0246134 sshd[252419]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 20:37:36,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351856.7329235, 'message': 'Dec 6 20:37:35 hqnl0246134 sshd[252419]: Failed password for root from 61.177.173.18 port 61207 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
WARNING [2022-12-06 20:37:48,745] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:37:48,747] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:38:06,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351886.789571, 'message': 'Dec 6 20:38:05 hqnl0246134 sshd[252454]: Invalid user admin from 210.19.254.6 port 34020', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 20:38:06,836] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351886.7900321, 'message': 'Dec 6 20:38:05 hqnl0246134 sshd[252454]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.19.254.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 20:38:06,855] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351886.7902527, 'message': 'Dec 6 20:38:05 hqnl0246134 sshd[252454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.19.254.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:38:08,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351888.790043, 'message': 'Dec 6 20:38:08 hqnl0246134 sshd[252454]: Failed password for invalid user admin from 210.19.254.6 port 34020 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0336 seconds
WARNING [2022-12-06 20:38:10,164] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:38:10,194] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0389 seconds
INFO [2022-12-06 20:38:10,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670351890.7915144, 'message': 'Dec 6 20:38:09 hqnl0246134 sshd[252454]: Disconnected from invalid user admin 210.19.254.6 port 34020 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 20:38:14,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351894.7956538, 'message': 'Dec 6 20:38:14 hqnl0246134 sshd[252468]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 20:38:14,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351894.7960286, 'message': 'Dec 6 20:38:14 hqnl0246134 sshd[252468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:38:18,173] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:38:18,174] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:38:18,185] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:38:18,197] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0226 seconds
INFO [2022-12-06 20:38:18,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351898.7978306, 'message': 'Dec 6 20:38:16 hqnl0246134 sshd[252468]: Failed password for root from 61.177.173.18 port 32733 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 20:38:18,836] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351898.7980018, 'message': 'Dec 6 20:38:18 hqnl0246134 sshd[252468]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:38:20,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351900.7990665, 'message': 'Dec 6 20:38:20 hqnl0246134 sshd[252468]: Failed password for root from 61.177.173.18 port 32733 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 20:38:20,952] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:38:20,952] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:38:20,964] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:38:20,982] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0283 seconds
INFO [2022-12-06 20:38:22,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351902.8031297, 'message': 'Dec 6 20:38:20 hqnl0246134 sshd[252468]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 20:38:24,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351904.8077066, 'message': 'Dec 6 20:38:22 hqnl0246134 sshd[252468]: Failed password for root from 61.177.173.18 port 32733 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 20:38:44,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.200', 'timestamp': 1670351924.8393323, 'message': 'Dec 6 20:38:43 hqnl0246134 sshd[252501]: Invalid user dev from 103.187.146.200 port 53222', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 20:38:44,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.187.146.200', 'timestamp': 1670351924.8401716, 'message': 'Dec 6 20:38:44 hqnl0246134 sshd[252501]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.187.146.200 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 20:38:44,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.187.146.200', 'timestamp': 1670351924.8403912, 'message': 'Dec 6 20:38:44 hqnl0246134 sshd[252501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.187.146.200 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 20:38:46,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.200', 'timestamp': 1670351926.8382475, 'message': 'Dec 6 20:38:46 hqnl0246134 sshd[252501]: Failed password for invalid user dev from 103.187.146.200 port 53222 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 20:38:46,876] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.200', 'timestamp': 1670351926.8384836, 'message': 'Dec 6 20:38:46 hqnl0246134 sshd[252501]: Disconnected from invalid user dev 103.187.146.200 port 53222 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 20:38:48,751] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:38:48,752] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:38:49,406] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:38:49,406] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:38:49,414] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:38:49,426] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 20:39:04,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351944.8588414, 'message': 'Dec 6 20:39:03 hqnl0246134 sshd[252648]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 20:39:04,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351944.8593423, 'message': 'Dec 6 20:39:03 hqnl0246134 sshd[252648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:39:06,888] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351946.8619673, 'message': 'Dec 6 20:39:05 hqnl0246134 sshd[252648]: Failed password for root from 61.177.173.18 port 10567 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 20:39:08,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351948.865278, 'message': 'Dec 6 20:39:07 hqnl0246134 sshd[252648]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0269 seconds
WARNING [2022-12-06 20:39:10,168] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:39:10,188] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0276 seconds
INFO [2022-12-06 20:39:10,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351950.8693745, 'message': 'Dec 6 20:39:09 hqnl0246134 sshd[252648]: Failed password for root from 61.177.173.18 port 10567 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 20:39:10,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351950.869565, 'message': 'Dec 6 20:39:09 hqnl0246134 sshd[252648]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 20:39:12,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351952.8743052, 'message': 'Dec 6 20:39:11 hqnl0246134 sshd[252648]: Failed password for root from 61.177.173.18 port 10567 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 20:39:17,795] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:39:17,795] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:39:17,803] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:39:17,814] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 20:39:20,487] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:39:20,487] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:39:20,494] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:39:20,505] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 20:39:46,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.138.7.117', 'timestamp': 1670351986.9476523, 'message': 'Dec 6 20:39:46 hqnl0246134 sshd[252682]: Invalid user el from 168.138.7.117 port 36362', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 20:39:46,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.138.7.117', 'timestamp': 1670351986.9485269, 'message': 'Dec 6 20:39:46 hqnl0246134 sshd[252682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.7.117 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 20:39:48,756] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:39:48,757] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:39:50,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.138.7.117', 'timestamp': 1670351990.9572868, 'message': 'Dec 6 20:39:48 hqnl0246134 sshd[252682]: Failed password for invalid user el from 168.138.7.117 port 36362 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 20:39:50,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351990.9575741, 'message': 'Dec 6 20:39:49 hqnl0246134 sshd[252686]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 20:39:51,013] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.138.7.117', 'timestamp': 1670351990.9585493, 'message': 'Dec 6 20:39:50 hqnl0246134 sshd[252682]: Disconnected from invalid user el 168.138.7.117 port 36362 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 20:39:51,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351990.958431, 'message': 'Dec 6 20:39:49 hqnl0246134 sshd[252686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 20:39:52,990] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351992.959814, 'message': 'Dec 6 20:39:52 hqnl0246134 sshd[252686]: Failed password for root from 61.177.173.18 port 32622 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 20:39:54,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351994.9625585, 'message': 'Dec 6 20:39:54 hqnl0246134 sshd[252686]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 20:39:56,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351996.9652324, 'message': 'Dec 6 20:39:55 hqnl0246134 sshd[252686]: Failed password for root from 61.177.173.18 port 32622 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 20:39:57,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351996.9654357, 'message': 'Dec 6 20:39:56 hqnl0246134 sshd[252686]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:39:58,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670351998.9693718, 'message': 'Dec 6 20:39:58 hqnl0246134 sshd[252686]: Failed password for root from 61.177.173.18 port 32622 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:40:01,211] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 20:40:01,290] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 20:40:01,291] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 20:40:01,291] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 20:40:01,291] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 20:40:01,292] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 20:40:01,319] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 20:40:01,358] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0658 seconds
WARNING [2022-12-06 20:40:01,370] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 20:40:01,375] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:40:01,410] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0618 seconds
INFO [2022-12-06 20:40:01,413] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0586 seconds
INFO [2022-12-06 20:40:07,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352007.0003645, 'message': 'Dec 6 20:40:05 hqnl0246134 sshd[252708]: Invalid user admin from 210.19.254.6 port 49686', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 20:40:07,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352007.0008843, 'message': 'Dec 6 20:40:05 hqnl0246134 sshd[252708]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.19.254.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:40:07,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352007.001097, 'message': 'Dec 6 20:40:05 hqnl0246134 sshd[252708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.19.254.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:40:07,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352007.001316, 'message': 'Dec 6 20:40:06 hqnl0246134 sshd[252708]: Failed password for invalid user admin from 210.19.254.6 port 49686 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 20:40:09,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352009.0021806, 'message': 'Dec 6 20:40:07 hqnl0246134 sshd[252708]: Disconnected from invalid user admin 210.19.254.6 port 49686 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 20:40:10,170] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:40:10,191] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0278 seconds
INFO [2022-12-06 20:40:17,793] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:40:17,793] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:40:17,800] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:40:17,811] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-06 20:40:20,421] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:40:20,421] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:40:20,429] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:40:20,440] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 20:40:37,088] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352037.0660024, 'message': 'Dec 6 20:40:36 hqnl0246134 sshd[252743]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 20:40:37,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352037.0663726, 'message': 'Dec 6 20:40:36 hqnl0246134 sshd[252743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:40:39,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352039.0683246, 'message': 'Dec 6 20:40:38 hqnl0246134 sshd[252743]: Failed password for root from 61.177.173.18 port 59209 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 20:40:39,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352039.068688, 'message': 'Dec 6 20:40:39 hqnl0246134 sshd[252743]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 20:40:39,428] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 20:40:39,428] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 20:40:39,429] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 20:40:41,101] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352041.0675173, 'message': 'Dec 6 20:40:40 hqnl0246134 sshd[252776]: pam_imunify(sshd:auth): [IM360_RBL] The IP 193.227.16.23 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 20:40:41,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352041.068042, 'message': 'Dec 6 20:40:40 hqnl0246134 sshd[252743]: Failed password for root from 61.177.173.18 port 59209 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 20:40:41,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352041.0678935, 'message': 'Dec 6 20:40:40 hqnl0246134 sshd[252776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.227.16.23 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 20:40:43,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352043.0698235, 'message': 'Dec 6 20:40:41 hqnl0246134 sshd[252743]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0505 seconds
INFO [2022-12-06 20:40:43,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352043.070253, 'message': 'Dec 6 20:40:42 hqnl0246134 sshd[252776]: Failed password for root from 193.227.16.23 port 42278 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0505 seconds
INFO [2022-12-06 20:40:43,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352043.0704412, 'message': 'Dec 6 20:40:42 hqnl0246134 sshd[252743]: Failed password for root from 61.177.173.18 port 59209 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 20:40:46,243] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:40:46,243] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:40:46,252] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:40:46,265] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
WARNING [2022-12-06 20:40:48,760] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:40:48,761] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:40:57,129] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.246.237.179', 'timestamp': 1670352057.1057127, 'message': 'Dec 6 20:40:55 hqnl0246134 sshd[252785]: Invalid user pedro from 115.246.237.179 port 41068', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 20:40:57,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.246.237.179', 'timestamp': 1670352057.1060715, 'message': 'Dec 6 20:40:55 hqnl0246134 sshd[252785]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.246.237.179 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:40:57,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.246.237.179', 'timestamp': 1670352057.1062584, 'message': 'Dec 6 20:40:55 hqnl0246134 sshd[252785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.246.237.179 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:40:59,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.246.237.179', 'timestamp': 1670352059.105847, 'message': 'Dec 6 20:40:57 hqnl0246134 sshd[252785]: Failed password for invalid user pedro from 115.246.237.179 port 41068 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:40:59,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.246.237.179', 'timestamp': 1670352059.1063008, 'message': 'Dec 6 20:40:59 hqnl0246134 sshd[252785]: Disconnected from invalid user pedro 115.246.237.179 port 41068 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 20:41:10,181] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:41:10,205] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0336 seconds
INFO [2022-12-06 20:41:15,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352075.1308782, 'message': 'Dec 6 20:41:13 hqnl0246134 sshd[252805]: pam_imunify(sshd:auth): [IM360_RBL] The IP 151.69.161.84 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 20:41:15,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352075.1313007, 'message': 'Dec 6 20:41:13 hqnl0246134 sshd[252805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.69.161.84 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 20:41:17,156] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352077.1332133, 'message': 'Dec 6 20:41:15 hqnl0246134 sshd[252805]: Failed password for root from 151.69.161.84 port 41900 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 20:41:17,964] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:41:17,965] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:41:17,972] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:41:17,983] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 20:41:20,905] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:41:20,905] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:41:20,913] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:41:20,934] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0283 seconds
INFO [2022-12-06 20:41:25,159] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352085.141098, 'message': 'Dec 6 20:41:25 hqnl0246134 sshd[252822]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:41:25,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352085.1488907, 'message': 'Dec 6 20:41:25 hqnl0246134 sshd[252822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 20:41:27,161] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352087.1423173, 'message': 'Dec 6 20:41:27 hqnl0246134 sshd[252822]: Failed password for root from 61.177.173.18 port 45453 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 20:41:29,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352089.144823, 'message': 'Dec 6 20:41:27 hqnl0246134 sshd[252822]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 20:41:31,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352091.1488895, 'message': 'Dec 6 20:41:29 hqnl0246134 sshd[252822]: Failed password for root from 61.177.173.18 port 45453 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 20:41:31,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352091.1494744, 'message': 'Dec 6 20:41:30 hqnl0246134 sshd[252826]: Invalid user user from 168.181.148.162 port 60858', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 20:41:31,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352091.1492991, 'message': 'Dec 6 20:41:29 hqnl0246134 sshd[252822]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 20:41:31,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352091.1495829, 'message': 'Dec 6 20:41:30 hqnl0246134 sshd[252826]: pam_imunify(sshd:auth): [IM360_RBL] The IP 168.181.148.162 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 20:41:31,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352091.149862, 'message': 'Dec 6 20:41:30 hqnl0246134 sshd[252822]: Failed password for root from 61.177.173.18 port 45453 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 20:41:31,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352091.1497164, 'message': 'Dec 6 20:41:30 hqnl0246134 sshd[252826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.181.148.162 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 20:41:33,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352093.1513045, 'message': 'Dec 6 20:41:32 hqnl0246134 sshd[252826]: Failed password for invalid user user from 168.181.148.162 port 60858 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 20:41:33,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352093.1515973, 'message': 'Dec 6 20:41:32 hqnl0246134 sshd[252826]: Disconnected from invalid user user 168.181.148.162 port 60858 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0305 seconds
WARNING [2022-12-06 20:41:48,766] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:41:48,768] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 20:41:53,981] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 20:41:59,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.183.75.88', 'timestamp': 1670352119.2057579, 'message': 'Dec 6 20:41:57 hqnl0246134 sshd[252869]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.183.75.88 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 20:41:59,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.183.75.88', 'timestamp': 1670352119.2063925, 'message': 'Dec 6 20:41:57 hqnl0246134 sshd[252869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.183.75.88 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:42:01,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.183.75.88', 'timestamp': 1670352121.2063012, 'message': 'Dec 6 20:41:59 hqnl0246134 sshd[252869]: Failed password for root from 103.183.75.88 port 50498 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0482 seconds
INFO [2022-12-06 20:42:01,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352121.2064722, 'message': 'Dec 6 20:42:00 hqnl0246134 sshd[252879]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.19.254.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0485 seconds
INFO [2022-12-06 20:42:01,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352121.2065837, 'message': 'Dec 6 20:42:00 hqnl0246134 sshd[252879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.19.254.6 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 20:42:03,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352123.2099304, 'message': 'Dec 6 20:42:01 hqnl0246134 sshd[252879]: Failed password for root from 210.19.254.6 port 36836 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 20:42:04,502] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:42:04,503] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:42:04,513] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:42:04,530] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0257 seconds
INFO [2022-12-06 20:42:07,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352127.2141035, 'message': 'Dec 6 20:42:06 hqnl0246134 sshd[252895]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.60.92.170 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 20:42:07,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352127.2146015, 'message': 'Dec 6 20:42:06 hqnl0246134 sshd[252895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.92.170 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 20:42:09,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352129.2145152, 'message': 'Dec 6 20:42:07 hqnl0246134 sshd[252895]: Failed password for root from 200.60.92.170 port 54018 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-06 20:42:10,183] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:42:10,213] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0381 seconds
INFO [2022-12-06 20:42:11,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352131.2176592, 'message': 'Dec 6 20:42:10 hqnl0246134 sshd[252905]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 20:42:11,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352131.2178392, 'message': 'Dec 6 20:42:10 hqnl0246134 sshd[252905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 20:42:13,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352133.221406, 'message': 'Dec 6 20:42:12 hqnl0246134 sshd[252905]: Failed password for root from 61.177.173.18 port 55172 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 20:42:15,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352135.2217805, 'message': 'Dec 6 20:42:14 hqnl0246134 sshd[252905]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 20:42:17,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352137.2244065, 'message': 'Dec 6 20:42:16 hqnl0246134 sshd[252905]: Failed password for root from 61.177.173.18 port 55172 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:42:17,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352137.2246141, 'message': 'Dec 6 20:42:17 hqnl0246134 sshd[252905]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 20:42:17,844] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:42:17,844] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:42:17,852] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:42:17,862] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 20:42:19,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352139.2257307, 'message': 'Dec 6 20:42:18 hqnl0246134 sshd[252905]: Failed password for root from 61.177.173.18 port 55172 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 20:42:20,769] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:42:20,770] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:42:20,777] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:42:20,788] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
WARNING [2022-12-06 20:42:48,771] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:42:48,772] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:42:59,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352179.2751317, 'message': 'Dec 6 20:42:58 hqnl0246134 sshd[252935]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 20:42:59,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352179.2757363, 'message': 'Dec 6 20:42:58 hqnl0246134 sshd[252935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 20:43:03,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352183.2779155, 'message': 'Dec 6 20:43:01 hqnl0246134 sshd[252935]: Failed password for root from 61.177.173.18 port 26374 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:43:03,314] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352183.2781, 'message': 'Dec 6 20:43:03 hqnl0246134 sshd[252935]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:43:07,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352187.2818673, 'message': 'Dec 6 20:43:05 hqnl0246134 sshd[252935]: Failed password for root from 61.177.173.18 port 26374 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 20:43:09,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352189.2856305, 'message': 'Dec 6 20:43:07 hqnl0246134 sshd[252935]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
WARNING [2022-12-06 20:43:10,190] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:43:10,222] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0428 seconds
INFO [2022-12-06 20:43:11,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352191.288091, 'message': 'Dec 6 20:43:09 hqnl0246134 sshd[252935]: Failed password for root from 61.177.173.18 port 26374 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 20:43:12,335] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:43:12,336] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:43:12,343] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:43:12,356] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 20:43:13,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352193.2918344, 'message': 'Dec 6 20:43:12 hqnl0246134 sshd[252956]: Invalid user elk from 110.93.245.190 port 37504', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 20:43:13,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352193.2920702, 'message': 'Dec 6 20:43:12 hqnl0246134 sshd[252956]: pam_imunify(sshd:auth): [IM360_RBL] The IP 110.93.245.190 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 20:43:13,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352193.2923129, 'message': 'Dec 6 20:43:12 hqnl0246134 sshd[252956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.93.245.190 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:43:15,321] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352195.29421, 'message': 'Dec 6 20:43:14 hqnl0246134 sshd[252956]: Failed password for invalid user elk from 110.93.245.190 port 37504 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 20:43:15,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352195.294446, 'message': 'Dec 6 20:43:14 hqnl0246134 sshd[252956]: Disconnected from invalid user elk 110.93.245.190 port 37504 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:43:17,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352197.297599, 'message': 'Dec 6 20:43:16 hqnl0246134 sshd[252961]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.123.93 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 20:43:17,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352197.2978222, 'message': 'Dec 6 20:43:16 hqnl0246134 sshd[252961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.93 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 20:43:17,840] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:43:17,841] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:43:17,851] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:43:17,870] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0284 seconds
INFO [2022-12-06 20:43:19,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352199.2985878, 'message': 'Dec 6 20:43:18 hqnl0246134 sshd[252961]: Failed password for root from 128.199.123.93 port 46344 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 20:43:20,454] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:43:20,455] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:43:20,462] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:43:20,474] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 20:43:47,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352227.3293512, 'message': 'Dec 6 20:43:47 hqnl0246134 sshd[252983]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 20:43:47,372] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352227.329871, 'message': 'Dec 6 20:43:47 hqnl0246134 sshd[252983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 20:43:48,774] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:43:48,775] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:43:51,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352231.3329697, 'message': 'Dec 6 20:43:49 hqnl0246134 sshd[252983]: Failed password for root from 61.177.173.18 port 52005 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 20:43:53,359] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352233.3335137, 'message': 'Dec 6 20:43:51 hqnl0246134 sshd[252983]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 20:43:55,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352235.3360305, 'message': 'Dec 6 20:43:53 hqnl0246134 sshd[252983]: Failed password for root from 61.177.173.18 port 52005 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 20:43:57,372] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352237.3406756, 'message': 'Dec 6 20:43:55 hqnl0246134 sshd[252983]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 20:43:59,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352239.343716, 'message': 'Dec 6 20:43:57 hqnl0246134 sshd[252983]: Failed password for root from 61.177.173.18 port 52005 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 20:44:07,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352247.3519785, 'message': 'Dec 6 20:44:05 hqnl0246134 sshd[253024]: pam_imunify(sshd:auth): [IM360_RBL] The IP 151.69.161.84 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 20:44:07,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352247.3523917, 'message': 'Dec 6 20:44:05 hqnl0246134 sshd[253024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.69.161.84 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 20:44:09,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352249.3536181, 'message': 'Dec 6 20:44:07 hqnl0246134 sshd[253024]: Failed password for root from 151.69.161.84 port 60388 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-06 20:44:10,201] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:44:10,241] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0563 seconds
INFO [2022-12-06 20:44:18,074] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:44:18,075] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:44:18,083] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:44:18,094] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 20:44:19,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352259.3651109, 'message': 'Dec 6 20:44:18 hqnl0246134 sshd[253039]: Invalid user Justin from 168.181.148.162 port 43222', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 20:44:19,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352259.3654752, 'message': 'Dec 6 20:44:18 hqnl0246134 sshd[253039]: pam_imunify(sshd:auth): [IM360_RBL] The IP 168.181.148.162 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:44:19,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352259.365624, 'message': 'Dec 6 20:44:18 hqnl0246134 sshd[253039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.181.148.162 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 20:44:20,800] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:44:20,801] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:44:20,817] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:44:20,841] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0386 seconds
INFO [2022-12-06 20:44:21,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352261.3680167, 'message': 'Dec 6 20:44:20 hqnl0246134 sshd[253039]: Failed password for invalid user Justin from 168.181.148.162 port 43222 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:44:21,636] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 20:44:21,708] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 20:44:21,708] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 20:44:21,708] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 20:44:21,709] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 20:44:21,709] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 20:44:21,723] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 20:44:21,739] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0297 seconds
WARNING [2022-12-06 20:44:21,745] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 20:44:21,748] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:44:21,764] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0302 seconds
INFO [2022-12-06 20:44:21,765] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0280 seconds
INFO [2022-12-06 20:44:23,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352263.3703134, 'message': 'Dec 6 20:44:21 hqnl0246134 sshd[253039]: Disconnected from invalid user Justin 168.181.148.162 port 43222 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:44:24,594] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:44:24,595] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:44:24,606] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:44:24,619] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0224 seconds
INFO [2022-12-06 20:44:37,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352277.3835266, 'message': 'Dec 6 20:44:36 hqnl0246134 sshd[253058]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 20:44:37,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352277.385028, 'message': 'Dec 6 20:44:36 hqnl0246134 sshd[253058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 20:44:39,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352279.3837037, 'message': 'Dec 6 20:44:38 hqnl0246134 sshd[253058]: Failed password for root from 61.177.173.18 port 31059 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 20:44:39,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352279.383972, 'message': 'Dec 6 20:44:38 hqnl0246134 sshd[253058]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:44:41,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352281.3859684, 'message': 'Dec 6 20:44:40 hqnl0246134 sshd[253058]: Failed password for root from 61.177.173.18 port 31059 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 20:44:41,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352281.3862753, 'message': 'Dec 6 20:44:40 hqnl0246134 sshd[253058]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 20:44:45,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352285.3910587, 'message': 'Dec 6 20:44:43 hqnl0246134 sshd[253058]: Failed password for root from 61.177.173.18 port 31059 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 20:44:48,778] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:44:48,779] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:44:50,633] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:44:50,633] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:44:50,641] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:44:50,654] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 20:44:52,379] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 20:44:52,379] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 20:44:52,380] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 20:45:07,455] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352307.4199407, 'message': 'Dec 6 20:45:05 hqnl0246134 sshd[253112]: Invalid user elk from 72.165.240.194 port 35010', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 20:45:07,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352307.420519, 'message': 'Dec 6 20:45:05 hqnl0246134 sshd[253112]: pam_imunify(sshd:auth): [IM360_RBL] The IP 72.165.240.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 20:45:07,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352307.42079, 'message': 'Dec 6 20:45:05 hqnl0246134 sshd[253112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.165.240.194 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 20:45:09,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352309.4204671, 'message': 'Dec 6 20:45:08 hqnl0246134 sshd[253112]: Failed password for invalid user elk from 72.165.240.194 port 35010 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 20:45:09,462] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352309.4206882, 'message': 'Dec 6 20:45:09 hqnl0246134 sshd[253112]: Disconnected from invalid user elk 72.165.240.194 port 35010 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 20:45:10,196] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:45:10,215] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0262 seconds
INFO [2022-12-06 20:45:15,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352315.4317071, 'message': 'Dec 6 20:45:14 hqnl0246134 sshd[253130]: Invalid user admin from 200.60.92.170 port 43242', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 20:45:15,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352315.4319477, 'message': 'Dec 6 20:45:14 hqnl0246134 sshd[253130]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.60.92.170 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:45:15,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352315.432103, 'message': 'Dec 6 20:45:14 hqnl0246134 sshd[253130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.92.170 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:45:17,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352317.4344392, 'message': 'Dec 6 20:45:16 hqnl0246134 sshd[253130]: Failed password for invalid user admin from 200.60.92.170 port 43242 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 20:45:17,468] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '118.174.45.29', 'timestamp': 1670352317.434787, 'message': 'Dec 6 20:45:17 hqnl0246134 sshd[253135]: pam_imunify(sshd:auth): [IM360_RBL] The IP 118.174.45.29 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 20:45:17,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352317.4346547, 'message': 'Dec 6 20:45:16 hqnl0246134 sshd[253130]: Disconnected from invalid user admin 200.60.92.170 port 43242 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 20:45:17,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '118.174.45.29', 'timestamp': 1670352317.43493, 'message': 'Dec 6 20:45:17 hqnl0246134 sshd[253135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 20:45:17,873] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:45:17,874] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:45:17,882] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:45:17,894] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 20:45:19,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '118.174.45.29', 'timestamp': 1670352319.434325, 'message': 'Dec 6 20:45:19 hqnl0246134 sshd[253135]: Failed password for root from 118.174.45.29 port 60292 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 20:45:20,610] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:45:20,610] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:45:20,617] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:45:20,628] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 20:45:25,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352325.4408822, 'message': 'Dec 6 20:45:23 hqnl0246134 sshd[253152]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 20:45:25,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352325.4413655, 'message': 'Dec 6 20:45:23 hqnl0246134 sshd[253152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:45:25,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352325.4414945, 'message': 'Dec 6 20:45:25 hqnl0246134 sshd[253152]: Failed password for root from 61.177.173.18 port 49322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:45:27,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352327.4431832, 'message': 'Dec 6 20:45:25 hqnl0246134 sshd[253152]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 20:45:27,578] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352327.4435966, 'message': 'Dec 6 20:45:27 hqnl0246134 sshd[253152]: Failed password for root from 61.177.173.18 port 49322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1133 seconds
INFO [2022-12-06 20:45:29,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352329.446857, 'message': 'Dec 6 20:45:28 hqnl0246134 sshd[253152]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 20:45:31,472] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352331.4516401, 'message': 'Dec 6 20:45:30 hqnl0246134 sshd[253152]: Failed password for root from 61.177.173.18 port 49322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 20:45:48,781] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:45:48,782] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:46:05,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352365.5013354, 'message': 'Dec 6 20:46:04 hqnl0246134 sshd[253186]: Invalid user user14 from 128.199.123.93 port 57352', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 20:46:05,548] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352365.5017657, 'message': 'Dec 6 20:46:04 hqnl0246134 sshd[253186]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.123.93 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 20:46:05,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352365.5019364, 'message': 'Dec 6 20:46:04 hqnl0246134 sshd[253186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.93 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:46:07,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352367.5022924, 'message': 'Dec 6 20:46:07 hqnl0246134 sshd[253186]: Failed password for invalid user user14 from 128.199.123.93 port 57352 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 20:46:07,545] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352367.502621, 'message': 'Dec 6 20:46:07 hqnl0246134 sshd[253186]: Disconnected from invalid user user14 128.199.123.93 port 57352 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-06 20:46:10,200] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:46:10,227] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0352 seconds
INFO [2022-12-06 20:46:10,332] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:46:10,332] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:46:10,341] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:46:10,353] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-06 20:46:11,542] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352371.5091012, 'message': 'Dec 6 20:46:10 hqnl0246134 sshd[253199]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 20:46:11,571] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352371.5094047, 'message': 'Dec 6 20:46:10 hqnl0246134 sshd[253199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 20:46:13,530] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352373.5115826, 'message': 'Dec 6 20:46:13 hqnl0246134 sshd[253199]: Failed password for root from 61.177.173.18 port 17540 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:46:15,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '66.43.250.3', 'timestamp': 1670352375.5143168, 'message': 'Dec 6 20:46:13 hqnl0246134 sshd[253175]: Invalid user michael from 66.43.250.3 port 60441', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 20:46:15,552] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352375.521187, 'message': 'Dec 6 20:46:15 hqnl0246134 sshd[253199]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 20:46:15,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '66.43.250.3', 'timestamp': 1670352375.5146003, 'message': 'Dec 6 20:46:14 hqnl0246134 sshd[253175]: pam_imunify(sshd:auth): [IM360_RBL] The IP 66.43.250.3 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 20:46:15,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '66.43.250.3', 'timestamp': 1670352375.5210469, 'message': 'Dec 6 20:46:14 hqnl0246134 sshd[253175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.43.250.3 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 20:46:17,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '66.43.250.3', 'timestamp': 1670352377.517874, 'message': 'Dec 6 20:46:16 hqnl0246134 sshd[253175]: Failed password for invalid user michael from 66.43.250.3 port 60441 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 20:46:17,831] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:46:17,832] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:46:17,839] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:46:17,853] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 20:46:19,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '66.43.250.3', 'timestamp': 1670352379.5209334, 'message': 'Dec 6 20:46:17 hqnl0246134 sshd[253175]: Disconnected from invalid user michael 66.43.250.3 port 60441 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1002 seconds
INFO [2022-12-06 20:46:19,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352379.521332, 'message': 'Dec 6 20:46:17 hqnl0246134 sshd[253199]: Failed password for root from 61.177.173.18 port 17540 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1005 seconds
INFO [2022-12-06 20:46:20,888] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:46:20,888] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:46:20,896] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:46:20,908] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 20:46:21,546] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352381.5252976, 'message': 'Dec 6 20:46:19 hqnl0246134 sshd[253199]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 20:46:21,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352381.5255954, 'message': 'Dec 6 20:46:21 hqnl0246134 sshd[253199]: Failed password for root from 61.177.173.18 port 17540 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 20:46:31,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352391.5428605, 'message': 'Dec 6 20:46:31 hqnl0246134 sshd[253220]: Invalid user sysadmin from 110.93.245.190 port 59920', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 20:46:33,567] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352393.5455003, 'message': 'Dec 6 20:46:31 hqnl0246134 sshd[253220]: pam_imunify(sshd:auth): [IM360_RBL] The IP 110.93.245.190 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 20:46:33,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352393.5457563, 'message': 'Dec 6 20:46:31 hqnl0246134 sshd[253220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.93.245.190 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 20:46:33,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352393.5458872, 'message': 'Dec 6 20:46:33 hqnl0246134 sshd[253220]: Failed password for invalid user sysadmin from 110.93.245.190 port 59920 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 20:46:35,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352395.5486166, 'message': 'Dec 6 20:46:35 hqnl0246134 sshd[253220]: Disconnected from invalid user sysadmin 110.93.245.190 port 59920 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 20:46:45,595] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.104.25.215', 'timestamp': 1670352405.5700638, 'message': 'Dec 6 20:46:43 hqnl0246134 sshd[253230]: Invalid user cloud from 190.104.25.215 port 55700', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 20:46:45,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.104.25.215', 'timestamp': 1670352405.5704343, 'message': 'Dec 6 20:46:44 hqnl0246134 sshd[253230]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.104.25.215 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 20:46:45,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.104.25.215', 'timestamp': 1670352405.5705814, 'message': 'Dec 6 20:46:44 hqnl0246134 sshd[253230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.25.215 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:46:47,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.104.25.215', 'timestamp': 1670352407.5719867, 'message': 'Dec 6 20:46:45 hqnl0246134 sshd[253230]: Failed password for invalid user cloud from 190.104.25.215 port 55700 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
WARNING [2022-12-06 20:46:48,785] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:46:48,786] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:46:49,591] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '190.104.25.215', 'timestamp': 1670352409.5735407, 'message': 'Dec 6 20:46:47 hqnl0246134 sshd[253230]: Disconnected from invalid user cloud 190.104.25.215 port 55700 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:46:53,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352413.5840688, 'message': 'Dec 6 20:46:53 hqnl0246134 sshd[253234]: pam_imunify(sshd:auth): [IM360_RBL] The IP 151.69.161.84 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 20:46:53,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352413.5845256, 'message': 'Dec 6 20:46:53 hqnl0246134 sshd[253234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.69.161.84 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 20:46:55,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352415.5881145, 'message': 'Dec 6 20:46:55 hqnl0246134 sshd[253234]: Failed password for root from 151.69.161.84 port 49826 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 20:46:59,624] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352419.6003757, 'message': 'Dec 6 20:46:57 hqnl0246134 sshd[253236]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 20:46:59,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352419.6008244, 'message': 'Dec 6 20:46:57 hqnl0246134 sshd[253236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:47:01,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352421.6021094, 'message': 'Dec 6 20:46:59 hqnl0246134 sshd[253236]: Failed password for root from 61.177.173.18 port 45237 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 20:47:01,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352421.6023238, 'message': 'Dec 6 20:47:00 hqnl0246134 sshd[253236]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 20:47:03,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352423.6090245, 'message': 'Dec 6 20:47:01 hqnl0246134 sshd[253236]: Failed password for root from 61.177.173.18 port 45237 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 20:47:03,639] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352423.6092408, 'message': 'Dec 6 20:47:02 hqnl0246134 sshd[253246]: Invalid user ubuntu from 168.181.148.162 port 53818', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 20:47:03,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352423.6098025, 'message': 'Dec 6 20:47:02 hqnl0246134 sshd[253236]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 20:47:03,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352423.6093535, 'message': 'Dec 6 20:47:02 hqnl0246134 sshd[253246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 168.181.148.162 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 20:47:03,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352423.6096995, 'message': 'Dec 6 20:47:02 hqnl0246134 sshd[253246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.181.148.162 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 20:47:05,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352425.613501, 'message': 'Dec 6 20:47:04 hqnl0246134 sshd[253246]: Failed password for invalid user ubuntu from 168.181.148.162 port 53818 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 20:47:05,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352425.6137683, 'message': 'Dec 6 20:47:04 hqnl0246134 sshd[253236]: Failed password for root from 61.177.173.18 port 45237 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 20:47:05,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.181.148.162', 'timestamp': 1670352425.6139262, 'message': 'Dec 6 20:47:04 hqnl0246134 sshd[253246]: Disconnected from invalid user ubuntu 168.181.148.162 port 53818 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
WARNING [2022-12-06 20:47:10,215] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:47:10,267] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0692 seconds
INFO [2022-12-06 20:47:18,056] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:47:18,056] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:47:18,070] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:47:18,090] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0314 seconds
INFO [2022-12-06 20:47:21,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.200', 'timestamp': 1670352441.6324015, 'message': 'Dec 6 20:47:20 hqnl0246134 sshd[253284]: Invalid user ftp_test from 103.187.146.200 port 50948', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 20:47:21,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.187.146.200', 'timestamp': 1670352441.6326258, 'message': 'Dec 6 20:47:20 hqnl0246134 sshd[253284]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.187.146.200 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 20:47:21,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.187.146.200', 'timestamp': 1670352441.635133, 'message': 'Dec 6 20:47:20 hqnl0246134 sshd[253284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.187.146.200 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0387 seconds
INFO [2022-12-06 20:47:21,877] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:47:21,877] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:47:21,884] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:47:21,895] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 20:47:23,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.200', 'timestamp': 1670352443.6352985, 'message': 'Dec 6 20:47:22 hqnl0246134 sshd[253284]: Failed password for invalid user ftp_test from 103.187.146.200 port 50948 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:47:23,673] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.200', 'timestamp': 1670352443.6355958, 'message': 'Dec 6 20:47:22 hqnl0246134 sshd[253284]: Disconnected from invalid user ftp_test 103.187.146.200 port 50948 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:47:25,044] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:47:25,044] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:47:25,166] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:47:25,178] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1329 seconds
INFO [2022-12-06 20:47:41,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.83.28.210', 'timestamp': 1670352461.6551013, 'message': 'Dec 6 20:47:39 hqnl0246134 sshd[253265]: Invalid user mc from 186.83.28.210 port 33932', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 20:47:41,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.83.28.210', 'timestamp': 1670352461.65592, 'message': 'Dec 6 20:47:40 hqnl0246134 sshd[253265]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.83.28.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:47:41,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.83.28.210', 'timestamp': 1670352461.6562092, 'message': 'Dec 6 20:47:40 hqnl0246134 sshd[253265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.83.28.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 20:47:43,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.83.28.210', 'timestamp': 1670352463.6557937, 'message': 'Dec 6 20:47:42 hqnl0246134 sshd[253265]: Failed password for invalid user mc from 186.83.28.210 port 33932 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:47:45,676] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.83.28.210', 'timestamp': 1670352465.6577768, 'message': 'Dec 6 20:47:44 hqnl0246134 sshd[253265]: Disconnected from invalid user mc 186.83.28.210 port 33932 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:47:47,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352467.6604433, 'message': 'Dec 6 20:47:45 hqnl0246134 sshd[253304]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:47:47,698] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352467.6607592, 'message': 'Dec 6 20:47:45 hqnl0246134 sshd[253304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
WARNING [2022-12-06 20:47:48,789] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:47:48,790] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:47:49,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352469.6627338, 'message': 'Dec 6 20:47:48 hqnl0246134 sshd[253304]: Failed password for root from 61.177.173.18 port 29727 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:47:51,708] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352471.665066, 'message': 'Dec 6 20:47:50 hqnl0246134 sshd[253304]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0430 seconds
INFO [2022-12-06 20:47:53,688] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352473.668198, 'message': 'Dec 6 20:47:52 hqnl0246134 sshd[253304]: Failed password for root from 61.177.173.18 port 29727 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 20:47:55,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352475.6723845, 'message': 'Dec 6 20:47:54 hqnl0246134 sshd[253304]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 20:47:57,696] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352477.673594, 'message': 'Dec 6 20:47:56 hqnl0246134 sshd[253304]: Failed password for root from 61.177.173.18 port 29727 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 20:47:59,019] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 20:47:59,089] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 20:47:59,090] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 20:47:59,090] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 20:47:59,090] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 20:47:59,090] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 20:47:59,105] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 20:47:59,133] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0417 seconds
WARNING [2022-12-06 20:47:59,145] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 20:47:59,149] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:47:59,176] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0532 seconds
INFO [2022-12-06 20:47:59,178] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0495 seconds
INFO [2022-12-06 20:48:03,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352483.6857555, 'message': 'Dec 6 20:48:02 hqnl0246134 sshd[253334]: pam_imunify(sshd:auth): [IM360_RBL] The IP 72.165.240.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 20:48:03,724] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352483.6859512, 'message': 'Dec 6 20:48:02 hqnl0246134 sshd[253334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.165.240.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:48:05,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352485.6876209, 'message': 'Dec 6 20:48:04 hqnl0246134 sshd[253334]: Failed password for root from 72.165.240.194 port 43262 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0590 seconds
WARNING [2022-12-06 20:48:10,212] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:48:10,240] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0376 seconds
INFO [2022-12-06 20:48:17,848] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:48:17,848] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:48:17,856] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:48:17,868] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 20:48:20,638] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:48:20,639] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:48:20,674] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:48:20,694] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0473 seconds
INFO [2022-12-06 20:48:23,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352503.7103865, 'message': 'Dec 6 20:48:21 hqnl0246134 sshd[253372]: Invalid user admin from 200.60.92.170 port 60722', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0393 seconds
INFO [2022-12-06 20:48:23,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352503.710665, 'message': 'Dec 6 20:48:21 hqnl0246134 sshd[253372]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.60.92.170 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0395 seconds
INFO [2022-12-06 20:48:23,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352503.7108016, 'message': 'Dec 6 20:48:22 hqnl0246134 sshd[253372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.92.170 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0462 seconds
INFO [2022-12-06 20:48:25,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352505.7121172, 'message': 'Dec 6 20:48:24 hqnl0246134 sshd[253372]: Failed password for invalid user admin from 200.60.92.170 port 60722 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 20:48:27,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '200.60.92.170', 'timestamp': 1670352507.7152176, 'message': 'Dec 6 20:48:25 hqnl0246134 sshd[253372]: Disconnected from invalid user admin 200.60.92.170 port 60722 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 20:48:27,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '118.174.45.29', 'timestamp': 1670352507.7154422, 'message': 'Dec 6 20:48:27 hqnl0246134 sshd[253375]: Invalid user cloud from 118.174.45.29 port 48808', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 20:48:29,218] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 20:48:29,218] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 20:48:29,219] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 20:48:29,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '118.174.45.29', 'timestamp': 1670352509.7205062, 'message': 'Dec 6 20:48:27 hqnl0246134 sshd[253375]: pam_imunify(sshd:auth): [IM360_RBL] The IP 118.174.45.29 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:48:29,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '118.174.45.29', 'timestamp': 1670352509.7207854, 'message': 'Dec 6 20:48:27 hqnl0246134 sshd[253375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 20:48:31,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '118.174.45.29', 'timestamp': 1670352511.7220542, 'message': 'Dec 6 20:48:30 hqnl0246134 sshd[253375]: Failed password for invalid user cloud from 118.174.45.29 port 48808 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 20:48:31,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '118.174.45.29', 'timestamp': 1670352511.7222903, 'message': 'Dec 6 20:48:31 hqnl0246134 sshd[253375]: Disconnected from invalid user cloud 118.174.45.29 port 48808 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 20:48:33,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352513.7262979, 'message': 'Dec 6 20:48:32 hqnl0246134 sshd[253377]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:48:33,764] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352513.7265267, 'message': 'Dec 6 20:48:32 hqnl0246134 sshd[253377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 20:48:35,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352515.7285695, 'message': 'Dec 6 20:48:34 hqnl0246134 sshd[253377]: Failed password for root from 61.177.173.18 port 42416 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:48:37,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352517.7298462, 'message': 'Dec 6 20:48:36 hqnl0246134 sshd[253377]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 20:48:39,752] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352519.7335546, 'message': 'Dec 6 20:48:38 hqnl0246134 sshd[253377]: Failed password for root from 61.177.173.18 port 42416 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:48:39,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352519.7337651, 'message': 'Dec 6 20:48:38 hqnl0246134 sshd[253377]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 20:48:41,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352521.736989, 'message': 'Dec 6 20:48:40 hqnl0246134 sshd[253377]: Failed password for root from 61.177.173.18 port 42416 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 20:48:43,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352523.7408774, 'message': 'Dec 6 20:48:42 hqnl0246134 sshd[253389]: Invalid user sysadmin from 128.199.123.93 port 40126', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 20:48:43,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352523.7421348, 'message': 'Dec 6 20:48:42 hqnl0246134 sshd[253389]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.123.93 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 20:48:43,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352523.7423453, 'message': 'Dec 6 20:48:42 hqnl0246134 sshd[253389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.93 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 20:48:45,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352525.7419991, 'message': 'Dec 6 20:48:44 hqnl0246134 sshd[253389]: Failed password for invalid user sysadmin from 128.199.123.93 port 40126 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 20:48:45,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.123.93', 'timestamp': 1670352525.7422035, 'message': 'Dec 6 20:48:44 hqnl0246134 sshd[253389]: Disconnected from invalid user sysadmin 128.199.123.93 port 40126 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 20:48:46,708] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:48:46,709] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:48:46,718] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:48:46,730] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 20:48:47,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352527.7448175, 'message': 'Dec 6 20:48:45 hqnl0246134 sshd[253394]: Invalid user ms from 193.227.16.23 port 55328', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:48:47,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352527.7450063, 'message': 'Dec 6 20:48:45 hqnl0246134 sshd[253394]: pam_imunify(sshd:auth): [IM360_RBL] The IP 193.227.16.23 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:48:47,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352527.7451198, 'message': 'Dec 6 20:48:45 hqnl0246134 sshd[253394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.227.16.23 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
WARNING [2022-12-06 20:48:48,794] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:48:48,794] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:48:49,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352529.747871, 'message': 'Dec 6 20:48:47 hqnl0246134 sshd[253394]: Failed password for invalid user ms from 193.227.16.23 port 55328 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:48:49,783] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352529.7480693, 'message': 'Dec 6 20:48:48 hqnl0246134 sshd[253394]: Disconnected from invalid user ms 193.227.16.23 port 55328 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
WARNING [2022-12-06 20:49:10,216] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:49:10,241] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0347 seconds
INFO [2022-12-06 20:49:18,289] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:49:18,290] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:49:18,298] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:49:18,310] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 20:49:21,086] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:49:21,086] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:49:21,095] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:49:21,107] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 20:49:21,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352561.7803283, 'message': 'Dec 6 20:49:20 hqnl0246134 sshd[253438]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 20:49:21,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352561.7805521, 'message': 'Dec 6 20:49:20 hqnl0246134 sshd[253438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:49:23,802] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352563.7818396, 'message': 'Dec 6 20:49:22 hqnl0246134 sshd[253438]: Failed password for root from 61.177.173.18 port 15658 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 20:49:23,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352563.782082, 'message': 'Dec 6 20:49:22 hqnl0246134 sshd[253438]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:49:25,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352565.784943, 'message': 'Dec 6 20:49:25 hqnl0246134 sshd[253438]: Failed password for root from 61.177.173.18 port 15658 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 20:49:27,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352567.7879772, 'message': 'Dec 6 20:49:27 hqnl0246134 sshd[253438]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 20:49:29,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352569.79096, 'message': 'Dec 6 20:49:29 hqnl0246134 sshd[253438]: Failed password for root from 61.177.173.18 port 15658 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0546 seconds
INFO [2022-12-06 20:49:39,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352579.7990863, 'message': 'Dec 6 20:49:38 hqnl0246134 sshd[253452]: Invalid user mmk from 151.69.161.84 port 39284', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 20:49:39,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352579.799648, 'message': 'Dec 6 20:49:38 hqnl0246134 sshd[253452]: pam_imunify(sshd:auth): [IM360_RBL] The IP 151.69.161.84 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:49:39,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352579.7998984, 'message': 'Dec 6 20:49:38 hqnl0246134 sshd[253452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.69.161.84 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:49:41,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352581.8039217, 'message': 'Dec 6 20:49:40 hqnl0246134 sshd[253452]: Failed password for invalid user mmk from 151.69.161.84 port 39284 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0383 seconds
INFO [2022-12-06 20:49:41,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352581.8042579, 'message': 'Dec 6 20:49:41 hqnl0246134 sshd[253454]: pam_imunify(sshd:auth): [IM360_RBL] The IP 110.93.245.190 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 20:49:41,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352581.8050642, 'message': 'Dec 6 20:49:41 hqnl0246134 sshd[253454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.93.245.190 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 20:49:43,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '151.69.161.84', 'timestamp': 1670352583.8082569, 'message': 'Dec 6 20:49:43 hqnl0246134 sshd[253452]: Disconnected from invalid user mmk 151.69.161.84 port 39284 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 20:49:45,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '110.93.245.190', 'timestamp': 1670352585.816053, 'message': 'Dec 6 20:49:43 hqnl0246134 sshd[253454]: Failed password for root from 110.93.245.190 port 54111 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0338 seconds
WARNING [2022-12-06 20:49:48,798] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:49:48,800] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:49:55,958] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.104.25.215', 'timestamp': 1670352595.9126089, 'message': 'Dec 6 20:49:55 hqnl0246134 sshd[253457]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.104.25.215 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0451 seconds
INFO [2022-12-06 20:49:55,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.104.25.215', 'timestamp': 1670352595.9128056, 'message': 'Dec 6 20:49:55 hqnl0246134 sshd[253457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.25.215 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 20:49:57,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '190.104.25.215', 'timestamp': 1670352597.8383112, 'message': 'Dec 6 20:49:56 hqnl0246134 sshd[253457]: Failed password for root from 190.104.25.215 port 42928 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:50:00,099] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:50:00,100] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:50:00,107] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:50:00,119] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 20:50:09,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352609.8694806, 'message': 'Dec 6 20:50:09 hqnl0246134 sshd[253489]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 20:50:09,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352609.8699934, 'message': 'Dec 6 20:50:09 hqnl0246134 sshd[253489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-06 20:50:10,216] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:50:10,241] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0322 seconds
INFO [2022-12-06 20:50:11,888] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352611.8699307, 'message': 'Dec 6 20:50:11 hqnl0246134 sshd[253489]: Failed password for root from 61.177.173.18 port 38659 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:50:13,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352613.8728802, 'message': 'Dec 6 20:50:13 hqnl0246134 sshd[253489]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:50:15,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352615.8737168, 'message': 'Dec 6 20:50:15 hqnl0246134 sshd[253489]: Failed password for root from 61.177.173.18 port 38659 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:50:17,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352617.876297, 'message': 'Dec 6 20:50:17 hqnl0246134 sshd[253489]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0547 seconds
INFO [2022-12-06 20:50:18,612] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:50:18,613] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:50:18,621] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:50:18,633] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 20:50:21,405] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:50:21,405] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:50:21,413] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:50:21,425] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 20:50:21,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352621.8805149, 'message': 'Dec 6 20:50:19 hqnl0246134 sshd[253489]: Failed password for root from 61.177.173.18 port 38659 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-06 20:50:27,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.187.146.200', 'timestamp': 1670352627.88692, 'message': 'Dec 6 20:50:27 hqnl0246134 sshd[253526]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.187.146.200 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 20:50:27,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.187.146.200', 'timestamp': 1670352627.8871317, 'message': 'Dec 6 20:50:27 hqnl0246134 sshd[253526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.187.146.200 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 20:50:29,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352629.8889785, 'message': 'Dec 6 20:50:28 hqnl0246134 sshd[253528]: Invalid user mgeweb from 210.19.254.6 port 37303', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 20:50:29,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.187.146.200', 'timestamp': 1670352629.8894405, 'message': 'Dec 6 20:50:29 hqnl0246134 sshd[253526]: Failed password for root from 103.187.146.200 port 51702 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 20:50:29,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352629.8891742, 'message': 'Dec 6 20:50:29 hqnl0246134 sshd[253528]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.19.254.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 20:50:29,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352629.8893344, 'message': 'Dec 6 20:50:29 hqnl0246134 sshd[253528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.19.254.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:50:31,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352631.8915274, 'message': 'Dec 6 20:50:31 hqnl0246134 sshd[253528]: Failed password for invalid user mgeweb from 210.19.254.6 port 37303 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 20:50:33,958] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352633.8937988, 'message': 'Dec 6 20:50:33 hqnl0246134 sshd[253528]: Disconnected from invalid user mgeweb 210.19.254.6 port 37303 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0643 seconds
WARNING [2022-12-06 20:50:48,803] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:50:48,804] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:50:56,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '168.138.7.117', 'timestamp': 1670352656.03186, 'message': 'Dec 6 20:50:53 hqnl0246134 sshd[253541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 168.138.7.117 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 20:50:56,110] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.138.7.117', 'timestamp': 1670352656.0324554, 'message': 'Dec 6 20:50:53 hqnl0246134 sshd[253541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.7.117 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 20:50:57,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '168.138.7.117', 'timestamp': 1670352657.9411325, 'message': 'Dec 6 20:50:56 hqnl0246134 sshd[253541]: Failed password for root from 168.138.7.117 port 36718 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 20:50:59,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352659.9453897, 'message': 'Dec 6 20:50:58 hqnl0246134 sshd[253543]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 20:50:59,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352659.9456608, 'message': 'Dec 6 20:50:58 hqnl0246134 sshd[253543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 20:51:01,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352661.9494407, 'message': 'Dec 6 20:51:00 hqnl0246134 sshd[253543]: Failed password for root from 61.177.173.18 port 14227 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 20:51:03,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352663.950156, 'message': 'Dec 6 20:51:02 hqnl0246134 sshd[253543]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 20:51:05,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352665.9536262, 'message': 'Dec 6 20:51:04 hqnl0246134 sshd[253543]: Failed password for root from 61.177.173.18 port 14227 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 20:51:08,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352667.9554114, 'message': 'Dec 6 20:51:07 hqnl0246134 sshd[253543]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0522 seconds
INFO [2022-12-06 20:51:08,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352667.9558365, 'message': 'Dec 6 20:51:07 hqnl0246134 sshd[253558]: Invalid user user14 from 72.165.240.194 port 51454', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0521 seconds
INFO [2022-12-06 20:51:08,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352667.9579864, 'message': 'Dec 6 20:51:07 hqnl0246134 sshd[253558]: pam_imunify(sshd:auth): [IM360_RBL] The IP 72.165.240.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 20:51:08,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352667.9581642, 'message': 'Dec 6 20:51:07 hqnl0246134 sshd[253558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.165.240.194 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:51:09,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352669.95732, 'message': 'Dec 6 20:51:09 hqnl0246134 sshd[253543]: Failed password for root from 61.177.173.18 port 14227 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 20:51:09,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352669.9576497, 'message': 'Dec 6 20:51:09 hqnl0246134 sshd[253558]: Failed password for invalid user user14 from 72.165.240.194 port 51454 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 20:51:10,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '72.165.240.194', 'timestamp': 1670352669.9577956, 'message': 'Dec 6 20:51:09 hqnl0246134 sshd[253558]: Disconnected from invalid user user14 72.165.240.194 port 51454 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0223 seconds
WARNING [2022-12-06 20:51:10,221] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:51:10,245] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0325 seconds
INFO [2022-12-06 20:51:17,940] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:51:17,941] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:51:17,952] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:51:17,969] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0268 seconds
INFO [2022-12-06 20:51:20,601] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:51:20,601] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:51:20,609] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:51:20,621] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 20:51:36,016] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.160.68.57', 'timestamp': 1670352695.9908433, 'message': 'Dec 6 20:51:34 hqnl0246134 sshd[253581]: Invalid user fuckyou from 122.160.68.57 port 23690', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 20:51:36,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.160.68.57', 'timestamp': 1670352695.9915533, 'message': 'Dec 6 20:51:35 hqnl0246134 sshd[253581]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.160.68.57 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 20:51:36,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.160.68.57', 'timestamp': 1670352695.9917262, 'message': 'Dec 6 20:51:35 hqnl0246134 sshd[253581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.68.57 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:51:38,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.160.68.57', 'timestamp': 1670352697.992939, 'message': 'Dec 6 20:51:37 hqnl0246134 sshd[253581]: Failed password for invalid user fuckyou from 122.160.68.57 port 23690 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 20:51:40,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.160.68.57', 'timestamp': 1670352699.9937153, 'message': 'Dec 6 20:51:39 hqnl0246134 sshd[253581]: Disconnected from invalid user fuckyou 122.160.68.57 port 23690 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 20:51:40,109] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 20:51:40,110] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 20:51:41,057] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-06 20:51:41,698] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:51:41,698] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:51:41,720] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:51:41,740] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0401 seconds
INFO [2022-12-06 20:51:46,024] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352706.0028992, 'message': 'Dec 6 20:51:45 hqnl0246134 sshd[253610]: Invalid user hxeadm from 193.227.16.23 port 44436', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 20:51:46,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352706.003513, 'message': 'Dec 6 20:51:45 hqnl0246134 sshd[253610]: pam_imunify(sshd:auth): [IM360_RBL] The IP 193.227.16.23 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:51:46,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352706.0037704, 'message': 'Dec 6 20:51:45 hqnl0246134 sshd[253610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.227.16.23 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:51:48,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352708.004982, 'message': 'Dec 6 20:51:46 hqnl0246134 sshd[253612]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0577 seconds
INFO [2022-12-06 20:51:48,064] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352708.005456, 'message': 'Dec 6 20:51:47 hqnl0246134 sshd[253610]: Failed password for invalid user hxeadm from 193.227.16.23 port 44436 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0575 seconds
INFO [2022-12-06 20:51:48,082] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352708.005263, 'message': 'Dec 6 20:51:46 hqnl0246134 sshd[253612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
WARNING [2022-12-06 20:51:48,807] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:51:48,808] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:51:50,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352710.006233, 'message': 'Dec 6 20:51:48 hqnl0246134 sshd[253610]: Disconnected from invalid user hxeadm 193.227.16.23 port 44436 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0460 seconds
INFO [2022-12-06 20:51:50,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '118.174.45.29', 'timestamp': 1670352710.0064154, 'message': 'Dec 6 20:51:48 hqnl0246134 sshd[253614]: pam_imunify(sshd:auth): [IM360_RBL] The IP 118.174.45.29 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0464 seconds
INFO [2022-12-06 20:51:50,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352710.006662, 'message': 'Dec 6 20:51:48 hqnl0246134 sshd[253612]: Failed password for root from 61.177.173.18 port 40082 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0462 seconds
INFO [2022-12-06 20:51:50,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '118.174.45.29', 'timestamp': 1670352710.0065303, 'message': 'Dec 6 20:51:48 hqnl0246134 sshd[253614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:51:52,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '118.174.45.29', 'timestamp': 1670352712.0085993, 'message': 'Dec 6 20:51:50 hqnl0246134 sshd[253614]: Failed password for root from 118.174.45.29 port 37324 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 20:51:52,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352712.0087962, 'message': 'Dec 6 20:51:50 hqnl0246134 sshd[253612]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
WARNING [2022-12-06 20:51:53,984] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 20:51:54,029] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352714.0108664, 'message': 'Dec 6 20:51:52 hqnl0246134 sshd[253612]: Failed password for root from 61.177.173.18 port 40082 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:51:54,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352714.0111685, 'message': 'Dec 6 20:51:53 hqnl0246134 sshd[253612]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 20:51:56,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352716.015192, 'message': 'Dec 6 20:51:55 hqnl0246134 sshd[253612]: Failed password for root from 61.177.173.18 port 40082 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 20:52:10,228] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:52:10,255] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0368 seconds
INFO [2022-12-06 20:52:18,084] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:52:18,085] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:52:18,093] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:52:18,105] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 20:52:20,734] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:52:20,734] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:52:20,742] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:52:20,755] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 20:52:36,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352756.066888, 'message': 'Dec 6 20:52:34 hqnl0246134 sshd[253677]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 20:52:36,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352756.0675194, 'message': 'Dec 6 20:52:34 hqnl0246134 sshd[253677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 20:52:38,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352758.0656192, 'message': 'Dec 6 20:52:36 hqnl0246134 sshd[253677]: Failed password for root from 61.177.173.18 port 13046 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 20:52:40,097] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352760.0707636, 'message': 'Dec 6 20:52:39 hqnl0246134 sshd[253677]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 20:52:42,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352762.073073, 'message': 'Dec 6 20:52:41 hqnl0246134 sshd[253677]: Failed password for root from 61.177.173.18 port 13046 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:52:42,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352762.0732758, 'message': 'Dec 6 20:52:41 hqnl0246134 sshd[253677]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:52:46,097] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352766.079415, 'message': 'Dec 6 20:52:44 hqnl0246134 sshd[253677]: Failed password for root from 61.177.173.18 port 13046 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 20:52:48,812] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:52:48,813] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:53:10,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '190.104.25.215', 'timestamp': 1670352790.1046183, 'message': 'Dec 6 20:53:09 hqnl0246134 sshd[253703]: pam_imunify(sshd:auth): [IM360_RBL] The IP 190.104.25.215 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 20:53:10,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '190.104.25.215', 'timestamp': 1670352790.1051054, 'message': 'Dec 6 20:53:09 hqnl0246134 sshd[253703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.25.215 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
WARNING [2022-12-06 20:53:10,228] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:53:10,252] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0317 seconds
INFO [2022-12-06 20:53:12,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '190.104.25.215', 'timestamp': 1670352792.1063805, 'message': 'Dec 6 20:53:11 hqnl0246134 sshd[253703]: Failed password for root from 190.104.25.215 port 58388 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 20:53:14,490] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:53:14,491] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:53:14,497] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:53:14,510] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 20:53:17,698] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:53:17,699] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:53:17,706] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:53:17,717] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 20:53:20,342] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:53:20,342] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:53:20,350] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:53:20,362] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 20:53:22,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352802.1142957, 'message': 'Dec 6 20:53:21 hqnl0246134 sshd[253729]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 20:53:22,153] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352802.1145108, 'message': 'Dec 6 20:53:21 hqnl0246134 sshd[253729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 20:53:24,143] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352804.1172144, 'message': 'Dec 6 20:53:23 hqnl0246134 sshd[253729]: Failed password for root from 61.177.173.18 port 32121 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 20:53:24,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352804.1175783, 'message': 'Dec 6 20:53:23 hqnl0246134 sshd[253729]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:53:26,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352806.1178658, 'message': 'Dec 6 20:53:25 hqnl0246134 sshd[253729]: Failed password for root from 61.177.173.18 port 32121 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 20:53:26,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352806.1181736, 'message': 'Dec 6 20:53:25 hqnl0246134 sshd[253729]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 20:53:28,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352808.1204326, 'message': 'Dec 6 20:53:27 hqnl0246134 sshd[253729]: Failed password for root from 61.177.173.18 port 32121 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:53:34,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.187.146.200', 'timestamp': 1670352814.1237268, 'message': 'Dec 6 20:53:33 hqnl0246134 sshd[253736]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.187.146.200 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 20:53:34,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.187.146.200', 'timestamp': 1670352814.1240637, 'message': 'Dec 6 20:53:33 hqnl0246134 sshd[253736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.187.146.200 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 20:53:36,146] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.187.146.200', 'timestamp': 1670352816.1259117, 'message': 'Dec 6 20:53:35 hqnl0246134 sshd[253736]: Failed password for root from 103.187.146.200 port 35952 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
WARNING [2022-12-06 20:53:48,816] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:53:48,817] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:53:58,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.160.62.57', 'timestamp': 1670352838.1544652, 'message': 'Dec 6 20:53:57 hqnl0246134 sshd[253748]: Invalid user max from 122.160.62.57 port 57062', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0431 seconds
INFO [2022-12-06 20:53:58,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.160.62.57', 'timestamp': 1670352838.1553593, 'message': 'Dec 6 20:53:57 hqnl0246134 sshd[253748]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.160.62.57 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 20:53:58,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.160.62.57', 'timestamp': 1670352838.1555324, 'message': 'Dec 6 20:53:57 hqnl0246134 sshd[253748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.62.57 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 20:54:00,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.160.62.57', 'timestamp': 1670352840.1570132, 'message': 'Dec 6 20:53:59 hqnl0246134 sshd[253748]: Failed password for invalid user max from 122.160.62.57 port 57062 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 20:54:00,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.160.62.57', 'timestamp': 1670352840.157211, 'message': 'Dec 6 20:53:59 hqnl0246134 sshd[253748]: Disconnected from invalid user max 122.160.62.57 port 57062 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:54:08,656] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 20:54:08,723] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 20:54:08,724] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 20:54:08,724] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 20:54:08,724] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 20:54:08,725] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 20:54:08,734] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 20:54:08,750] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0248 seconds
WARNING [2022-12-06 20:54:08,757] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 20:54:08,759] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:54:08,897] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.1534 seconds
INFO [2022-12-06 20:54:08,898] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.1511 seconds
INFO [2022-12-06 20:54:10,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352850.1704755, 'message': 'Dec 6 20:54:08 hqnl0246134 sshd[253762]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 20:54:10,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352850.1709604, 'message': 'Dec 6 20:54:08 hqnl0246134 sshd[253762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0263 seconds
WARNING [2022-12-06 20:54:10,234] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:54:10,271] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0491 seconds
INFO [2022-12-06 20:54:12,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352852.1705484, 'message': 'Dec 6 20:54:10 hqnl0246134 sshd[253762]: Failed password for root from 61.177.173.18 port 58600 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 20:54:12,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352852.1707447, 'message': 'Dec 6 20:54:10 hqnl0246134 sshd[253762]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 20:54:14,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352854.1718607, 'message': 'Dec 6 20:54:12 hqnl0246134 sshd[253762]: Failed password for root from 61.177.173.18 port 58600 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 20:54:14,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352854.1720724, 'message': 'Dec 6 20:54:13 hqnl0246134 sshd[253762]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:54:16,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352856.1739233, 'message': 'Dec 6 20:54:14 hqnl0246134 sshd[253762]: Failed password for root from 61.177.173.18 port 58600 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 20:54:19,844] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:54:19,844] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:54:19,851] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:54:19,861] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0162 seconds
INFO [2022-12-06 20:54:24,273] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:54:24,273] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:54:24,282] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:54:24,293] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 20:54:32,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352872.1960847, 'message': 'Dec 6 20:54:30 hqnl0246134 sshd[253784]: Invalid user support from 193.227.16.23 port 33540', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 20:54:32,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352872.196481, 'message': 'Dec 6 20:54:30 hqnl0246134 sshd[253784]: pam_imunify(sshd:auth): [IM360_RBL] The IP 193.227.16.23 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:54:32,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352872.1966174, 'message': 'Dec 6 20:54:30 hqnl0246134 sshd[253784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.227.16.23 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 20:54:34,216] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352874.196595, 'message': 'Dec 6 20:54:32 hqnl0246134 sshd[253784]: Failed password for invalid user support from 193.227.16.23 port 33540 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:54:34,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.227.16.23', 'timestamp': 1670352874.1968992, 'message': 'Dec 6 20:54:32 hqnl0246134 sshd[253784]: Disconnected from invalid user support 193.227.16.23 port 33540 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:54:36,533] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:54:36,534] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:54:36,579] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:54:36,621] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0761 seconds
INFO [2022-12-06 20:54:38,966] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 20:54:38,966] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 20:54:38,967] im360.plugins.client360: Waiting 3 minutes before retry...
WARNING [2022-12-06 20:54:48,821] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:54:48,823] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:54:54,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '182.253.82.154', 'timestamp': 1670352894.2190702, 'message': 'Dec 6 20:54:53 hqnl0246134 sshd[253808]: Invalid user kevin from 182.253.82.154 port 58300', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 20:54:54,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '182.253.82.154', 'timestamp': 1670352894.219741, 'message': 'Dec 6 20:54:53 hqnl0246134 sshd[253808]: pam_imunify(sshd:auth): [IM360_RBL] The IP 182.253.82.154 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 20:54:54,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '182.253.82.154', 'timestamp': 1670352894.2199526, 'message': 'Dec 6 20:54:53 hqnl0246134 sshd[253808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.82.154 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 20:54:56,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352896.22064, 'message': 'Dec 6 20:54:55 hqnl0246134 sshd[253810]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 20:54:56,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '182.253.82.154', 'timestamp': 1670352896.2210093, 'message': 'Dec 6 20:54:55 hqnl0246134 sshd[253808]: Failed password for invalid user kevin from 182.253.82.154 port 58300 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 20:54:56,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352896.2208848, 'message': 'Dec 6 20:54:55 hqnl0246134 sshd[253810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 20:54:58,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352898.223917, 'message': 'Dec 6 20:54:57 hqnl0246134 sshd[253810]: Failed password for root from 61.177.173.18 port 24392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 20:54:58,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '182.253.82.154', 'timestamp': 1670352898.2241826, 'message': 'Dec 6 20:54:57 hqnl0246134 sshd[253808]: Disconnected from invalid user kevin 182.253.82.154 port 58300 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 20:54:58,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352898.2243679, 'message': 'Dec 6 20:54:57 hqnl0246134 sshd[253810]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 20:55:00,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352900.225541, 'message': 'Dec 6 20:54:59 hqnl0246134 sshd[253810]: Failed password for root from 61.177.173.18 port 24392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:55:02,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352902.2350562, 'message': 'Dec 6 20:55:02 hqnl0246134 sshd[253810]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0531 seconds
INFO [2022-12-06 20:55:04,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352904.2329001, 'message': 'Dec 6 20:55:03 hqnl0246134 sshd[253810]: Failed password for root from 61.177.173.18 port 24392 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-06 20:55:10,236] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:55:10,261] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0355 seconds
INFO [2022-12-06 20:55:18,343] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:55:18,344] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:55:18,358] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:55:18,371] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0262 seconds
INFO [2022-12-06 20:55:23,028] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:55:23,028] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:55:23,035] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:55:23,046] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 20:55:24,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670352924.2584789, 'message': 'Dec 6 20:55:22 hqnl0246134 sshd[253886]: Invalid user ubnt from 152.89.196.123 port 49376', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 20:55:24,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.123', 'timestamp': 1670352924.258793, 'message': 'Dec 6 20:55:22 hqnl0246134 sshd[253886]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.123 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 20:55:24,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.123', 'timestamp': 1670352924.258928, 'message': 'Dec 6 20:55:22 hqnl0246134 sshd[253886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.123 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:55:26,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670352926.2607958, 'message': 'Dec 6 20:55:24 hqnl0246134 sshd[253886]: Failed password for invalid user ubnt from 152.89.196.123 port 49376 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 20:55:26,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670352926.2610784, 'message': 'Dec 6 20:55:24 hqnl0246134 sshd[253886]: Disconnected from invalid user ubnt 152.89.196.123 port 49376 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 20:55:42,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352942.2812834, 'message': 'Dec 6 20:55:41 hqnl0246134 sshd[253902]: Invalid user test from 210.19.254.6 port 45496', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 20:55:42,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352942.2819495, 'message': 'Dec 6 20:55:41 hqnl0246134 sshd[253902]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.19.254.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 20:55:42,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352942.2821674, 'message': 'Dec 6 20:55:41 hqnl0246134 sshd[253902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.19.254.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 20:55:44,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352944.286051, 'message': 'Dec 6 20:55:43 hqnl0246134 sshd[253902]: Failed password for invalid user test from 210.19.254.6 port 45496 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 20:55:44,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352944.2862754, 'message': 'Dec 6 20:55:43 hqnl0246134 sshd[253904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 20:55:44,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670352944.2866068, 'message': 'Dec 6 20:55:43 hqnl0246134 sshd[253902]: Disconnected from invalid user test 210.19.254.6 port 45496 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 20:55:44,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352944.2864604, 'message': 'Dec 6 20:55:43 hqnl0246134 sshd[253904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 20:55:46,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352946.2892306, 'message': 'Dec 6 20:55:45 hqnl0246134 sshd[253904]: Failed password for root from 61.177.173.18 port 52229 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 20:55:48,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352948.2897153, 'message': 'Dec 6 20:55:48 hqnl0246134 sshd[253904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-06 20:55:48,837] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:55:48,838] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:55:50,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352950.2923853, 'message': 'Dec 6 20:55:49 hqnl0246134 sshd[253904]: Failed password for root from 61.177.173.18 port 52229 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 20:55:52,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352952.295834, 'message': 'Dec 6 20:55:50 hqnl0246134 sshd[253904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 20:55:54,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352954.2978513, 'message': 'Dec 6 20:55:52 hqnl0246134 sshd[253904]: Failed password for root from 61.177.173.18 port 52229 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0435 seconds
WARNING [2022-12-06 20:56:10,240] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:56:10,266] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0375 seconds
INFO [2022-12-06 20:56:17,877] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:56:17,878] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:56:17,885] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:56:17,896] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 20:56:20,452] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:56:20,453] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:56:20,460] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:56:20,471] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 20:56:22,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.160.68.57', 'timestamp': 1670352982.3424594, 'message': 'Dec 6 20:56:21 hqnl0246134 sshd[253939]: Invalid user nick from 122.160.68.57 port 33934', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 20:56:22,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '122.160.68.57', 'timestamp': 1670352982.342752, 'message': 'Dec 6 20:56:21 hqnl0246134 sshd[253939]: pam_imunify(sshd:auth): [IM360_RBL] The IP 122.160.68.57 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:56:22,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '122.160.68.57', 'timestamp': 1670352982.342913, 'message': 'Dec 6 20:56:21 hqnl0246134 sshd[253939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.68.57 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 20:56:24,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.160.68.57', 'timestamp': 1670352984.3444014, 'message': 'Dec 6 20:56:23 hqnl0246134 sshd[253939]: Failed password for invalid user nick from 122.160.68.57 port 33934 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 20:56:24,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '122.160.68.57', 'timestamp': 1670352984.344603, 'message': 'Dec 6 20:56:23 hqnl0246134 sshd[253939]: Disconnected from invalid user nick 122.160.68.57 port 33934 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 20:56:26,623] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:56:26,624] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:56:26,640] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:56:26,674] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0409 seconds
INFO [2022-12-06 20:56:32,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352992.3519745, 'message': 'Dec 6 20:56:32 hqnl0246134 sshd[253952]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 20:56:32,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352992.35235, 'message': 'Dec 6 20:56:32 hqnl0246134 sshd[253952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 20:56:36,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352996.3567624, 'message': 'Dec 6 20:56:34 hqnl0246134 sshd[253952]: Failed password for root from 61.177.173.18 port 29969 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 20:56:38,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352998.361513, 'message': 'Dec 6 20:56:36 hqnl0246134 sshd[253952]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 20:56:38,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670352998.361768, 'message': 'Dec 6 20:56:38 hqnl0246134 sshd[253952]: Failed password for root from 61.177.173.18 port 29969 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 20:56:40,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353000.359448, 'message': 'Dec 6 20:56:38 hqnl0246134 sshd[253952]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 20:56:42,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353002.3653715, 'message': 'Dec 6 20:56:40 hqnl0246134 sshd[253952]: Failed password for root from 61.177.173.18 port 29969 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 20:56:48,842] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:56:48,843] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 20:57:10,249] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:57:10,283] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0502 seconds
INFO [2022-12-06 20:57:17,865] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:57:17,866] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:57:17,878] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:57:17,895] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0278 seconds
INFO [2022-12-06 20:57:20,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353040.4113355, 'message': 'Dec 6 20:57:19 hqnl0246134 sshd[254006]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0378 seconds
INFO [2022-12-06 20:57:20,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5715, 'attackers_ip': '188.32.176.34', 'timestamp': 1670353040.411694, 'message': 'Dec 6 20:57:20 hqnl0246134 sshd[254009]: Accepted publickey for root from 188.32.176.34 port 47356 ssh2: RSA SHA256:M5XvbkooZmQvvjfo3fKHU5lbqUaXL4LET3qhCF0FT28', 'severity': 3, 'name': 'SSHD authentication success.', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 20:57:20,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353040.4115512, 'message': 'Dec 6 20:57:19 hqnl0246134 sshd[254006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 20:57:20,599] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:57:20,599] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:57:20,607] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:57:20,618] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 20:57:22,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353042.4128249, 'message': 'Dec 6 20:57:20 hqnl0246134 sshd[254006]: Failed password for root from 61.177.173.18 port 41754 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 20:57:22,502] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353042.4130995, 'message': 'Dec 6 20:57:21 hqnl0246134 sshd[254006]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0506 seconds
INFO [2022-12-06 20:57:24,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353044.4178882, 'message': 'Dec 6 20:57:23 hqnl0246134 sshd[254006]: Failed password for root from 61.177.173.18 port 41754 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 20:57:26,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353046.4247756, 'message': 'Dec 6 20:57:25 hqnl0246134 sshd[254006]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 20:57:28,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353048.4260833, 'message': 'Dec 6 20:57:27 hqnl0246134 sshd[254006]: Failed password for root from 61.177.173.18 port 41754 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 20:57:42,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353062.4432948, 'message': 'Dec 6 20:57:40 hqnl0246134 sshd[254079]: Invalid user reese from 103.250.11.181 port 49122', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 20:57:42,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353062.443852, 'message': 'Dec 6 20:57:40 hqnl0246134 sshd[254079]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.250.11.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 20:57:42,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353062.4440017, 'message': 'Dec 6 20:57:40 hqnl0246134 sshd[254079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.11.181 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 20:57:44,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353064.4450915, 'message': 'Dec 6 20:57:42 hqnl0246134 sshd[254079]: Failed password for invalid user reese from 103.250.11.181 port 49122 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 20:57:46,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353066.4463775, 'message': 'Dec 6 20:57:44 hqnl0246134 sshd[254079]: Disconnected from invalid user reese 103.250.11.181 port 49122 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 20:57:47,039] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:57:47,039] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:57:47,046] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:57:47,058] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
WARNING [2022-12-06 20:57:48,845] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:57:48,846] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:57:50,541] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 20:57:50,606] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 20:57:50,606] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 20:57:50,607] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 20:57:50,607] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 20:57:50,607] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 20:57:50,617] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 20:57:50,637] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0289 seconds
WARNING [2022-12-06 20:57:50,645] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 20:57:50,647] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:57:50,674] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0470 seconds
INFO [2022-12-06 20:57:50,677] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0444 seconds
INFO [2022-12-06 20:58:08,504] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353088.4828982, 'message': 'Dec 6 20:58:06 hqnl0246134 sshd[254124]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 20:58:08,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353088.4831228, 'message': 'Dec 6 20:58:06 hqnl0246134 sshd[254124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 20:58:08,545] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353088.4833014, 'message': 'Dec 6 20:58:08 hqnl0246134 sshd[254124]: Failed password for root from 61.177.173.18 port 14158 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
WARNING [2022-12-06 20:58:10,265] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:58:10,312] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0757 seconds
INFO [2022-12-06 20:58:10,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353090.484678, 'message': 'Dec 6 20:58:09 hqnl0246134 sshd[254124]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0502 seconds
INFO [2022-12-06 20:58:12,511] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353092.4904292, 'message': 'Dec 6 20:58:11 hqnl0246134 sshd[254124]: Failed password for root from 61.177.173.18 port 14158 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 20:58:14,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353094.4969497, 'message': 'Dec 6 20:58:13 hqnl0246134 sshd[254124]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 20:58:16,532] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353096.4979088, 'message': 'Dec 6 20:58:15 hqnl0246134 sshd[254124]: Failed password for root from 61.177.173.18 port 14158 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 20:58:17,855] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:58:17,855] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:58:17,863] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:58:17,875] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 20:58:20,441] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:58:20,441] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:58:20,457] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:58:20,479] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0363 seconds
INFO [2022-12-06 20:58:20,812] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 20:58:20,812] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 20:58:20,813] im360.plugins.client360: Waiting 4 minutes before retry...
WARNING [2022-12-06 20:58:48,848] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:58:48,850] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:58:51,670] defence360agent.files: Updating all files
INFO [2022-12-06 20:58:51,961] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 20:58:51,962] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 20:58:52,321] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 20:58:52,322] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 20:58:52,638] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 20:58:52,639] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 20:58:52,906] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 20:58:52,907] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 20:58:52,907] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 20:58:53,227] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 18:58:53 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4953218CCDBD'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 20:58:53,229] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 20:58:53,230] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 20:58:53,786] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 20:58:53,786] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 20:58:54,104] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 20:58:54,104] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 20:58:54,419] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 20:58:54,420] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 20:58:54,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353134.5615852, 'message': 'Dec 6 20:58:54 hqnl0246134 sshd[254179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 20:58:54,615] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353134.5620642, 'message': 'Dec 6 20:58:54 hqnl0246134 sshd[254179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 20:58:54,789] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 20:58:54,790] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 20:58:55,268] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 20:58:55,269] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 20:58:56,587] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353136.5644393, 'message': 'Dec 6 20:58:56 hqnl0246134 sshd[254179]: Failed password for root from 61.177.173.18 port 38919 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 20:58:58,588] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353138.5673027, 'message': 'Dec 6 20:58:58 hqnl0246134 sshd[254179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 20:59:00,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '168.138.7.117', 'timestamp': 1670353140.5698104, 'message': 'Dec 6 20:59:00 hqnl0246134 sshd[254181]: pam_imunify(sshd:auth): [IM360_RBL] The IP 168.138.7.117 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 20:59:00,607] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.138.7.117', 'timestamp': 1670353140.5700107, 'message': 'Dec 6 20:59:00 hqnl0246134 sshd[254181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.7.117 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 20:59:02,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353142.573007, 'message': 'Dec 6 20:59:00 hqnl0246134 sshd[254179]: Failed password for root from 61.177.173.18 port 38919 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 20:59:02,608] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '168.138.7.117', 'timestamp': 1670353142.5788522, 'message': 'Dec 6 20:59:01 hqnl0246134 sshd[254181]: Failed password for root from 168.138.7.117 port 36938 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 20:59:04,592] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353144.5753298, 'message': 'Dec 6 20:59:02 hqnl0246134 sshd[254179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 20:59:04,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353144.5766652, 'message': 'Dec 6 20:59:04 hqnl0246134 sshd[254179]: Failed password for root from 61.177.173.18 port 38919 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0164 seconds
WARNING [2022-12-06 20:59:10,251] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:59:10,277] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0370 seconds
INFO [2022-12-06 20:59:18,610] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:59:18,611] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:59:18,624] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:59:18,645] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0331 seconds
INFO [2022-12-06 20:59:21,303] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:59:21,303] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:59:21,310] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:59:21,321] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 20:59:42,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353182.6200726, 'message': 'Dec 6 20:59:41 hqnl0246134 sshd[254257]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 20:59:42,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353182.6206336, 'message': 'Dec 6 20:59:41 hqnl0246134 sshd[254257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 20:59:44,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353184.620451, 'message': 'Dec 6 20:59:44 hqnl0246134 sshd[254257]: Failed password for root from 61.177.173.18 port 15221 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 20:59:46,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353186.6226935, 'message': 'Dec 6 20:59:45 hqnl0246134 sshd[254257]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 20:59:48,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353188.6253798, 'message': 'Dec 6 20:59:47 hqnl0246134 sshd[254257]: Failed password for root from 61.177.173.18 port 15221 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 20:59:48,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353188.6255715, 'message': 'Dec 6 20:59:47 hqnl0246134 sshd[254257]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
WARNING [2022-12-06 20:59:48,854] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 20:59:48,855] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 20:59:50,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353190.6267493, 'message': 'Dec 6 20:59:49 hqnl0246134 sshd[254257]: Failed password for root from 61.177.173.18 port 15221 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 20:59:52,681] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 20:59:52,682] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 20:59:52,690] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 20:59:52,702] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 21:00:06,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '129.146.28.20', 'timestamp': 1670353206.6535757, 'message': 'Dec 6 21:00:06 hqnl0246134 sshd[254305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 129.146.28.20 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0402 seconds
INFO [2022-12-06 21:00:06,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '129.146.28.20', 'timestamp': 1670353206.6543121, 'message': 'Dec 6 21:00:06 hqnl0246134 sshd[254305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.28.20 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 21:00:08,673] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '129.146.28.20', 'timestamp': 1670353208.6538973, 'message': 'Dec 6 21:00:07 hqnl0246134 sshd[254305]: Failed password for root from 129.146.28.20 port 47876 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 21:00:10,301] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:00:10,333] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0865 seconds
INFO [2022-12-06 21:00:17,953] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:00:17,954] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:00:17,972] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:00:18,000] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0355 seconds
INFO [2022-12-06 21:00:20,638] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:00:20,639] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:00:20,646] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:00:20,660] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 21:00:28,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353228.6835532, 'message': 'Dec 6 21:00:28 hqnl0246134 sshd[254337]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 21:00:28,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353228.6839025, 'message': 'Dec 6 21:00:28 hqnl0246134 sshd[254337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 21:00:30,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353230.68645, 'message': 'Dec 6 21:00:30 hqnl0246134 sshd[254337]: Failed password for root from 61.177.173.18 port 42206 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 21:00:32,708] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353232.6890025, 'message': 'Dec 6 21:00:32 hqnl0246134 sshd[254337]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 21:00:34,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353234.6961222, 'message': 'Dec 6 21:00:34 hqnl0246134 sshd[254337]: Failed password for root from 61.177.173.18 port 42206 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 21:00:36,724] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353236.6959808, 'message': 'Dec 6 21:00:34 hqnl0246134 sshd[254337]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 21:00:36,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353236.6962051, 'message': 'Dec 6 21:00:36 hqnl0246134 sshd[254337]: Failed password for root from 61.177.173.18 port 42206 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
WARNING [2022-12-06 21:00:48,859] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:00:48,860] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:00:54,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670353254.722068, 'message': 'Dec 6 21:00:53 hqnl0246134 sshd[254357]: Invalid user online from 210.19.254.6 port 58131', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 21:00:54,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '210.19.254.6', 'timestamp': 1670353254.7237809, 'message': 'Dec 6 21:00:53 hqnl0246134 sshd[254357]: pam_imunify(sshd:auth): [IM360_RBL] The IP 210.19.254.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 21:00:54,786] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '210.19.254.6', 'timestamp': 1670353254.7239125, 'message': 'Dec 6 21:00:53 hqnl0246134 sshd[254357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.19.254.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 21:00:56,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670353256.7299461, 'message': 'Dec 6 21:00:55 hqnl0246134 sshd[254357]: Failed password for invalid user online from 210.19.254.6 port 58131 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 21:00:56,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '210.19.254.6', 'timestamp': 1670353256.730142, 'message': 'Dec 6 21:00:56 hqnl0246134 sshd[254357]: Disconnected from invalid user online 210.19.254.6 port 58131 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0162 seconds
INFO [2022-12-06 21:00:58,674] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:00:58,674] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:00:58,682] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:00:58,693] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
WARNING [2022-12-06 21:01:10,260] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:01:10,284] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0327 seconds
INFO [2022-12-06 21:01:10,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353270.754926, 'message': 'Dec 6 21:01:10 hqnl0246134 sshd[254376]: Invalid user postgres from 182.253.82.154 port 59346', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 21:01:10,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353270.7553, 'message': 'Dec 6 21:01:10 hqnl0246134 sshd[254376]: pam_imunify(sshd:auth): [IM360_RBL] The IP 182.253.82.154 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 21:01:10,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353270.755464, 'message': 'Dec 6 21:01:10 hqnl0246134 sshd[254376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.82.154 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 21:01:12,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353272.7568715, 'message': 'Dec 6 21:01:12 hqnl0246134 sshd[254376]: Failed password for invalid user postgres from 182.253.82.154 port 59346 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:01:16,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353276.762752, 'message': 'Dec 6 21:01:14 hqnl0246134 sshd[254376]: Disconnected from invalid user postgres 182.253.82.154 port 59346 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-06 21:01:16,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353276.7682621, 'message': 'Dec 6 21:01:14 hqnl0246134 sshd[254387]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0523 seconds
INFO [2022-12-06 21:01:16,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353276.7685232, 'message': 'Dec 6 21:01:14 hqnl0246134 sshd[254387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 21:01:18,149] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:01:18,150] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:01:18,165] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:01:18,188] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0341 seconds
INFO [2022-12-06 21:01:18,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353278.7643328, 'message': 'Dec 6 21:01:16 hqnl0246134 sshd[254387]: Failed password for root from 61.177.173.18 port 57991 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 21:01:18,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353278.7645438, 'message': 'Dec 6 21:01:17 hqnl0246134 sshd[254387]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 21:01:20,931] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:01:20,932] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 21:01:20,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353280.7710392, 'message': 'Dec 6 21:01:19 hqnl0246134 sshd[254387]: Failed password for root from 61.177.173.18 port 57991 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1794 seconds
WARNING [2022-12-06 21:01:20,952] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:01:20,972] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0378 seconds
INFO [2022-12-06 21:01:22,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353282.7756786, 'message': 'Dec 6 21:01:21 hqnl0246134 sshd[254387]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 21:01:24,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353284.780311, 'message': 'Dec 6 21:01:23 hqnl0246134 sshd[254387]: Failed password for root from 61.177.173.18 port 57991 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 21:01:48,864] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:01:48,866] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 21:01:53,988] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 21:02:04,924] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353324.9022472, 'message': 'Dec 6 21:02:04 hqnl0246134 sshd[254431]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 21:02:04,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353324.9026744, 'message': 'Dec 6 21:02:04 hqnl0246134 sshd[254431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:02:06,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353326.9055648, 'message': 'Dec 6 21:02:06 hqnl0246134 sshd[254431]: Failed password for root from 61.177.173.18 port 38687 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 21:02:08,927] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353328.9088519, 'message': 'Dec 6 21:02:08 hqnl0246134 sshd[254431]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 21:02:10,266] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:02:10,299] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0404 seconds
INFO [2022-12-06 21:02:10,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353330.910243, 'message': 'Dec 6 21:02:10 hqnl0246134 sshd[254431]: Failed password for root from 61.177.173.18 port 38687 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 21:02:10,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353330.9105778, 'message': 'Dec 6 21:02:10 hqnl0246134 sshd[254431]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:02:12,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353332.9127045, 'message': 'Dec 6 21:02:12 hqnl0246134 sshd[254431]: Failed password for root from 61.177.173.18 port 38687 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 21:02:17,882] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:02:17,883] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:02:17,891] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:02:17,903] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 21:02:22,882] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:02:22,883] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:02:22,890] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:02:22,902] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
WARNING [2022-12-06 21:02:48,868] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:02:48,870] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:02:55,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353374.9676468, 'message': 'Dec 6 21:02:54 hqnl0246134 sshd[254467]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-06 21:02:55,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353374.9686253, 'message': 'Dec 6 21:02:54 hqnl0246134 sshd[254467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 21:02:58,957] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 21:02:59,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353378.971497, 'message': 'Dec 6 21:02:57 hqnl0246134 sshd[254467]: Failed password for root from 61.177.173.18 port 16165 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 21:02:59,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353378.9727254, 'message': 'Dec 6 21:02:58 hqnl0246134 sshd[254467]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:02:59,025] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 21:02:59,025] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 21:02:59,025] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 21:02:59,026] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 21:02:59,026] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 21:02:59,034] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 21:02:59,050] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0236 seconds
WARNING [2022-12-06 21:02:59,056] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 21:02:59,058] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:02:59,078] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0341 seconds
INFO [2022-12-06 21:02:59,080] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0328 seconds
INFO [2022-12-06 21:03:00,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353380.9738224, 'message': 'Dec 6 21:03:00 hqnl0246134 sshd[254467]: Failed password for root from 61.177.173.18 port 16165 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:03:04,995] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353384.9779632, 'message': 'Dec 6 21:03:03 hqnl0246134 sshd[254467]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 21:03:07,001] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353386.980094, 'message': 'Dec 6 21:03:05 hqnl0246134 sshd[254467]: Failed password for root from 61.177.173.18 port 16165 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 21:03:10,277] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:03:10,305] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0444 seconds
INFO [2022-12-06 21:03:10,647] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:03:10,648] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:03:10,655] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:03:10,666] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 21:03:17,758] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:03:17,759] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:03:17,767] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:03:17,779] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 21:03:20,493] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:03:20,494] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:03:20,501] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:03:20,512] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 21:03:25,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353405.0067866, 'message': 'Dec 6 21:03:23 hqnl0246134 sshd[254533]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.250.11.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 21:03:25,057] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353405.0071619, 'message': 'Dec 6 21:03:23 hqnl0246134 sshd[254533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.11.181 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 21:03:27,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353407.0095186, 'message': 'Dec 6 21:03:25 hqnl0246134 sshd[254533]: Failed password for root from 103.250.11.181 port 52090 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 21:03:29,035] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353409.0163908, 'message': 'Dec 6 21:03:27 hqnl0246134 sshd[254537]: pam_imunify(sshd:auth): [IM360_RBL] The IP 182.253.82.154 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:03:29,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353409.0166564, 'message': 'Dec 6 21:03:27 hqnl0246134 sshd[254537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.82.154 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:03:29,154] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 21:03:29,155] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 21:03:29,156] im360.plugins.client360: Waiting 7 minutes before retry...
INFO [2022-12-06 21:03:31,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353411.0205898, 'message': 'Dec 6 21:03:29 hqnl0246134 sshd[254537]: Failed password for root from 182.253.82.154 port 54304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:03:45,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353425.0436306, 'message': 'Dec 6 21:03:43 hqnl0246134 sshd[254550]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 21:03:45,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353425.0444279, 'message': 'Dec 6 21:03:43 hqnl0246134 sshd[254550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 21:03:47,064] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353427.0465302, 'message': 'Dec 6 21:03:45 hqnl0246134 sshd[254550]: Failed password for root from 61.177.173.18 port 37026 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:03:47,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353427.0467136, 'message': 'Dec 6 21:03:45 hqnl0246134 sshd[254550]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
WARNING [2022-12-06 21:03:48,873] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:03:48,874] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:03:49,084] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353429.0545082, 'message': 'Dec 6 21:03:47 hqnl0246134 sshd[254550]: Failed password for root from 61.177.173.18 port 37026 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 21:03:49,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353429.0547915, 'message': 'Dec 6 21:03:47 hqnl0246134 sshd[254550]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 21:03:51,079] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353431.061772, 'message': 'Dec 6 21:03:50 hqnl0246134 sshd[254550]: Failed password for root from 61.177.173.18 port 37026 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 21:04:10,271] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:04:10,291] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0271 seconds
INFO [2022-12-06 21:04:17,847] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:04:17,848] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:04:17,857] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:04:17,869] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 21:04:20,348] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:04:20,349] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:04:20,356] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:04:20,367] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 21:04:27,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '66.43.250.3', 'timestamp': 1670353467.1188223, 'message': 'Dec 6 21:04:26 hqnl0246134 sshd[254568]: pam_imunify(sshd:auth): [IM360_RBL] The IP 66.43.250.3 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:04:27,156] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '66.43.250.3', 'timestamp': 1670353467.1190789, 'message': 'Dec 6 21:04:26 hqnl0246134 sshd[254568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.43.250.3 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 21:04:29,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '66.43.250.3', 'timestamp': 1670353469.1205332, 'message': 'Dec 6 21:04:28 hqnl0246134 sshd[254568]: Failed password for root from 66.43.250.3 port 56190 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:04:33,143] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353473.1244304, 'message': 'Dec 6 21:04:32 hqnl0246134 sshd[254585]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:04:33,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353473.124669, 'message': 'Dec 6 21:04:32 hqnl0246134 sshd[254585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:04:35,120] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:04:35,120] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:04:35,138] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:04:35,172] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0513 seconds
INFO [2022-12-06 21:04:35,177] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353475.125833, 'message': 'Dec 6 21:04:33 hqnl0246134 sshd[254585]: Failed password for root from 61.177.173.18 port 60385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0511 seconds
INFO [2022-12-06 21:04:35,211] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353475.126038, 'message': 'Dec 6 21:04:34 hqnl0246134 sshd[254585]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 21:04:37,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353477.1288505, 'message': 'Dec 6 21:04:36 hqnl0246134 sshd[254585]: Failed password for root from 61.177.173.18 port 60385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:04:39,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353479.1301684, 'message': 'Dec 6 21:04:38 hqnl0246134 sshd[254585]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:04:41,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353481.131915, 'message': 'Dec 6 21:04:41 hqnl0246134 sshd[254585]: Failed password for root from 61.177.173.18 port 60385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 21:04:48,879] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:04:48,881] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 21:05:10,277] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:05:10,301] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0334 seconds
INFO [2022-12-06 21:05:13,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353513.1747978, 'message': 'Dec 6 21:05:11 hqnl0246134 sshd[254624]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.250.11.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 21:05:13,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353513.1751752, 'message': 'Dec 6 21:05:11 hqnl0246134 sshd[254624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.11.181 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 21:05:15,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353515.1763873, 'message': 'Dec 6 21:05:13 hqnl0246134 sshd[254624]: Failed password for root from 103.250.11.181 port 49260 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 21:05:17,913] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:05:17,914] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:05:17,920] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:05:17,931] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 21:05:20,516] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:05:20,517] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:05:20,523] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:05:20,534] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0166 seconds
INFO [2022-12-06 21:05:21,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353521.1841917, 'message': 'Dec 6 21:05:19 hqnl0246134 sshd[254648]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 21:05:21,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353521.1844685, 'message': 'Dec 6 21:05:19 hqnl0246134 sshd[254648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0159 seconds
INFO [2022-12-06 21:05:21,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353521.1846352, 'message': 'Dec 6 21:05:20 hqnl0246134 sshd[254648]: Failed password for root from 61.177.173.18 port 21945 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 21:05:23,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353523.1862612, 'message': 'Dec 6 21:05:21 hqnl0246134 sshd[254648]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 21:05:25,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353525.1891022, 'message': 'Dec 6 21:05:23 hqnl0246134 sshd[254648]: Failed password for root from 61.177.173.18 port 21945 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:05:27,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353527.1917133, 'message': 'Dec 6 21:05:25 hqnl0246134 sshd[254648]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 21:05:29,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353529.2335644, 'message': 'Dec 6 21:05:27 hqnl0246134 sshd[254648]: Failed password for root from 61.177.173.18 port 21945 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:05:43,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353543.2063344, 'message': 'Dec 6 21:05:43 hqnl0246134 sshd[254657]: Invalid user b from 182.253.82.154 port 41670', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 21:05:45,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353545.20911, 'message': 'Dec 6 21:05:43 hqnl0246134 sshd[254657]: pam_imunify(sshd:auth): [IM360_RBL] The IP 182.253.82.154 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 21:05:45,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353545.2095063, 'message': 'Dec 6 21:05:43 hqnl0246134 sshd[254657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.82.154 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 21:05:45,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353545.209808, 'message': 'Dec 6 21:05:44 hqnl0246134 sshd[254657]: Failed password for invalid user b from 182.253.82.154 port 41670 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 21:05:47,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '182.253.82.154', 'timestamp': 1670353547.2100892, 'message': 'Dec 6 21:05:45 hqnl0246134 sshd[254657]: Disconnected from invalid user b 182.253.82.154 port 41670 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0254 seconds
WARNING [2022-12-06 21:05:48,884] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:05:48,885] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:05:50,225] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:05:50,225] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:05:50,235] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:05:50,247] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 21:06:07,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353567.2350678, 'message': 'Dec 6 21:06:06 hqnl0246134 sshd[254684]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:06:07,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353567.2353852, 'message': 'Dec 6 21:06:06 hqnl0246134 sshd[254684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 21:06:09,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353569.2388098, 'message': 'Dec 6 21:06:08 hqnl0246134 sshd[254684]: Failed password for root from 61.177.173.18 port 44692 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:06:09,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353569.2390223, 'message': 'Dec 6 21:06:08 hqnl0246134 sshd[254684]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 21:06:10,845] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:06:10,865] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.5929 seconds
INFO [2022-12-06 21:06:11,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353571.2421763, 'message': 'Dec 6 21:06:10 hqnl0246134 sshd[254684]: Failed password for root from 61.177.173.18 port 44692 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:06:11,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353571.2424219, 'message': 'Dec 6 21:06:11 hqnl0246134 sshd[254684]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:06:13,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353573.2468953, 'message': 'Dec 6 21:06:13 hqnl0246134 sshd[254684]: Failed password for root from 61.177.173.18 port 44692 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 21:06:17,835] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:06:17,836] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:06:17,843] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:06:17,855] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 21:06:20,735] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:06:20,735] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:06:20,743] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:06:20,754] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 21:06:47,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353607.288991, 'message': 'Dec 6 21:06:45 hqnl0246134 sshd[254741]: Invalid user xu from 59.120.103.230 port 41482', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 21:06:47,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353607.2898078, 'message': 'Dec 6 21:06:46 hqnl0246134 sshd[254741]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.120.103.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:06:47,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353607.289995, 'message': 'Dec 6 21:06:46 hqnl0246134 sshd[254741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.103.230 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
WARNING [2022-12-06 21:06:48,889] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:06:48,890] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:06:49,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353609.2900078, 'message': 'Dec 6 21:06:48 hqnl0246134 sshd[254741]: Failed password for invalid user xu from 59.120.103.230 port 41482 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 21:06:49,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353609.290381, 'message': 'Dec 6 21:06:48 hqnl0246134 sshd[254741]: Disconnected from invalid user xu 59.120.103.230 port 41482 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:06:55,324] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353615.3035574, 'message': 'Dec 6 21:06:53 hqnl0246134 sshd[254743]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:06:55,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353615.3039043, 'message': 'Dec 6 21:06:53 hqnl0246134 sshd[254743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:06:57,337] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353617.3071313, 'message': 'Dec 6 21:06:55 hqnl0246134 sshd[254743]: Failed password for root from 61.177.173.18 port 12568 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 21:06:57,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353617.3074143, 'message': 'Dec 6 21:06:55 hqnl0246134 sshd[254745]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.250.11.181 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 21:06:57,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353617.3075619, 'message': 'Dec 6 21:06:55 hqnl0246134 sshd[254745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.11.181 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:06:59,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.250.11.181', 'timestamp': 1670353619.3096952, 'message': 'Dec 6 21:06:57 hqnl0246134 sshd[254745]: Failed password for root from 103.250.11.181 port 46434 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 21:06:59,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353619.310059, 'message': 'Dec 6 21:06:58 hqnl0246134 sshd[254743]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 21:07:01,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353621.3095906, 'message': 'Dec 6 21:06:59 hqnl0246134 sshd[254743]: Failed password for root from 61.177.173.18 port 12568 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 21:07:01,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353621.3097568, 'message': 'Dec 6 21:07:00 hqnl0246134 sshd[254743]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 21:07:03,337] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353623.3127055, 'message': 'Dec 6 21:07:02 hqnl0246134 sshd[254743]: Failed password for root from 61.177.173.18 port 12568 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 21:07:09,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.138.7.117', 'timestamp': 1670353629.3190715, 'message': 'Dec 6 21:07:07 hqnl0246134 sshd[254755]: Invalid user traffic from 168.138.7.117 port 37164', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 21:07:09,359] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '168.138.7.117', 'timestamp': 1670353629.3193247, 'message': 'Dec 6 21:07:07 hqnl0246134 sshd[254755]: pam_imunify(sshd:auth): [IM360_RBL] The IP 168.138.7.117 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:07:09,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '168.138.7.117', 'timestamp': 1670353629.3194451, 'message': 'Dec 6 21:07:07 hqnl0246134 sshd[254755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.7.117 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
WARNING [2022-12-06 21:07:10,283] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:07:10,308] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0325 seconds
INFO [2022-12-06 21:07:11,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.138.7.117', 'timestamp': 1670353631.3220894, 'message': 'Dec 6 21:07:09 hqnl0246134 sshd[254755]: Failed password for invalid user traffic from 168.138.7.117 port 37164 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 21:07:11,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '168.138.7.117', 'timestamp': 1670353631.322293, 'message': 'Dec 6 21:07:10 hqnl0246134 sshd[254755]: Disconnected from invalid user traffic 168.138.7.117 port 37164 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:07:17,903] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:07:17,903] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:07:17,912] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:07:17,925] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-06 21:07:20,622] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:07:20,622] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:07:20,629] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:07:20,642] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 21:07:43,382] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353663.361275, 'message': 'Dec 6 21:07:41 hqnl0246134 sshd[254806]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 21:07:43,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353663.3616421, 'message': 'Dec 6 21:07:41 hqnl0246134 sshd[254806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:07:45,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353665.3616872, 'message': 'Dec 6 21:07:44 hqnl0246134 sshd[254806]: Failed password for root from 61.177.173.18 port 42235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 21:07:47,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353667.3640423, 'message': 'Dec 6 21:07:46 hqnl0246134 sshd[254806]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-06 21:07:48,896] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:07:48,897] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:07:49,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353669.3657167, 'message': 'Dec 6 21:07:48 hqnl0246134 sshd[254806]: Failed password for root from 61.177.173.18 port 42235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:07:49,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353669.3659184, 'message': 'Dec 6 21:07:48 hqnl0246134 sshd[254806]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:07:51,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353671.369079, 'message': 'Dec 6 21:07:51 hqnl0246134 sshd[254806]: Failed password for root from 61.177.173.18 port 42235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 21:07:55,184] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:07:55,185] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:07:55,192] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:07:55,203] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
WARNING [2022-12-06 21:08:10,289] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:08:10,311] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0323 seconds
INFO [2022-12-06 21:08:17,798] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:08:17,799] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:08:17,808] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:08:17,820] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 21:08:20,459] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:08:20,460] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:08:20,467] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:08:20,478] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 21:08:31,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353711.4167378, 'message': 'Dec 6 21:08:29 hqnl0246134 sshd[254852]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 21:08:31,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353711.4170082, 'message': 'Dec 6 21:08:29 hqnl0246134 sshd[254852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 21:08:31,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353711.4171722, 'message': 'Dec 6 21:08:31 hqnl0246134 sshd[254852]: Failed password for root from 61.177.173.18 port 60850 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 21:08:33,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353713.4188335, 'message': 'Dec 6 21:08:31 hqnl0246134 sshd[254852]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 21:08:35,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353715.423361, 'message': 'Dec 6 21:08:33 hqnl0246134 sshd[254852]: Failed password for root from 61.177.173.18 port 60850 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 21:08:37,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353717.4272282, 'message': 'Dec 6 21:08:36 hqnl0246134 sshd[254852]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:08:39,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353719.4303188, 'message': 'Dec 6 21:08:38 hqnl0246134 sshd[254852]: Failed password for root from 61.177.173.18 port 60850 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-06 21:08:48,905] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:08:48,906] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 21:09:10,293] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:09:10,314] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0294 seconds
INFO [2022-12-06 21:09:17,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '129.146.28.20', 'timestamp': 1670353757.475184, 'message': 'Dec 6 21:09:16 hqnl0246134 sshd[255014]: Invalid user xu from 129.146.28.20 port 43722', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 21:09:17,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '129.146.28.20', 'timestamp': 1670353757.4757066, 'message': 'Dec 6 21:09:16 hqnl0246134 sshd[255014]: pam_imunify(sshd:auth): [IM360_RBL] The IP 129.146.28.20 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 21:09:17,532] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '129.146.28.20', 'timestamp': 1670353757.4758725, 'message': 'Dec 6 21:09:16 hqnl0246134 sshd[255014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.28.20 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0161 seconds
INFO [2022-12-06 21:09:17,817] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:09:17,818] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:09:17,829] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:09:17,848] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0287 seconds
INFO [2022-12-06 21:09:19,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '129.146.28.20', 'timestamp': 1670353759.4755538, 'message': 'Dec 6 21:09:18 hqnl0246134 sshd[255014]: Failed password for invalid user xu from 129.146.28.20 port 43722 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0457 seconds
INFO [2022-12-06 21:09:19,523] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353759.4758563, 'message': 'Dec 6 21:09:18 hqnl0246134 sshd[255019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0459 seconds
INFO [2022-12-06 21:09:19,567] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '129.146.28.20', 'timestamp': 1670353759.476236, 'message': 'Dec 6 21:09:19 hqnl0246134 sshd[255014]: Disconnected from invalid user xu 129.146.28.20 port 43722 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0441 seconds
INFO [2022-12-06 21:09:19,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353759.4760277, 'message': 'Dec 6 21:09:18 hqnl0246134 sshd[255019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0442 seconds
INFO [2022-12-06 21:09:20,616] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:09:20,616] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:09:20,623] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:09:20,634] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 21:09:21,509] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353761.4755461, 'message': 'Dec 6 21:09:21 hqnl0246134 sshd[255019]: Failed password for root from 61.177.173.18 port 39856 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 21:09:21,844] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:09:21,844] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:09:21,851] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:09:21,862] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 21:09:23,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353763.4784718, 'message': 'Dec 6 21:09:23 hqnl0246134 sshd[255019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:09:25,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353765.4794903, 'message': 'Dec 6 21:09:25 hqnl0246134 sshd[255019]: Failed password for root from 61.177.173.18 port 39856 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:09:25,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353765.4797747, 'message': 'Dec 6 21:09:25 hqnl0246134 sshd[255019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:09:27,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353767.4805336, 'message': 'Dec 6 21:09:27 hqnl0246134 sshd[255019]: Failed password for root from 61.177.173.18 port 39856 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 21:09:48,909] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:09:48,910] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:09:49,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353789.5042498, 'message': 'Dec 6 21:09:48 hqnl0246134 sshd[255047]: Invalid user ss from 59.120.103.230 port 58278', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 21:09:49,559] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353789.5048046, 'message': 'Dec 6 21:09:48 hqnl0246134 sshd[255047]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.120.103.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 21:09:49,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353789.5050282, 'message': 'Dec 6 21:09:48 hqnl0246134 sshd[255047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.103.230 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:09:51,523] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353791.5053673, 'message': 'Dec 6 21:09:50 hqnl0246134 sshd[255047]: Failed password for invalid user ss from 59.120.103.230 port 58278 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:09:53,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353793.5084193, 'message': 'Dec 6 21:09:52 hqnl0246134 sshd[255047]: Disconnected from invalid user ss 59.120.103.230 port 58278 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 21:10:07,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353807.5252957, 'message': 'Dec 6 21:10:06 hqnl0246134 sshd[255079]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 21:10:07,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353807.5256736, 'message': 'Dec 6 21:10:06 hqnl0246134 sshd[255079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 21:10:09,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353809.5257103, 'message': 'Dec 6 21:10:08 hqnl0246134 sshd[255079]: Failed password for root from 61.177.173.18 port 53779 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
WARNING [2022-12-06 21:10:10,295] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:10:10,317] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0290 seconds
INFO [2022-12-06 21:10:11,560] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353811.5266743, 'message': 'Dec 6 21:10:10 hqnl0246134 sshd[255079]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 21:10:13,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353813.5280144, 'message': 'Dec 6 21:10:12 hqnl0246134 sshd[255079]: Failed password for root from 61.177.173.18 port 53779 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 21:10:13,578] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353813.5297813, 'message': 'Dec 6 21:10:13 hqnl0246134 sshd[255079]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 21:10:15,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353815.530229, 'message': 'Dec 6 21:10:14 hqnl0246134 sshd[255079]: Failed password for root from 61.177.173.18 port 53779 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:10:17,809] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:10:17,809] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:10:17,817] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:10:17,829] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 21:10:20,479] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:10:20,479] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:10:20,486] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:10:20,498] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 21:10:39,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.83.28.210', 'timestamp': 1670353839.5615745, 'message': 'Dec 6 21:10:38 hqnl0246134 sshd[255087]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.83.28.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 21:10:39,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.83.28.210', 'timestamp': 1670353839.5619245, 'message': 'Dec 6 21:10:38 hqnl0246134 sshd[255087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.83.28.210 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:10:41,580] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '186.83.28.210', 'timestamp': 1670353841.563072, 'message': 'Dec 6 21:10:41 hqnl0246134 sshd[255087]: Failed password for root from 186.83.28.210 port 60500 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 21:10:45,416] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 21:10:45,486] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 21:10:45,487] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 21:10:45,487] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 21:10:45,488] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 21:10:45,488] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 21:10:45,534] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 21:10:45,568] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0777 seconds
WARNING [2022-12-06 21:10:45,579] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 21:10:45,583] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:10:45,706] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:10:45,706] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 21:10:45,714] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.1566 seconds
INFO [2022-12-06 21:10:45,717] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.1535 seconds
WARNING [2022-12-06 21:10:45,720] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:10:45,732] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0238 seconds
WARNING [2022-12-06 21:10:48,912] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:10:48,913] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:10:55,595] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353855.5765913, 'message': 'Dec 6 21:10:55 hqnl0246134 sshd[255158]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:10:55,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353855.5768604, 'message': 'Dec 6 21:10:55 hqnl0246134 sshd[255158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:10:59,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353859.5788918, 'message': 'Dec 6 21:10:57 hqnl0246134 sshd[255158]: Failed password for root from 61.177.173.18 port 26647 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 21:10:59,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353859.5790932, 'message': 'Dec 6 21:10:59 hqnl0246134 sshd[255158]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:11:01,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353861.5824018, 'message': 'Dec 6 21:11:01 hqnl0246134 sshd[255158]: Failed password for root from 61.177.173.18 port 26647 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:11:03,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353863.5836546, 'message': 'Dec 6 21:11:01 hqnl0246134 sshd[255158]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:11:05,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353865.585647, 'message': 'Dec 6 21:11:03 hqnl0246134 sshd[255158]: Failed password for root from 61.177.173.18 port 26647 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 21:11:10,300] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:11:10,322] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0301 seconds
INFO [2022-12-06 21:11:15,615] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 21:11:15,616] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 21:11:15,617] im360.plugins.client360: Waiting 2 minutes before retry...
INFO [2022-12-06 21:11:19,828] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:11:19,829] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:11:19,839] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:11:19,852] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
INFO [2022-12-06 21:11:22,752] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:11:22,753] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:11:22,760] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:11:22,772] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 21:11:43,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353903.622497, 'message': 'Dec 6 21:11:42 hqnl0246134 sshd[255196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 21:11:43,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353903.622988, 'message': 'Dec 6 21:11:42 hqnl0246134 sshd[255196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 21:11:45,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353905.6247294, 'message': 'Dec 6 21:11:44 hqnl0246134 sshd[255196]: Failed password for root from 61.177.173.18 port 50976 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 21:11:45,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353905.624946, 'message': 'Dec 6 21:11:44 hqnl0246134 sshd[255196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 21:11:47,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353907.6276062, 'message': 'Dec 6 21:11:46 hqnl0246134 sshd[255196]: Failed password for root from 61.177.173.18 port 50976 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:11:47,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353907.627802, 'message': 'Dec 6 21:11:47 hqnl0246134 sshd[255196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
WARNING [2022-12-06 21:11:48,914] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:11:48,915] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:11:51,654] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353911.6327798, 'message': 'Dec 6 21:11:49 hqnl0246134 sshd[255196]: Failed password for root from 61.177.173.18 port 50976 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-06 21:11:53,995] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 21:12:10,304] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:12:10,323] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0270 seconds
INFO [2022-12-06 21:12:17,958] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:12:17,959] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:12:17,967] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:12:17,979] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 21:12:20,556] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:12:20,556] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:12:20,563] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:12:20,574] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 21:12:29,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353949.691095, 'message': 'Dec 6 21:12:28 hqnl0246134 sshd[255246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 21:12:29,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353949.691555, 'message': 'Dec 6 21:12:28 hqnl0246134 sshd[255246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:12:31,722] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353951.6955297, 'message': 'Dec 6 21:12:30 hqnl0246134 sshd[255246]: Failed password for root from 61.177.173.18 port 21112 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 21:12:31,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353951.6957722, 'message': 'Dec 6 21:12:31 hqnl0246134 sshd[255246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 21:12:33,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353953.698009, 'message': 'Dec 6 21:12:32 hqnl0246134 sshd[255246]: Failed password for root from 61.177.173.18 port 21112 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 21:12:33,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353953.6984065, 'message': 'Dec 6 21:12:33 hqnl0246134 sshd[255246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:12:37,722] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353957.7022395, 'message': 'Dec 6 21:12:35 hqnl0246134 sshd[255246]: Failed password for root from 61.177.173.18 port 21112 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:12:40,133] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:12:40,134] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:12:40,141] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:12:40,158] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0235 seconds
INFO [2022-12-06 21:12:41,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353961.707218, 'message': 'Dec 6 21:12:40 hqnl0246134 sshd[255253]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.120.103.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 21:12:41,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353961.7074528, 'message': 'Dec 6 21:12:40 hqnl0246134 sshd[255253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.103.230 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:12:43,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '59.120.103.230', 'timestamp': 1670353963.70868, 'message': 'Dec 6 21:12:42 hqnl0246134 sshd[255253]: Failed password for root from 59.120.103.230 port 46676 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
WARNING [2022-12-06 21:12:48,917] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:12:48,918] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:13:02,302] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 21:13:02,309] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:13:02,320] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0171 seconds
WARNING [2022-12-06 21:13:10,309] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:13:10,328] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0264 seconds
INFO [2022-12-06 21:13:17,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353997.7520213, 'message': 'Dec 6 21:13:15 hqnl0246134 sshd[255305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 21:13:17,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353997.7526639, 'message': 'Dec 6 21:13:15 hqnl0246134 sshd[255305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 21:13:17,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353997.7529383, 'message': 'Dec 6 21:13:17 hqnl0246134 sshd[255305]: Failed password for root from 61.177.173.18 port 48517 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:13:19,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670353999.7530575, 'message': 'Dec 6 21:13:18 hqnl0246134 sshd[255305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 21:13:19,893] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:13:19,894] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:13:19,901] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:13:19,912] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 21:13:21,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354001.754972, 'message': 'Dec 6 21:13:20 hqnl0246134 sshd[255305]: Failed password for root from 61.177.173.18 port 48517 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 21:13:22,565] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:13:22,566] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:13:22,572] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:13:22,583] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 21:13:23,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354003.7559783, 'message': 'Dec 6 21:13:22 hqnl0246134 sshd[255305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 21:13:25,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354005.7572384, 'message': 'Dec 6 21:13:24 hqnl0246134 sshd[255305]: Failed password for root from 61.177.173.18 port 48517 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0167 seconds
WARNING [2022-12-06 21:13:48,922] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:13:48,924] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:13:55,021] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 21:13:55,088] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 21:13:55,089] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 21:13:55,089] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 21:13:55,089] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 21:13:55,090] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 21:13:55,107] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 21:13:55,126] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0351 seconds
WARNING [2022-12-06 21:13:55,133] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 21:13:55,136] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:13:55,152] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0326 seconds
INFO [2022-12-06 21:13:55,154] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0297 seconds
INFO [2022-12-06 21:14:03,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354043.797767, 'message': 'Dec 6 21:14:02 hqnl0246134 sshd[255345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:14:03,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354043.798076, 'message': 'Dec 6 21:14:02 hqnl0246134 sshd[255345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:14:05,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354045.8014748, 'message': 'Dec 6 21:14:04 hqnl0246134 sshd[255345]: Failed password for root from 61.177.173.18 port 14931 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:14:05,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354045.8024266, 'message': 'Dec 6 21:14:04 hqnl0246134 sshd[255345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 21:14:07,833] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354047.8016021, 'message': 'Dec 6 21:14:06 hqnl0246134 sshd[255345]: Failed password for root from 61.177.173.18 port 14931 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 21:14:07,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354047.8019018, 'message': 'Dec 6 21:14:07 hqnl0246134 sshd[255345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 21:14:09,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354049.8021007, 'message': 'Dec 6 21:14:09 hqnl0246134 sshd[255345]: Failed password for root from 61.177.173.18 port 14931 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 21:14:10,313] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:14:10,335] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0296 seconds
INFO [2022-12-06 21:14:12,127] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:14:12,127] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:14:12,134] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:14:12,146] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 21:14:18,605] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:14:18,605] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:14:18,613] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:14:18,625] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 21:14:21,305] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:14:21,305] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:14:21,312] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:14:21,323] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 21:14:25,216] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 21:14:25,217] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 21:14:25,217] im360.plugins.client360: Waiting 3 minutes before retry...
WARNING [2022-12-06 21:14:48,927] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:14:48,928] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:14:51,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354091.844328, 'message': 'Dec 6 21:14:51 hqnl0246134 sshd[255413]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 21:14:51,893] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354091.8451498, 'message': 'Dec 6 21:14:51 hqnl0246134 sshd[255413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:14:53,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354093.8473074, 'message': 'Dec 6 21:14:53 hqnl0246134 sshd[255413]: Failed password for root from 61.177.173.18 port 38304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:14:53,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354093.8475423, 'message': 'Dec 6 21:14:53 hqnl0246134 sshd[255413]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:14:55,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '129.146.28.20', 'timestamp': 1670354095.8544219, 'message': 'Dec 6 21:14:54 hqnl0246134 sshd[255411]: Invalid user ss from 129.146.28.20 port 57492', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0523 seconds
INFO [2022-12-06 21:14:55,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354095.8551269, 'message': 'Dec 6 21:14:55 hqnl0246134 sshd[255413]: Failed password for root from 61.177.173.18 port 38304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0518 seconds
INFO [2022-12-06 21:14:55,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '129.146.28.20', 'timestamp': 1670354095.8547342, 'message': 'Dec 6 21:14:54 hqnl0246134 sshd[255411]: pam_imunify(sshd:auth): [IM360_RBL] The IP 129.146.28.20 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 21:14:55,943] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '129.146.28.20', 'timestamp': 1670354095.854927, 'message': 'Dec 6 21:14:54 hqnl0246134 sshd[255411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.28.20 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:14:57,893] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354097.8569565, 'message': 'Dec 6 21:14:55 hqnl0246134 sshd[255413]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 21:14:57,894] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '129.146.28.20', 'timestamp': 1670354097.8572547, 'message': 'Dec 6 21:14:56 hqnl0246134 sshd[255411]: Failed password for invalid user ss from 129.146.28.20 port 57492 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 21:14:57,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '129.146.28.20', 'timestamp': 1670354097.8574162, 'message': 'Dec 6 21:14:56 hqnl0246134 sshd[255411]: Disconnected from invalid user ss 129.146.28.20 port 57492 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 21:14:59,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354099.857778, 'message': 'Dec 6 21:14:58 hqnl0246134 sshd[255413]: Failed password for root from 61.177.173.18 port 38304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 21:15:10,318] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:15:10,338] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0285 seconds
INFO [2022-12-06 21:15:17,896] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:15:17,896] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:15:17,908] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:15:17,921] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0238 seconds
INFO [2022-12-06 21:15:20,706] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:15:20,706] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:15:20,713] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:15:20,725] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 21:15:31,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '59.120.103.230', 'timestamp': 1670354131.89431, 'message': 'Dec 6 21:15:31 hqnl0246134 sshd[255472]: pam_imunify(sshd:auth): [IM360_RBL] The IP 59.120.103.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 21:15:31,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '59.120.103.230', 'timestamp': 1670354131.8945315, 'message': 'Dec 6 21:15:31 hqnl0246134 sshd[255472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.103.230 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:15:35,918] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '59.120.103.230', 'timestamp': 1670354135.9007373, 'message': 'Dec 6 21:15:34 hqnl0246134 sshd[255472]: Failed password for root from 59.120.103.230 port 35072 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 21:15:38,703] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:15:38,704] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:15:38,712] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:15:38,725] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 21:15:41,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354141.911239, 'message': 'Dec 6 21:15:40 hqnl0246134 sshd[255479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 21:15:41,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354141.9118707, 'message': 'Dec 6 21:15:40 hqnl0246134 sshd[255479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:15:43,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354143.912231, 'message': 'Dec 6 21:15:42 hqnl0246134 sshd[255479]: Failed password for root from 61.177.173.18 port 62927 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 21:15:45,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354145.9142826, 'message': 'Dec 6 21:15:44 hqnl0246134 sshd[255479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0672 seconds
INFO [2022-12-06 21:15:47,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354147.9161808, 'message': 'Dec 6 21:15:47 hqnl0246134 sshd[255479]: Failed password for root from 61.177.173.18 port 62927 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0233 seconds
WARNING [2022-12-06 21:15:48,933] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:15:48,934] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:15:49,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354149.917819, 'message': 'Dec 6 21:15:49 hqnl0246134 sshd[255479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 21:15:51,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354151.9234586, 'message': 'Dec 6 21:15:51 hqnl0246134 sshd[255479]: Failed password for root from 61.177.173.18 port 62927 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
WARNING [2022-12-06 21:16:10,323] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:16:10,345] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0312 seconds
INFO [2022-12-06 21:16:13,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354173.9580212, 'message': 'Dec 6 21:16:13 hqnl0246134 sshd[255506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 21:16:15,976] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354175.9573317, 'message': 'Dec 6 21:16:15 hqnl0246134 sshd[255506]: Failed password for root from 165.227.166.207 port 43412 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:16:17,915] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:16:17,915] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:16:17,923] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:16:17,934] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 21:16:20,453] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:16:20,454] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:16:20,461] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:16:20,472] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 21:16:29,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354189.9771793, 'message': 'Dec 6 21:16:28 hqnl0246134 sshd[255528]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 21:16:30,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354189.977401, 'message': 'Dec 6 21:16:28 hqnl0246134 sshd[255528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:16:31,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354191.9777787, 'message': 'Dec 6 21:16:31 hqnl0246134 sshd[255528]: Failed password for root from 61.177.173.18 port 21261 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:16:34,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354193.9798658, 'message': 'Dec 6 21:16:32 hqnl0246134 sshd[255528]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 21:16:36,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354195.9818227, 'message': 'Dec 6 21:16:35 hqnl0246134 sshd[255528]: Failed password for root from 61.177.173.18 port 21261 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 21:16:38,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354197.9847028, 'message': 'Dec 6 21:16:37 hqnl0246134 sshd[255528]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:16:40,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354199.9879918, 'message': 'Dec 6 21:16:38 hqnl0246134 sshd[255528]: Failed password for root from 61.177.173.18 port 21261 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 21:16:48,937] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:16:48,937] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 21:17:10,330] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:17:10,351] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0302 seconds
INFO [2022-12-06 21:17:17,767] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:17:17,768] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:17:17,779] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:17:17,792] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
INFO [2022-12-06 21:17:18,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354238.030158, 'message': 'Dec 6 21:17:17 hqnl0246134 sshd[255573]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:17:18,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354238.0303833, 'message': 'Dec 6 21:17:17 hqnl0246134 sshd[255573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 21:17:20,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354240.0336912, 'message': 'Dec 6 21:17:19 hqnl0246134 sshd[255573]: Failed password for root from 61.177.173.18 port 54862 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:17:20,071] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354240.0339906, 'message': 'Dec 6 21:17:19 hqnl0246134 sshd[255573]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:17:20,431] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:17:20,432] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:17:20,439] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:17:20,451] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 21:17:22,057] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354242.0363429, 'message': 'Dec 6 21:17:21 hqnl0246134 sshd[255573]: Failed password for root from 61.177.173.18 port 54862 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 21:17:24,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354244.038756, 'message': 'Dec 6 21:17:22 hqnl0246134 sshd[255573]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:17:26,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354246.0428631, 'message': 'Dec 6 21:17:24 hqnl0246134 sshd[255573]: Failed password for root from 61.177.173.18 port 54862 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 21:17:28,998] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:17:28,999] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:17:29,009] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:17:29,021] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
WARNING [2022-12-06 21:17:48,940] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:17:48,941] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:18:06,133] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354286.0904484, 'message': 'Dec 6 21:18:05 hqnl0246134 sshd[255636]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-06 21:18:06,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354286.0910661, 'message': 'Dec 6 21:18:05 hqnl0246134 sshd[255638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 21:18:06,156] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354286.0908904, 'message': 'Dec 6 21:18:05 hqnl0246134 sshd[255636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 21:18:08,125] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354288.0927799, 'message': 'Dec 6 21:18:06 hqnl0246134 sshd[255636]: Failed password for root from 61.177.173.18 port 17302 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 21:18:08,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354288.0929813, 'message': 'Dec 6 21:18:07 hqnl0246134 sshd[255638]: Failed password for root from 165.227.166.207 port 53698 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 21:18:08,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354288.0930943, 'message': 'Dec 6 21:18:07 hqnl0246134 sshd[255636]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 21:18:10,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354290.0937293, 'message': 'Dec 6 21:18:08 hqnl0246134 sshd[255636]: Failed password for root from 61.177.173.18 port 17302 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 21:18:10,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354290.0939035, 'message': 'Dec 6 21:18:09 hqnl0246134 sshd[255636]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 21:18:10,331] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:18:10,351] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0275 seconds
INFO [2022-12-06 21:18:12,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354292.0975223, 'message': 'Dec 6 21:18:11 hqnl0246134 sshd[255636]: Failed password for root from 61.177.173.18 port 17302 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 21:18:15,920] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 21:18:15,987] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 21:18:15,987] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 21:18:15,988] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 21:18:15,988] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 21:18:15,989] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 21:18:16,002] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 21:18:16,022] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0318 seconds
WARNING [2022-12-06 21:18:16,030] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 21:18:16,032] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:18:16,051] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0362 seconds
INFO [2022-12-06 21:18:16,053] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0349 seconds
INFO [2022-12-06 21:18:17,899] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:18:17,900] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:18:17,908] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:18:17,920] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 21:18:20,525] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:18:20,526] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:18:20,534] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:18:20,545] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
WARNING [2022-12-06 21:18:48,946] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:18:48,948] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:18:54,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354334.1470447, 'message': 'Dec 6 21:18:52 hqnl0246134 sshd[255679]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 21:18:54,208] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354334.1479545, 'message': 'Dec 6 21:18:52 hqnl0246134 sshd[255679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 21:18:56,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354336.147319, 'message': 'Dec 6 21:18:54 hqnl0246134 sshd[255679]: Failed password for root from 61.177.173.18 port 41499 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:18:57,160] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 21:18:57,160] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 21:18:57,161] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 21:18:58,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354338.1503007, 'message': 'Dec 6 21:18:56 hqnl0246134 sshd[255679]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 21:19:00,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354340.153102, 'message': 'Dec 6 21:18:58 hqnl0246134 sshd[255679]: Failed password for root from 61.177.173.18 port 41499 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 21:19:00,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354340.1533175, 'message': 'Dec 6 21:18:59 hqnl0246134 sshd[255679]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 21:19:02,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354342.154341, 'message': 'Dec 6 21:19:00 hqnl0246134 sshd[255679]: Failed password for root from 61.177.173.18 port 41499 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 21:19:04,175] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:19:04,176] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:19:04,183] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:19:04,197] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
WARNING [2022-12-06 21:19:10,337] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:19:10,357] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0291 seconds
INFO [2022-12-06 21:19:17,737] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:19:17,738] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:19:17,747] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:19:17,760] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 21:19:20,539] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:19:20,539] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:19:20,547] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:19:20,559] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 21:19:40,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354380.2013965, 'message': 'Dec 6 21:19:39 hqnl0246134 sshd[255723]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 21:19:40,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354380.2019072, 'message': 'Dec 6 21:19:39 hqnl0246134 sshd[255723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 21:19:42,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354382.2019782, 'message': 'Dec 6 21:19:41 hqnl0246134 sshd[255723]: Failed password for root from 61.177.173.18 port 12089 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 21:19:42,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354382.2022262, 'message': 'Dec 6 21:19:41 hqnl0246134 sshd[255723]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 21:19:44,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354384.2043786, 'message': 'Dec 6 21:19:43 hqnl0246134 sshd[255723]: Failed password for root from 61.177.173.18 port 12089 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 21:19:46,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354386.205944, 'message': 'Dec 6 21:19:44 hqnl0246134 sshd[255723]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 21:19:48,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354388.2080576, 'message': 'Dec 6 21:19:46 hqnl0246134 sshd[255723]: Failed password for root from 61.177.173.18 port 12089 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 21:19:48,951] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:19:48,952] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:19:56,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354396.2203434, 'message': 'Dec 6 21:19:55 hqnl0246134 sshd[255735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 21:19:58,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354398.2221591, 'message': 'Dec 6 21:19:57 hqnl0246134 sshd[255735]: Failed password for root from 165.227.166.207 port 35736 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 21:20:04,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '129.146.28.20', 'timestamp': 1670354404.2405481, 'message': 'Dec 6 21:20:02 hqnl0246134 sshd[255740]: pam_imunify(sshd:auth): [IM360_RBL] The IP 129.146.28.20 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0969 seconds
INFO [2022-12-06 21:20:04,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '129.146.28.20', 'timestamp': 1670354404.2408288, 'message': 'Dec 6 21:20:02 hqnl0246134 sshd[255740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.28.20 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0383 seconds
INFO [2022-12-06 21:20:04,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '129.146.28.20', 'timestamp': 1670354404.2410648, 'message': 'Dec 6 21:20:04 hqnl0246134 sshd[255740]: Failed password for root from 129.146.28.20 port 40984 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 21:20:07,488] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:20:07,489] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:20:07,497] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:20:07,508] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
WARNING [2022-12-06 21:20:10,340] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:20:10,362] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0302 seconds
INFO [2022-12-06 21:20:14,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.230.228.27', 'timestamp': 1670354414.2356656, 'message': 'Dec 6 21:20:13 hqnl0246134 sshd[255777]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.230.228.27 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 21:20:14,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.230.228.27', 'timestamp': 1670354414.2360666, 'message': 'Dec 6 21:20:13 hqnl0246134 sshd[255777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.228.27 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 21:20:16,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '157.230.228.27', 'timestamp': 1670354416.2362633, 'message': 'Dec 6 21:20:15 hqnl0246134 sshd[255777]: Failed password for root from 157.230.228.27 port 47692 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 21:20:19,857] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:20:19,858] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:20:19,865] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:20:19,877] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 21:20:22,494] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:20:22,494] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:20:22,502] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:20:22,514] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 21:20:28,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354428.2439516, 'message': 'Dec 6 21:20:27 hqnl0246134 sshd[255803]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 21:20:28,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354428.2444174, 'message': 'Dec 6 21:20:27 hqnl0246134 sshd[255803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:20:30,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354430.2456088, 'message': 'Dec 6 21:20:29 hqnl0246134 sshd[255803]: Failed password for root from 61.177.173.18 port 34356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:20:30,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354430.2500458, 'message': 'Dec 6 21:20:29 hqnl0246134 sshd[255803]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 21:20:32,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354432.2483597, 'message': 'Dec 6 21:20:31 hqnl0246134 sshd[255803]: Failed password for root from 61.177.173.18 port 34356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:20:34,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354434.249529, 'message': 'Dec 6 21:20:33 hqnl0246134 sshd[255803]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:20:36,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354436.2512314, 'message': 'Dec 6 21:20:35 hqnl0246134 sshd[255803]: Failed password for root from 61.177.173.18 port 34356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
WARNING [2022-12-06 21:20:48,954] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:20:48,955] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:20:52,295] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354452.2715669, 'message': 'Dec 6 21:20:51 hqnl0246134 sshd[255818]: Invalid user info from 49.50.230.198 port 50298', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 21:20:52,314] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354452.272418, 'message': 'Dec 6 21:20:51 hqnl0246134 sshd[255818]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.50.230.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:20:52,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354452.2725673, 'message': 'Dec 6 21:20:51 hqnl0246134 sshd[255818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.50.230.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:20:54,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354454.2735698, 'message': 'Dec 6 21:20:53 hqnl0246134 sshd[255818]: Failed password for invalid user info from 49.50.230.198 port 50298 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 21:20:56,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354456.2767403, 'message': 'Dec 6 21:20:55 hqnl0246134 sshd[255818]: Disconnected from invalid user info 49.50.230.198 port 50298 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0166 seconds
WARNING [2022-12-06 21:21:10,345] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:21:10,366] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0296 seconds
INFO [2022-12-06 21:21:16,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354476.2981818, 'message': 'Dec 6 21:21:15 hqnl0246134 sshd[255831]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 21:21:16,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354476.2985668, 'message': 'Dec 6 21:21:15 hqnl0246134 sshd[255831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:21:18,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354478.3014214, 'message': 'Dec 6 21:21:17 hqnl0246134 sshd[255831]: Failed password for root from 61.177.173.18 port 57847 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 21:21:19,723] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:21:19,724] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:21:19,732] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:21:19,744] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 21:21:20,487] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354480.304923, 'message': 'Dec 6 21:21:19 hqnl0246134 sshd[255831]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1820 seconds
INFO [2022-12-06 21:21:22,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354482.3075213, 'message': 'Dec 6 21:21:20 hqnl0246134 sshd[255831]: Failed password for root from 61.177.173.18 port 57847 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0387 seconds
INFO [2022-12-06 21:21:22,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354482.3079212, 'message': 'Dec 6 21:21:21 hqnl0246134 sshd[255831]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 21:21:22,623] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:21:22,623] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:21:22,655] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:21:22,688] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0512 seconds
INFO [2022-12-06 21:21:24,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354484.3099203, 'message': 'Dec 6 21:21:23 hqnl0246134 sshd[255831]: Failed password for root from 61.177.173.18 port 57847 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 21:21:26,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.21.236.151', 'timestamp': 1670354486.3102393, 'message': 'Dec 6 21:21:24 hqnl0246134 sshd[255856]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.21.236.151 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 21:21:26,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.21.236.151', 'timestamp': 1670354486.3105068, 'message': 'Dec 6 21:21:24 hqnl0246134 sshd[255856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.21.236.151 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:21:28,368] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:21:28,368] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:21:28,380] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:21:28,401] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0324 seconds
INFO [2022-12-06 21:21:28,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '201.21.236.151', 'timestamp': 1670354488.3701828, 'message': 'Dec 6 21:21:27 hqnl0246134 sshd[255856]: Failed password for root from 201.21.236.151 port 34796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 21:21:36,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '23.224.81.32', 'timestamp': 1670354496.3267665, 'message': 'Dec 6 21:21:34 hqnl0246134 sshd[255868]: Invalid user ns from 23.224.81.32 port 45662', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 21:21:36,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '23.224.81.32', 'timestamp': 1670354496.3273113, 'message': 'Dec 6 21:21:34 hqnl0246134 sshd[255868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.224.81.32 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:21:38,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '23.224.81.32', 'timestamp': 1670354498.3294036, 'message': 'Dec 6 21:21:37 hqnl0246134 sshd[255868]: Failed password for invalid user ns from 23.224.81.32 port 45662 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 21:21:40,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '23.224.81.32', 'timestamp': 1670354500.3313928, 'message': 'Dec 6 21:21:39 hqnl0246134 sshd[255868]: Disconnected from invalid user ns 23.224.81.32 port 45662 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:21:48,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354508.3410485, 'message': 'Dec 6 21:21:47 hqnl0246134 sshd[255879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0378 seconds
WARNING [2022-12-06 21:21:48,958] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:21:48,958] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:21:50,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354510.341654, 'message': 'Dec 6 21:21:49 hqnl0246134 sshd[255879]: Failed password for root from 165.227.166.207 port 46096 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 21:21:53,999] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 21:22:04,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354524.364996, 'message': 'Dec 6 21:22:04 hqnl0246134 sshd[255919]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 21:22:04,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354524.365335, 'message': 'Dec 6 21:22:04 hqnl0246134 sshd[255919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:22:06,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354526.3667507, 'message': 'Dec 6 21:22:06 hqnl0246134 sshd[255919]: Failed password for root from 61.177.173.18 port 33645 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
WARNING [2022-12-06 21:22:10,348] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:22:10,378] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0380 seconds
INFO [2022-12-06 21:22:10,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354530.3699427, 'message': 'Dec 6 21:22:08 hqnl0246134 sshd[255919]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 21:22:12,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354532.372424, 'message': 'Dec 6 21:22:10 hqnl0246134 sshd[255919]: Failed password for root from 61.177.173.18 port 33645 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:22:14,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354534.3768158, 'message': 'Dec 6 21:22:12 hqnl0246134 sshd[255919]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 21:22:16,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354536.37937, 'message': 'Dec 6 21:22:14 hqnl0246134 sshd[255919]: Failed password for root from 61.177.173.18 port 33645 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 21:22:18,217] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:22:18,218] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:22:18,239] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:22:18,270] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0372 seconds
INFO [2022-12-06 21:22:20,845] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:22:20,845] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:22:20,853] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:22:20,864] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 21:22:32,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '66.43.250.3', 'timestamp': 1670354552.3932848, 'message': 'Dec 6 21:22:31 hqnl0246134 sshd[255953]: pam_imunify(sshd:auth): [IM360_RBL] The IP 66.43.250.3 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-06 21:22:32,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '66.43.250.3', 'timestamp': 1670354552.3938887, 'message': 'Dec 6 21:22:31 hqnl0246134 sshd[255953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.43.250.3 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 21:22:34,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '66.43.250.3', 'timestamp': 1670354554.39146, 'message': 'Dec 6 21:22:33 hqnl0246134 sshd[255953]: Failed password for root from 66.43.250.3 port 51935 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 21:22:37,953] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:22:37,954] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:22:37,962] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:22:37,974] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
WARNING [2022-12-06 21:22:48,963] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:22:48,965] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:22:52,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354572.4117105, 'message': 'Dec 6 21:22:52 hqnl0246134 sshd[255988]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 21:22:52,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354572.4122653, 'message': 'Dec 6 21:22:52 hqnl0246134 sshd[255988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:22:56,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354576.4162486, 'message': 'Dec 6 21:22:54 hqnl0246134 sshd[255988]: Failed password for root from 61.177.173.18 port 52912 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 21:22:56,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354576.4166079, 'message': 'Dec 6 21:22:54 hqnl0246134 sshd[255988]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 21:22:58,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354578.4190183, 'message': 'Dec 6 21:22:56 hqnl0246134 sshd[255988]: Failed password for root from 61.177.173.18 port 52912 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 21:22:58,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354578.4193997, 'message': 'Dec 6 21:22:56 hqnl0246134 sshd[255988]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 21:23:00,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354580.4210908, 'message': 'Dec 6 21:22:59 hqnl0246134 sshd[255988]: Failed password for root from 61.177.173.18 port 52912 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
WARNING [2022-12-06 21:23:10,350] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:23:10,371] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0281 seconds
INFO [2022-12-06 21:23:17,809] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:23:17,809] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:23:17,818] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:23:17,830] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 21:23:20,329] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:23:20,329] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:23:20,337] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:23:20,348] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 21:23:24,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670354604.4979968, 'message': 'Dec 6 21:23:23 hqnl0246134 sshd[256019]: Invalid user tibero6 from 46.101.123.135 port 49666', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 21:23:24,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.123.135', 'timestamp': 1670354604.4982574, 'message': 'Dec 6 21:23:23 hqnl0246134 sshd[256019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.123.135 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:23:24,557] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.123.135', 'timestamp': 1670354604.5009036, 'message': 'Dec 6 21:23:23 hqnl0246134 sshd[256019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.123.135 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:23:26,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670354606.4981925, 'message': 'Dec 6 21:23:25 hqnl0246134 sshd[256019]: Failed password for invalid user tibero6 from 46.101.123.135 port 49666 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 21:23:26,554] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670354606.4985025, 'message': 'Dec 6 21:23:25 hqnl0246134 sshd[256019]: Disconnected from invalid user tibero6 46.101.123.135 port 49666 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 21:23:42,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354622.5514302, 'message': 'Dec 6 21:23:40 hqnl0246134 sshd[256028]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 21:23:42,591] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354622.5521042, 'message': 'Dec 6 21:23:41 hqnl0246134 sshd[256030]: Invalid user root2 from 165.227.166.207 port 56412', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 21:23:42,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354622.5519702, 'message': 'Dec 6 21:23:40 hqnl0246134 sshd[256028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 21:23:42,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354622.5522463, 'message': 'Dec 6 21:23:41 hqnl0246134 sshd[256030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 21:23:44,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354624.5528073, 'message': 'Dec 6 21:23:43 hqnl0246134 sshd[256030]: Failed password for invalid user root2 from 165.227.166.207 port 56412 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 21:23:44,583] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354624.553132, 'message': 'Dec 6 21:23:43 hqnl0246134 sshd[256028]: Failed password for root from 61.177.173.18 port 24726 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 21:23:44,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354624.5532646, 'message': 'Dec 6 21:23:43 hqnl0246134 sshd[256030]: Disconnected from invalid user root2 165.227.166.207 port 56412 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 21:23:46,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354626.5543594, 'message': 'Dec 6 21:23:45 hqnl0246134 sshd[256028]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 21:23:48,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354628.555323, 'message': 'Dec 6 21:23:47 hqnl0246134 sshd[256028]: Failed password for root from 61.177.173.18 port 24726 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 21:23:48,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354628.5556011, 'message': 'Dec 6 21:23:47 hqnl0246134 sshd[256028]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 21:23:48,969] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:23:48,970] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:23:50,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354630.5573242, 'message': 'Dec 6 21:23:48 hqnl0246134 sshd[256028]: Failed password for root from 61.177.173.18 port 24726 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0388 seconds
WARNING [2022-12-06 21:24:10,353] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:24:10,401] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0559 seconds
INFO [2022-12-06 21:24:18,094] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:24:18,095] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:24:18,105] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:24:18,120] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0243 seconds
INFO [2022-12-06 21:24:20,785] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:24:20,785] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:24:20,793] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:24:20,807] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-06 21:24:30,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354670.6122844, 'message': 'Dec 6 21:24:28 hqnl0246134 sshd[256080]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 21:24:30,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354670.6129727, 'message': 'Dec 6 21:24:28 hqnl0246134 sshd[256080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 21:24:32,632] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354672.612874, 'message': 'Dec 6 21:24:30 hqnl0246134 sshd[256080]: Failed password for root from 61.177.173.18 port 51035 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 21:24:34,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354674.6154156, 'message': 'Dec 6 21:24:32 hqnl0246134 sshd[256080]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:24:36,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354676.6224751, 'message': 'Dec 6 21:24:35 hqnl0246134 sshd[256080]: Failed password for root from 61.177.173.18 port 51035 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 21:24:38,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354678.6231253, 'message': 'Dec 6 21:24:37 hqnl0246134 sshd[256080]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:24:40,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354680.6254625, 'message': 'Dec 6 21:24:39 hqnl0246134 sshd[256080]: Failed password for root from 61.177.173.18 port 51035 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:24:42,134] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:24:42,135] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:24:42,149] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:24:42,162] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0268 seconds
INFO [2022-12-06 21:24:42,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354682.6277316, 'message': 'Dec 6 21:24:42 hqnl0246134 sshd[256108]: Invalid user ubuntu from 49.50.230.198 port 37000', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:24:42,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354682.6279962, 'message': 'Dec 6 21:24:42 hqnl0246134 sshd[256108]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.50.230.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 21:24:42,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354682.6284788, 'message': 'Dec 6 21:24:42 hqnl0246134 sshd[256108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.50.230.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:24:44,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354684.6315658, 'message': 'Dec 6 21:24:44 hqnl0246134 sshd[256108]: Failed password for invalid user ubuntu from 49.50.230.198 port 37000 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 21:24:46,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354686.6348507, 'message': 'Dec 6 21:24:45 hqnl0246134 sshd[256108]: Disconnected from invalid user ubuntu 49.50.230.198 port 37000 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
WARNING [2022-12-06 21:24:48,973] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:24:48,974] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 21:25:10,358] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:25:10,379] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0309 seconds
INFO [2022-12-06 21:25:10,725] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.246.240.28', 'timestamp': 1670354710.7051575, 'message': 'Dec 6 21:25:09 hqnl0246134 sshd[256148]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.246.240.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 21:25:10,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.246.240.28', 'timestamp': 1670354710.7054193, 'message': 'Dec 6 21:25:09 hqnl0246134 sshd[256148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.246.240.28 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:25:12,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.246.240.28', 'timestamp': 1670354712.7163508, 'message': 'Dec 6 21:25:11 hqnl0246134 sshd[256148]: Failed password for root from 103.246.240.28 port 34042 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 21:25:16,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354716.7254064, 'message': 'Dec 6 21:25:14 hqnl0246134 sshd[256155]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 21:25:16,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354716.725743, 'message': 'Dec 6 21:25:14 hqnl0246134 sshd[256155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 21:25:17,903] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:25:17,903] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:25:17,911] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:25:17,922] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 21:25:18,752] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354718.7306643, 'message': 'Dec 6 21:25:17 hqnl0246134 sshd[256155]: Failed password for root from 61.177.173.18 port 16449 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 21:25:20,592] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:25:20,593] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:25:20,602] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:25:20,614] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 21:25:20,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354720.7358923, 'message': 'Dec 6 21:25:19 hqnl0246134 sshd[256155]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 21:25:22,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354722.74031, 'message': 'Dec 6 21:25:21 hqnl0246134 sshd[256155]: Failed password for root from 61.177.173.18 port 16449 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 21:25:22,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354722.7407498, 'message': 'Dec 6 21:25:21 hqnl0246134 sshd[256155]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 21:25:24,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354724.7426274, 'message': 'Dec 6 21:25:23 hqnl0246134 sshd[256155]: Failed password for root from 61.177.173.18 port 16449 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:25:34,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354734.7525313, 'message': 'Dec 6 21:25:33 hqnl0246134 sshd[256181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 21:25:36,777] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354736.7541132, 'message': 'Dec 6 21:25:35 hqnl0246134 sshd[256181]: Failed password for root from 165.227.166.207 port 38400 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 21:25:42,783] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.160.145.243', 'timestamp': 1670354742.7637465, 'message': 'Dec 6 21:25:42 hqnl0246134 sshd[256184]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.160.145.243 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 21:25:42,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.160.145.243', 'timestamp': 1670354742.7639782, 'message': 'Dec 6 21:25:42 hqnl0246134 sshd[256184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.160.145.243 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:25:43,575] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 21:25:43,647] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 21:25:43,648] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 21:25:43,648] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 21:25:43,648] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 21:25:43,648] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 21:25:43,657] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 21:25:43,672] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0233 seconds
WARNING [2022-12-06 21:25:43,679] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 21:25:43,681] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:25:43,697] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0304 seconds
INFO [2022-12-06 21:25:43,698] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0289 seconds
INFO [2022-12-06 21:25:44,783] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '202.160.145.243', 'timestamp': 1670354744.7664487, 'message': 'Dec 6 21:25:44 hqnl0246134 sshd[256184]: Failed password for root from 202.160.145.243 port 35287 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 21:25:46,679] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:25:46,680] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:25:46,690] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:25:46,704] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0235 seconds
WARNING [2022-12-06 21:25:48,976] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:25:48,977] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:26:02,854] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354762.8175552, 'message': 'Dec 6 21:26:01 hqnl0246134 sshd[256204]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.50.230.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 21:26:02,856] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354762.8182166, 'message': 'Dec 6 21:26:01 hqnl0246134 sshd[256207]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 21:26:02,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354762.8179514, 'message': 'Dec 6 21:26:01 hqnl0246134 sshd[256204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.50.230.198 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 21:26:02,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354762.818409, 'message': 'Dec 6 21:26:01 hqnl0246134 sshd[256207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 21:26:04,849] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354764.817686, 'message': 'Dec 6 21:26:03 hqnl0246134 sshd[256204]: Failed password for root from 49.50.230.198 port 54118 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 21:26:04,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354764.8185143, 'message': 'Dec 6 21:26:03 hqnl0246134 sshd[256207]: Failed password for root from 61.177.173.18 port 39296 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 21:26:04,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354764.8186388, 'message': 'Dec 6 21:26:04 hqnl0246134 sshd[256207]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 21:26:06,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354766.822307, 'message': 'Dec 6 21:26:06 hqnl0246134 sshd[256207]: Failed password for root from 61.177.173.18 port 39296 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:26:08,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354768.8247755, 'message': 'Dec 6 21:26:08 hqnl0246134 sshd[256207]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0431 seconds
WARNING [2022-12-06 21:26:10,359] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:26:10,384] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0325 seconds
INFO [2022-12-06 21:26:10,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354770.8319914, 'message': 'Dec 6 21:26:10 hqnl0246134 sshd[256207]: Failed password for root from 61.177.173.18 port 39296 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:26:13,777] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 21:26:13,777] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 21:26:13,778] im360.plugins.client360: Waiting 2 minutes before retry...
INFO [2022-12-06 21:26:17,844] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:26:17,844] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:26:17,853] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:26:17,864] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 21:26:20,428] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:26:20,429] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:26:20,436] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:26:20,448] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 21:26:32,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.57.194', 'timestamp': 1670354792.8664029, 'message': 'Dec 6 21:26:32 hqnl0246134 sshd[256245]: Invalid user raj from 134.122.57.194 port 51748', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 21:26:32,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.122.57.194', 'timestamp': 1670354792.8667817, 'message': 'Dec 6 21:26:32 hqnl0246134 sshd[256245]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.122.57.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 21:26:32,943] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.122.57.194', 'timestamp': 1670354792.8670182, 'message': 'Dec 6 21:26:32 hqnl0246134 sshd[256245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.57.194 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 21:26:36,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.57.194', 'timestamp': 1670354796.8685565, 'message': 'Dec 6 21:26:34 hqnl0246134 sshd[256245]: Failed password for invalid user raj from 134.122.57.194 port 51748 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:26:36,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.57.194', 'timestamp': 1670354796.8687913, 'message': 'Dec 6 21:26:36 hqnl0246134 sshd[256245]: Disconnected from invalid user raj 134.122.57.194 port 51748 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:26:44,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '141.147.37.68', 'timestamp': 1670354804.8954582, 'message': 'Dec 6 21:26:43 hqnl0246134 sshd[256249]: pam_imunify(sshd:auth): [IM360_RBL] The IP 141.147.37.68 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 21:26:44,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '141.147.37.68', 'timestamp': 1670354804.8958774, 'message': 'Dec 6 21:26:43 hqnl0246134 sshd[256249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.147.37.68 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:26:46,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '141.147.37.68', 'timestamp': 1670354806.9089656, 'message': 'Dec 6 21:26:45 hqnl0246134 sshd[256249]: Failed password for root from 141.147.37.68 port 43464 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0258 seconds
WARNING [2022-12-06 21:26:48,983] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:26:48,984] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:26:50,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354810.9141097, 'message': 'Dec 6 21:26:50 hqnl0246134 sshd[256262]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 21:26:50,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354810.9145253, 'message': 'Dec 6 21:26:50 hqnl0246134 sshd[256262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:26:52,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354812.916395, 'message': 'Dec 6 21:26:52 hqnl0246134 sshd[256262]: Failed password for root from 61.177.173.18 port 13356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:26:52,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354812.9248674, 'message': 'Dec 6 21:26:52 hqnl0246134 sshd[256262]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:26:54,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354814.9185736, 'message': 'Dec 6 21:26:54 hqnl0246134 sshd[256262]: Failed password for root from 61.177.173.18 port 13356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:26:56,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354816.919258, 'message': 'Dec 6 21:26:55 hqnl0246134 sshd[256262]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0698 seconds
INFO [2022-12-06 21:26:58,949] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354818.9235246, 'message': 'Dec 6 21:26:57 hqnl0246134 sshd[256262]: Failed password for root from 61.177.173.18 port 13356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0251 seconds
WARNING [2022-12-06 21:27:10,363] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:27:10,384] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0291 seconds
INFO [2022-12-06 21:27:18,193] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:27:18,194] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:27:18,203] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:27:18,215] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 21:27:18,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354838.9497259, 'message': 'Dec 6 21:27:17 hqnl0246134 sshd[256288]: Invalid user 0 from 49.50.230.198 port 43004', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:27:18,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354838.9500792, 'message': 'Dec 6 21:27:17 hqnl0246134 sshd[256288]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.50.230.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 21:27:19,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354838.950229, 'message': 'Dec 6 21:27:17 hqnl0246134 sshd[256288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.50.230.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 21:27:20,902] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:27:20,903] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:27:20,909] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:27:20,920] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-06 21:27:20,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354840.9522808, 'message': 'Dec 6 21:27:20 hqnl0246134 sshd[256288]: Failed password for invalid user 0 from 49.50.230.198 port 43004 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:27:22,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354842.9558687, 'message': 'Dec 6 21:27:21 hqnl0246134 sshd[256309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:27:24,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.50.230.198', 'timestamp': 1670354844.9597116, 'message': 'Dec 6 21:27:23 hqnl0246134 sshd[256288]: Disconnected from invalid user 0 49.50.230.198 port 43004 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 21:27:24,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354844.9599755, 'message': 'Dec 6 21:27:24 hqnl0246134 sshd[256309]: Failed password for root from 165.227.166.207 port 48842 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 21:27:26,447] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:27:26,447] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:27:26,454] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:27:26,465] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 21:27:37,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354856.984511, 'message': 'Dec 6 21:27:36 hqnl0246134 sshd[256317]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:27:37,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354856.9847383, 'message': 'Dec 6 21:27:36 hqnl0246134 sshd[256317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:27:39,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354858.9854867, 'message': 'Dec 6 21:27:38 hqnl0246134 sshd[256317]: Failed password for root from 61.177.173.18 port 21441 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:27:41,018] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354860.9931054, 'message': 'Dec 6 21:27:39 hqnl0246134 sshd[256317]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 21:27:43,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354863.0003815, 'message': 'Dec 6 21:27:41 hqnl0246134 sshd[256317]: Failed password for root from 61.177.173.18 port 21441 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 21:27:45,037] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354865.0052946, 'message': 'Dec 6 21:27:43 hqnl0246134 sshd[256317]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 21:27:47,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354867.0102732, 'message': 'Dec 6 21:27:45 hqnl0246134 sshd[256317]: Failed password for root from 61.177.173.18 port 21441 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
WARNING [2022-12-06 21:27:48,987] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:27:48,987] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:27:49,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.241.157.126', 'timestamp': 1670354869.0130472, 'message': 'Dec 6 21:27:47 hqnl0246134 sshd[256328]: Invalid user cs from 192.241.157.126 port 54922', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 21:27:49,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '192.241.157.126', 'timestamp': 1670354869.013443, 'message': 'Dec 6 21:27:47 hqnl0246134 sshd[256328]: pam_imunify(sshd:auth): [IM360_RBL] The IP 192.241.157.126 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 21:27:49,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '192.241.157.126', 'timestamp': 1670354869.0136952, 'message': 'Dec 6 21:27:47 hqnl0246134 sshd[256328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.157.126 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 21:27:51,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.241.157.126', 'timestamp': 1670354871.014544, 'message': 'Dec 6 21:27:49 hqnl0246134 sshd[256328]: Failed password for invalid user cs from 192.241.157.126 port 54922 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 21:27:53,037] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.241.157.126', 'timestamp': 1670354873.0172787, 'message': 'Dec 6 21:27:51 hqnl0246134 sshd[256328]: Disconnected from invalid user cs 192.241.157.126 port 54922 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 21:27:59,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '146.59.195.105', 'timestamp': 1670354879.0243702, 'message': 'Dec 6 21:27:58 hqnl0246134 sshd[256331]: Invalid user image from 146.59.195.105 port 48768', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:27:59,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '146.59.195.105', 'timestamp': 1670354879.0246315, 'message': 'Dec 6 21:27:58 hqnl0246134 sshd[256331]: pam_imunify(sshd:auth): [IM360_RBL] The IP 146.59.195.105 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 21:27:59,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '146.59.195.105', 'timestamp': 1670354879.0247703, 'message': 'Dec 6 21:27:58 hqnl0246134 sshd[256331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.59.195.105 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:28:01,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '146.59.195.105', 'timestamp': 1670354881.0254605, 'message': 'Dec 6 21:28:00 hqnl0246134 sshd[256331]: Failed password for invalid user image from 146.59.195.105 port 48768 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:28:03,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '146.59.195.105', 'timestamp': 1670354883.0295932, 'message': 'Dec 6 21:28:02 hqnl0246134 sshd[256331]: Disconnected from invalid user image 146.59.195.105 port 48768 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
WARNING [2022-12-06 21:28:10,366] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:28:10,392] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0336 seconds
INFO [2022-12-06 21:28:17,811] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:28:17,812] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:28:17,822] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:28:17,836] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0226 seconds
INFO [2022-12-06 21:28:20,449] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:28:20,449] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:28:20,461] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:28:20,478] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0280 seconds
INFO [2022-12-06 21:28:29,129] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354909.091395, 'message': 'Dec 6 21:28:27 hqnl0246134 sshd[256362]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0360 seconds
INFO [2022-12-06 21:28:29,153] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354909.0919304, 'message': 'Dec 6 21:28:27 hqnl0246134 sshd[256362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 21:28:31,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354911.0898266, 'message': 'Dec 6 21:28:29 hqnl0246134 sshd[256362]: Failed password for root from 61.177.173.18 port 56698 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 21:28:33,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354913.0925927, 'message': 'Dec 6 21:28:31 hqnl0246134 sshd[256362]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:28:35,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354915.0939887, 'message': 'Dec 6 21:28:33 hqnl0246134 sshd[256362]: Failed password for root from 61.177.173.18 port 56698 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 21:28:35,133] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354915.0942981, 'message': 'Dec 6 21:28:34 hqnl0246134 sshd[256362]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 21:28:37,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354917.0968115, 'message': 'Dec 6 21:28:36 hqnl0246134 sshd[256362]: Failed password for root from 61.177.173.18 port 56698 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 21:28:41,119] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:28:41,120] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:28:41,126] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:28:41,137] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0163 seconds
WARNING [2022-12-06 21:28:48,993] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:28:48,994] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:28:54,837] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 21:28:54,907] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 21:28:54,908] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 21:28:54,908] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 21:28:54,909] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 21:28:54,909] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 21:28:54,928] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 21:28:54,956] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0457 seconds
WARNING [2022-12-06 21:28:54,969] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 21:28:54,972] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:28:55,002] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0554 seconds
INFO [2022-12-06 21:28:55,004] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0523 seconds
INFO [2022-12-06 21:28:55,273] defence360agent.files: Updating all files
INFO [2022-12-06 21:28:55,626] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 21:28:55,627] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 21:28:55,910] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 21:28:55,910] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 21:28:56,232] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 21:28:56,233] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 21:28:56,559] defence360agent.files: Updating modsec-rules files via file by file download
INFO [2022-12-06 21:28:57,470] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:28:57 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '233930'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"1865401378027025239b83e09cd6181e"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E4AF736C30A42'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '73ee3f70-3754-4aa9-8f0a-0ee1d35313ee'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-modsec3-minimal-nginx.zip'
INFO [2022-12-06 21:28:57,916] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:28:57 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '236374'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"baa95d5a7b7d76bec974268c7719d9f3"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:11 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E4AF7515D2917'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'a9677ffc-f95e-4e2a-8cbd-a0e44adf9cc8'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-modsec3-minimal-apache.zip'
INFO [2022-12-06 21:28:58,359] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:28:58 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '236761'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"6d5c2ee37c53071bd4af67ccba177c32"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E4AF76BAF9CD6'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '4da86dd3-7d88-4750-a92f-2b75112a2e3c'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-minimal-litespeed.zip'
INFO [2022-12-06 21:28:58,856] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:28:58 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '281925'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"b7508c20459f76b3c9f43308e485bf62"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4AF789634360'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'ef48f6d1-ba2e-4a0b-b7d0-2ad8099d8826'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-modsec3-full-apache.zip'
INFO [2022-12-06 21:28:59,624] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:28:59 GMT'), ('Content-Type', 'text/plain'), ('Content-Length', '408'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"6dcd225d9fa69606c5b519be53e8f052"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4AF7B7382C21'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '2ad95ca8-988d-415f-bbf7-e81a38bc5d3c'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/changelog.txt'
INFO [2022-12-06 21:28:59,938] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:28:59 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '241534'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"a54917e0f663bca991b45a4becfb9baa"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4AF7C9DEDDF7'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'ad0f2024-c0f3-4ccd-8f6d-221611ef6416'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-minimal-apache.zip'
INFO [2022-12-06 21:29:00,749] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:29:00 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '64459'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"c21a65ab1121688893a641093ca808fb"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4AF7FA3AC030'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'b10cead7-779b-4773-963d-5363a54348f7'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-full-openlitespeed.zip'
INFO [2022-12-06 21:29:01,136] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:29:01 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '299024'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"b5d14cfb76932006836277f06d4f0642"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4AF811372059'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'f74d9c5c-7bd3-4c6d-b83a-4b1edc62f1b7'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-full-apache.zip'
INFO [2022-12-06 21:29:01,950] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:29:01 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '6737'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"3b28b0c7f8626831154a92866b45492e"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4AF841D01253'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'c2c2a5b8-abe1-4e4d-90be-9f0de7cbda6a'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-modsec3-full-litespeed-generic.zip'
INFO [2022-12-06 21:29:02,214] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:29:02 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '6624'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"69c03941b33ca33f5703adc6c1935c01"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E4AF85197CDFF'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '75b0475c-40de-49dc-aed0-f1bf8d7429d3'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-modsec3-full-nginx-generic.zip'
INFO [2022-12-06 21:29:02,528] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:29:02 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '697'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"a7b0c9fbb6dae60c95617645fbfc6648"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4AF86458AB1B'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '59ff1954-778b-4499-a144-fa36c12d33b1'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/changelog.json'
INFO [2022-12-06 21:29:02,847] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:29:02 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '279140'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"69998db09784dc8c7a6227a086970eac"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4AF87738FBD2'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '08a00cc8-0c35-45dc-b3e6-830f35b6d82e'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-modsec3-full-nginx.zip'
INFO [2022-12-06 21:29:03,346] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:29:03 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '6839'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"13b37d68a20a447d0f50b83d8a592393"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4AF89510DC46'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '7ab23a8d-6aaf-4c63-b093-af573007e132'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-modsec3-full-openlitespeed-generic.zip'
INFO [2022-12-06 21:29:04,285] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:29:04 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '289716'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"ccd9b97a669bea6fba7f1329b19f4b74"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4AF8CCF158EC'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', '2db413c1-dd8f-4cb0-8f5f-28e79d7992aa'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-full-litespeed.zip'
INFO [2022-12-06 21:29:04,787] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:29:04 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '6651'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"fbace57f9daf2cb2320e6aa76044bac0"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4AF8EAFBE819'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'a09125ff-0532-461b-97b1-c6ab82cb03d0'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-modsec3-full-apache-generic.zip'
INFO [2022-12-06 21:29:05,687] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:29:05 GMT'), ('Content-Type', 'binary/octet-stream'), ('Content-Length', '58335'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"b6f9f777cec733eb789883f85e0cf3dc"'), ('Last-Modified', 'Tue, 06 Dec 2022 19:16:10 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E4AF9208B200F'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-version-id', 'e0292031-aa9b-4521-905f-44e5e4aac609'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/modsec/v2/imunify360-minimal-openlitespeed.zip'
INFO [2022-12-06 21:29:05,748] defence360agent.files: Validating [modsec-rules]: /var/imunify360/files/modsec/v2_2022-12-06T192856.922447Z
INFO [2022-12-06 21:29:05,765] defence360agent.files: Removing old path on file by file update: /var/imunify360/files/modsec/v2_2022-12-06T084944.629983Z
INFO [2022-12-06 21:29:05,770] defence360agent.files: Updated modsec-rules using file by file download
ERROR [2022-12-06 21:29:05,794] defence360agent.files: hook <function update_vendors at 0x7f80fa94ae50> error: Integration config is missing server_type field
Traceback (most recent call last):
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 376, in _get_web_server_type
web_server = IntegrationConfig.to_dict()["web_server"]["server_type"]
File "/opt/alt/python38/lib/python3.8/configparser.py", line 960, in __getitem__
raise KeyError(key)
KeyError: 'web_server'
The above exception was the direct cause of the following exception:
Traceback (most recent call last):
File "/opt/alt/python38/lib/python3.8/dist-packages/defence360agent/files/__init__.py", line 946, in _run_hooks
await hook(self, is_updated)
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/update_hooks.py", line 32, in update_vendors
await hp.apply_modsec_files_update()
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/base.py", line 311, in apply_modsec_files_update
await cls._apply_modsec_files_update()
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 196, in _apply_modsec_files_update
await GenericFilesVendorList.install_or_update()
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/base.py", line 556, in install_or_update
compatible_name = cls._get_compatible_name(installed_vendors)
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 363, in _get_compatible_name
web_server = _get_web_server_type()
File "/opt/alt/python38/lib/python3.8/dist-packages/im360/subsys/panels/generic/mod_security.py", line 378, in _get_web_server_type
raise GenericPanelModSecException(
im360.subsys.panels.generic.mod_security.GenericPanelModSecException: Integration config is missing server_type field
INFO [2022-12-06 21:29:05,825] defence360agent.files: modsec-rules files update finished
INFO [2022-12-06 21:29:05,825] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 21:29:05,906] defence360agent.internals.the_sink: FilesUpdated({'files_type':'modsec-rules', 'files_index':<Index(type_=modsec-rules) is_blank=False, json={<26 item(s)>}>}) processed in 0.1140 seconds
INFO [2022-12-06 21:29:06,123] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:29:06 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E4AF93A99112E'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 21:29:06,125] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 21:29:06,125] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 21:29:06,649] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 21:29:06,649] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 21:29:06,961] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 21:29:06,961] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 21:29:07,227] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 21:29:07,227] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 21:29:07,631] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 21:29:07,631] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 21:29:08,081] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 21:29:08,083] defence360agent.files: geo files update finished (not updated)
WARNING [2022-12-06 21:29:10,369] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:29:10,400] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0384 seconds
INFO [2022-12-06 21:29:11,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.246.240.28', 'timestamp': 1670354951.1395702, 'message': 'Dec 6 21:29:09 hqnl0246134 sshd[256411]: Invalid user sunshine from 103.246.240.28 port 46528', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 21:29:11,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354951.140307, 'message': 'Dec 6 21:29:10 hqnl0246134 sshd[256413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0396 seconds
INFO [2022-12-06 21:29:11,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.246.240.28', 'timestamp': 1670354951.1399345, 'message': 'Dec 6 21:29:09 hqnl0246134 sshd[256411]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.246.240.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 21:29:11,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.246.240.28', 'timestamp': 1670354951.1401188, 'message': 'Dec 6 21:29:09 hqnl0246134 sshd[256411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.246.240.28 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:29:13,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.246.240.28', 'timestamp': 1670354953.137632, 'message': 'Dec 6 21:29:11 hqnl0246134 sshd[256411]: Failed password for invalid user sunshine from 103.246.240.28 port 46528 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 21:29:13,169] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670354953.1378155, 'message': 'Dec 6 21:29:12 hqnl0246134 sshd[256413]: Failed password for root from 165.227.166.207 port 58952 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 21:29:15,161] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.246.240.28', 'timestamp': 1670354955.1408317, 'message': 'Dec 6 21:29:13 hqnl0246134 sshd[256411]: Disconnected from invalid user sunshine 103.246.240.28 port 46528 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 21:29:17,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670354957.142894, 'message': 'Dec 6 21:29:15 hqnl0246134 sshd[256421]: Invalid user admin from 152.89.196.123 port 34274', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0558 seconds
INFO [2022-12-06 21:29:17,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354957.1438448, 'message': 'Dec 6 21:29:16 hqnl0246134 sshd[256417]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0564 seconds
INFO [2022-12-06 21:29:17,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670354957.143438, 'message': 'Dec 6 21:29:15 hqnl0246134 sshd[256421]: Failed none for invalid user admin from 152.89.196.123 port 34274 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0542 seconds
INFO [2022-12-06 21:29:17,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354957.1440148, 'message': 'Dec 6 21:29:16 hqnl0246134 sshd[256417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0537 seconds
INFO [2022-12-06 21:29:17,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.123', 'timestamp': 1670354957.1436677, 'message': 'Dec 6 21:29:15 hqnl0246134 sshd[256421]: Disconnected from invalid user admin 152.89.196.123 port 34274 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 21:29:18,047] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:29:18,048] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:29:18,057] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:29:18,069] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 21:29:19,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354959.1442568, 'message': 'Dec 6 21:29:18 hqnl0246134 sshd[256417]: Failed password for root from 61.177.173.18 port 20920 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:29:20,836] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:29:20,837] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:29:20,843] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:29:20,854] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-06 21:29:21,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354961.1459086, 'message': 'Dec 6 21:29:20 hqnl0246134 sshd[256417]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 21:29:23,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354963.1486208, 'message': 'Dec 6 21:29:22 hqnl0246134 sshd[256417]: Failed password for root from 61.177.173.18 port 20920 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0767 seconds
INFO [2022-12-06 21:29:23,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354963.1488988, 'message': 'Dec 6 21:29:22 hqnl0246134 sshd[256417]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0642 seconds
INFO [2022-12-06 21:29:25,035] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 21:29:25,036] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 21:29:25,037] im360.plugins.client360: Waiting 2 minutes before retry...
INFO [2022-12-06 21:29:25,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670354965.1526287, 'message': 'Dec 6 21:29:24 hqnl0246134 sshd[256417]: Failed password for root from 61.177.173.18 port 20920 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0256 seconds
WARNING [2022-12-06 21:29:48,998] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:29:48,999] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:30:03,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355003.2020454, 'message': 'Dec 6 21:30:02 hqnl0246134 sshd[256476]: Invalid user spider from 157.230.228.27 port 40310', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 21:30:03,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355003.202453, 'message': 'Dec 6 21:30:02 hqnl0246134 sshd[256476]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.230.228.27 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 21:30:03,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355003.202598, 'message': 'Dec 6 21:30:02 hqnl0246134 sshd[256476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.228.27 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 21:30:05,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355005.2037647, 'message': 'Dec 6 21:30:04 hqnl0246134 sshd[256478]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0507 seconds
INFO [2022-12-06 21:30:05,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355005.2045794, 'message': 'Dec 6 21:30:04 hqnl0246134 sshd[256476]: Failed password for invalid user spider from 157.230.228.27 port 40310 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0508 seconds
INFO [2022-12-06 21:30:05,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355005.2041755, 'message': 'Dec 6 21:30:04 hqnl0246134 sshd[256478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 21:30:07,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355007.2061079, 'message': 'Dec 6 21:30:05 hqnl0246134 sshd[256476]: Disconnected from invalid user spider 157.230.228.27 port 40310 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 21:30:07,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355007.2063565, 'message': 'Dec 6 21:30:06 hqnl0246134 sshd[256478]: Failed password for root from 61.177.173.18 port 42837 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 21:30:07,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355007.2064714, 'message': 'Dec 6 21:30:06 hqnl0246134 sshd[256478]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 21:30:08,088] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:30:08,089] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:30:08,096] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:30:08,108] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 21:30:09,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355009.2118354, 'message': 'Dec 6 21:30:08 hqnl0246134 sshd[256478]: Failed password for root from 61.177.173.18 port 42837 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 21:30:09,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355009.2121446, 'message': 'Dec 6 21:30:08 hqnl0246134 sshd[256478]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 21:30:10,373] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:30:10,395] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0312 seconds
INFO [2022-12-06 21:30:13,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355013.218025, 'message': 'Dec 6 21:30:11 hqnl0246134 sshd[256478]: Failed password for root from 61.177.173.18 port 42837 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 21:30:17,989] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:30:17,990] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:30:18,001] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:30:18,015] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0241 seconds
INFO [2022-12-06 21:30:20,665] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:30:20,665] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:30:20,674] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:30:20,687] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
WARNING [2022-12-06 21:30:49,006] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:30:49,007] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:30:55,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355055.275187, 'message': 'Dec 6 21:30:53 hqnl0246134 sshd[256527]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 21:30:55,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355055.2758229, 'message': 'Dec 6 21:30:53 hqnl0246134 sshd[256527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 21:30:57,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355057.276465, 'message': 'Dec 6 21:30:56 hqnl0246134 sshd[256527]: Failed password for root from 61.177.173.18 port 22329 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 21:30:57,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355057.2766628, 'message': 'Dec 6 21:30:57 hqnl0246134 sshd[256529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 21:30:59,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355059.279577, 'message': 'Dec 6 21:30:57 hqnl0246134 sshd[256527]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 21:30:59,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355059.279775, 'message': 'Dec 6 21:30:59 hqnl0246134 sshd[256529]: Failed password for root from 165.227.166.207 port 41016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 21:31:01,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355061.283344, 'message': 'Dec 6 21:30:59 hqnl0246134 sshd[256527]: Failed password for root from 61.177.173.18 port 22329 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:31:01,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355061.2835321, 'message': 'Dec 6 21:31:00 hqnl0246134 sshd[256527]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 21:31:03,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355063.2873232, 'message': 'Dec 6 21:31:01 hqnl0246134 sshd[256527]: Failed password for root from 61.177.173.18 port 22329 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 21:31:03,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.246.240.28', 'timestamp': 1670355063.2875795, 'message': 'Dec 6 21:31:02 hqnl0246134 sshd[256531]: Invalid user vision from 103.246.240.28 port 45214', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 21:31:03,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.246.240.28', 'timestamp': 1670355063.2878106, 'message': 'Dec 6 21:31:02 hqnl0246134 sshd[256531]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.246.240.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:31:03,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.246.240.28', 'timestamp': 1670355063.2880037, 'message': 'Dec 6 21:31:02 hqnl0246134 sshd[256531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.246.240.28 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 21:31:05,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.246.240.28', 'timestamp': 1670355065.2892194, 'message': 'Dec 6 21:31:04 hqnl0246134 sshd[256531]: Failed password for invalid user vision from 103.246.240.28 port 45214 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:31:07,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.246.240.28', 'timestamp': 1670355067.291786, 'message': 'Dec 6 21:31:05 hqnl0246134 sshd[256531]: Disconnected from invalid user vision 103.246.240.28 port 45214 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-06 21:31:10,381] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:31:10,426] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0566 seconds
INFO [2022-12-06 21:31:17,844] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:31:17,844] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:31:17,855] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:31:17,868] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 21:31:20,480] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:31:20,480] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:31:20,493] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:31:20,511] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0298 seconds
INFO [2022-12-06 21:31:39,357] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355099.3315241, 'message': 'Dec 6 21:31:38 hqnl0246134 sshd[256565]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 21:31:39,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355099.332063, 'message': 'Dec 6 21:31:38 hqnl0246134 sshd[256565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:31:41,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355101.3327715, 'message': 'Dec 6 21:31:40 hqnl0246134 sshd[256565]: Failed password for root from 61.177.173.18 port 35034 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 21:31:43,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355103.3336565, 'message': 'Dec 6 21:31:43 hqnl0246134 sshd[256565]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:31:45,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355105.3360493, 'message': 'Dec 6 21:31:45 hqnl0246134 sshd[256565]: Failed password for root from 61.177.173.18 port 35034 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:31:45,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355105.3369396, 'message': 'Dec 6 21:31:45 hqnl0246134 sshd[256565]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 21:31:47,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355107.3385365, 'message': 'Dec 6 21:31:47 hqnl0246134 sshd[256565]: Failed password for root from 61.177.173.18 port 35034 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0252 seconds
WARNING [2022-12-06 21:31:49,010] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:31:49,011] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:31:50,323] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:31:50,324] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:31:50,332] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:31:50,345] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
WARNING [2022-12-06 21:31:54,001] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 21:32:01,750] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 21:32:01,820] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 21:32:01,821] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 21:32:01,821] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 21:32:01,821] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 21:32:01,822] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 21:32:01,842] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 21:32:01,862] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0385 seconds
WARNING [2022-12-06 21:32:01,872] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 21:32:01,875] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:32:01,894] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0387 seconds
INFO [2022-12-06 21:32:01,896] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0367 seconds
INFO [2022-12-06 21:32:07,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355127.3766918, 'message': 'Dec 6 21:32:05 hqnl0246134 sshd[256619]: Invalid user janice from 134.122.57.194 port 57814', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 21:32:07,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355127.3769646, 'message': 'Dec 6 21:32:05 hqnl0246134 sshd[256619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.122.57.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:32:07,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355127.3771312, 'message': 'Dec 6 21:32:05 hqnl0246134 sshd[256619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.57.194 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 21:32:09,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355129.3827472, 'message': 'Dec 6 21:32:07 hqnl0246134 sshd[256619]: Failed password for invalid user janice from 134.122.57.194 port 57814 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 21:32:09,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355129.3829482, 'message': 'Dec 6 21:32:07 hqnl0246134 sshd[256619]: Disconnected from invalid user janice 134.122.57.194 port 57814 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-06 21:32:10,386] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:32:10,412] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0385 seconds
INFO [2022-12-06 21:32:17,895] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:32:17,896] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:32:17,907] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:32:17,920] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
INFO [2022-12-06 21:32:20,539] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:32:20,540] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:32:20,549] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:32:20,561] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 21:32:27,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355147.42667, 'message': 'Dec 6 21:32:26 hqnl0246134 sshd[256641]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 21:32:27,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355147.4270763, 'message': 'Dec 6 21:32:26 hqnl0246134 sshd[256641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:32:29,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355149.4280412, 'message': 'Dec 6 21:32:28 hqnl0246134 sshd[256641]: Failed password for root from 61.177.173.18 port 63611 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 21:32:29,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355149.4284182, 'message': 'Dec 6 21:32:28 hqnl0246134 sshd[256641]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 21:32:31,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355151.4363174, 'message': 'Dec 6 21:32:31 hqnl0246134 sshd[256641]: Failed password for root from 61.177.173.18 port 63611 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 21:32:31,946] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 21:32:31,947] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 21:32:31,948] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 21:32:33,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355153.4404778, 'message': 'Dec 6 21:32:32 hqnl0246134 sshd[256641]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 21:32:35,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355155.4444904, 'message': 'Dec 6 21:32:34 hqnl0246134 sshd[256647]: Invalid user cs from 157.230.228.27 port 57038', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 21:32:35,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355155.445186, 'message': 'Dec 6 21:32:34 hqnl0246134 sshd[256641]: Failed password for root from 61.177.173.18 port 63611 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 21:32:35,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355155.4447887, 'message': 'Dec 6 21:32:34 hqnl0246134 sshd[256647]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.230.228.27 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:32:35,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355155.444939, 'message': 'Dec 6 21:32:34 hqnl0246134 sshd[256647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.228.27 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 21:32:37,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355157.4456882, 'message': 'Dec 6 21:32:36 hqnl0246134 sshd[256647]: Failed password for invalid user cs from 157.230.228.27 port 57038 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0731 seconds
INFO [2022-12-06 21:32:39,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355159.452946, 'message': 'Dec 6 21:32:38 hqnl0246134 sshd[256647]: Disconnected from invalid user cs 157.230.228.27 port 57038 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 21:32:41,493] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355161.4616184, 'message': 'Dec 6 21:32:40 hqnl0246134 sshd[256651]: Invalid user support from 192.241.157.126 port 36122', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 21:32:41,515] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355161.461917, 'message': 'Dec 6 21:32:40 hqnl0246134 sshd[256651]: pam_imunify(sshd:auth): [IM360_RBL] The IP 192.241.157.126 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 21:32:41,532] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355161.4621255, 'message': 'Dec 6 21:32:40 hqnl0246134 sshd[256651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.157.126 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:32:43,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355163.4689136, 'message': 'Dec 6 21:32:42 hqnl0246134 sshd[256651]: Failed password for invalid user support from 192.241.157.126 port 36122 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:32:45,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355165.4773037, 'message': 'Dec 6 21:32:44 hqnl0246134 sshd[256651]: Disconnected from invalid user support 192.241.157.126 port 36122 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 21:32:47,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355167.499473, 'message': 'Dec 6 21:32:47 hqnl0246134 sshd[256653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
WARNING [2022-12-06 21:32:49,019] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:32:49,019] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:32:49,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.246.240.28', 'timestamp': 1670355169.4858015, 'message': 'Dec 6 21:32:49 hqnl0246134 sshd[256663]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.246.240.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:32:49,520] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.246.240.28', 'timestamp': 1670355169.4893756, 'message': 'Dec 6 21:32:49 hqnl0246134 sshd[256663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.246.240.28 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 21:32:51,514] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355171.485938, 'message': 'Dec 6 21:32:49 hqnl0246134 sshd[256653]: Failed password for root from 165.227.166.207 port 51304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 21:32:51,514] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.246.240.28', 'timestamp': 1670355171.4862185, 'message': 'Dec 6 21:32:51 hqnl0246134 sshd[256663]: Failed password for root from 103.246.240.28 port 43908 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 21:32:53,837] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:32:53,837] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:32:53,844] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:32:53,855] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
WARNING [2022-12-06 21:33:10,385] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:33:10,412] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0349 seconds
INFO [2022-12-06 21:33:15,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355195.5379672, 'message': 'Dec 6 21:33:14 hqnl0246134 sshd[256684]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 21:33:15,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355195.538256, 'message': 'Dec 6 21:33:14 hqnl0246134 sshd[256684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 21:33:17,800] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:33:17,800] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:33:17,813] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:33:17,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355197.6762333, 'message': 'Dec 6 21:33:16 hqnl0246134 sshd[256684]: Failed password for root from 61.177.173.18 port 34697 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1468 seconds
INFO [2022-12-06 21:33:17,835] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0335 seconds
INFO [2022-12-06 21:33:17,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355197.6765954, 'message': 'Dec 6 21:33:16 hqnl0246134 sshd[256684]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 21:33:19,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355199.5409796, 'message': 'Dec 6 21:33:18 hqnl0246134 sshd[256684]: Failed password for root from 61.177.173.18 port 34697 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 21:33:19,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355199.5412114, 'message': 'Dec 6 21:33:18 hqnl0246134 sshd[256684]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 21:33:20,773] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:33:20,773] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:33:20,780] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:33:20,790] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0163 seconds
INFO [2022-12-06 21:33:21,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355201.5423455, 'message': 'Dec 6 21:33:20 hqnl0246134 sshd[256684]: Failed password for root from 61.177.173.18 port 34697 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 21:33:25,595] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355205.5615122, 'message': 'Dec 6 21:33:24 hqnl0246134 sshd[256705]: Invalid user sasaki from 23.224.81.32 port 48248', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 21:33:25,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355205.561914, 'message': 'Dec 6 21:33:24 hqnl0246134 sshd[256705]: pam_imunify(sshd:auth): [IM360_RBL] The IP 23.224.81.32 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 21:33:25,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355205.5621006, 'message': 'Dec 6 21:33:24 hqnl0246134 sshd[256705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.224.81.32 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 21:33:27,588] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355207.568603, 'message': 'Dec 6 21:33:26 hqnl0246134 sshd[256705]: Failed password for invalid user sasaki from 23.224.81.32 port 48248 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:33:29,595] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355209.5772696, 'message': 'Dec 6 21:33:28 hqnl0246134 sshd[256705]: Disconnected from invalid user sasaki 23.224.81.32 port 48248 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 21:33:37,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '104.45.94.71', 'timestamp': 1670355217.5989583, 'message': 'Dec 6 21:33:35 hqnl0246134 sshd[256681]: pam_imunify(sshd:auth): [IM360_RBL] The IP 104.45.94.71 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 21:33:37,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '104.45.94.71', 'timestamp': 1670355217.5993702, 'message': 'Dec 6 21:33:35 hqnl0246134 sshd[256681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.45.94.71 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 21:33:39,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '104.45.94.71', 'timestamp': 1670355219.6010153, 'message': 'Dec 6 21:33:37 hqnl0246134 sshd[256681]: Failed password for root from 104.45.94.71 port 50138 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 21:33:49,024] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:33:49,025] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:34:03,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355243.6425104, 'message': 'Dec 6 21:34:03 hqnl0246134 sshd[256734]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 21:34:03,696] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355243.6432033, 'message': 'Dec 6 21:34:03 hqnl0246134 sshd[256734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 21:34:05,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355245.6439743, 'message': 'Dec 6 21:34:05 hqnl0246134 sshd[256734]: Failed password for root from 61.177.173.18 port 61036 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 21:34:07,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355247.6468961, 'message': 'Dec 6 21:34:05 hqnl0246134 sshd[256734]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 21:34:09,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355249.649075, 'message': 'Dec 6 21:34:08 hqnl0246134 sshd[256734]: Failed password for root from 61.177.173.18 port 61036 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0315 seconds
WARNING [2022-12-06 21:34:10,387] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:34:10,410] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0305 seconds
INFO [2022-12-06 21:34:11,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355251.6498377, 'message': 'Dec 6 21:34:09 hqnl0246134 sshd[256734]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:34:13,672] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355253.6525815, 'message': 'Dec 6 21:34:12 hqnl0246134 sshd[256734]: Failed password for root from 61.177.173.18 port 61036 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:34:16,998] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:34:16,999] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:34:17,006] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:34:17,019] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 21:34:18,310] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:34:18,310] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:34:18,319] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:34:18,332] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
INFO [2022-12-06 21:34:21,093] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:34:21,094] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:34:21,104] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:34:21,118] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0233 seconds
INFO [2022-12-06 21:34:39,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355279.7046206, 'message': 'Dec 6 21:34:38 hqnl0246134 sshd[256769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 21:34:41,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355281.707032, 'message': 'Dec 6 21:34:40 hqnl0246134 sshd[256769]: Failed password for root from 165.227.166.207 port 33376 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 21:34:47,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.147.37.68', 'timestamp': 1670355287.718722, 'message': 'Dec 6 21:34:46 hqnl0246134 sshd[256771]: Invalid user dev from 141.147.37.68 port 34590', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 21:34:47,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '141.147.37.68', 'timestamp': 1670355287.7190337, 'message': 'Dec 6 21:34:46 hqnl0246134 sshd[256771]: pam_imunify(sshd:auth): [IM360_RBL] The IP 141.147.37.68 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 21:34:47,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '141.147.37.68', 'timestamp': 1670355287.7194211, 'message': 'Dec 6 21:34:46 hqnl0246134 sshd[256771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.147.37.68 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-06 21:34:49,028] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:34:49,029] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:34:49,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.147.37.68', 'timestamp': 1670355289.720811, 'message': 'Dec 6 21:34:48 hqnl0246134 sshd[256771]: Failed password for invalid user dev from 141.147.37.68 port 34590 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0510 seconds
INFO [2022-12-06 21:34:49,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355289.7211695, 'message': 'Dec 6 21:34:48 hqnl0246134 sshd[256783]: Invalid user xl from 46.101.123.135 port 39214', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0513 seconds
INFO [2022-12-06 21:34:49,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355289.7216103, 'message': 'Dec 6 21:34:49 hqnl0246134 sshd[256785]: Invalid user oracle from 134.122.57.194 port 34432', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0511 seconds
INFO [2022-12-06 21:34:49,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355289.721335, 'message': 'Dec 6 21:34:49 hqnl0246134 sshd[256783]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.123.135 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-06 21:34:49,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355289.7217257, 'message': 'Dec 6 21:34:49 hqnl0246134 sshd[256785]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.122.57.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 21:34:49,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '141.147.37.68', 'timestamp': 1670355289.7219837, 'message': 'Dec 6 21:34:49 hqnl0246134 sshd[256771]: Disconnected from invalid user dev 141.147.37.68 port 34590 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0417 seconds
INFO [2022-12-06 21:34:49,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355289.7214823, 'message': 'Dec 6 21:34:49 hqnl0246134 sshd[256783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.123.135 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 21:34:49,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355289.7218394, 'message': 'Dec 6 21:34:49 hqnl0246134 sshd[256785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.57.194 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 21:34:51,764] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355291.7222316, 'message': 'Dec 6 21:34:51 hqnl0246134 sshd[256783]: Failed password for invalid user xl from 46.101.123.135 port 39214 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0415 seconds
INFO [2022-12-06 21:34:51,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355291.7225604, 'message': 'Dec 6 21:34:51 hqnl0246134 sshd[256785]: Failed password for invalid user oracle from 134.122.57.194 port 34432 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-06 21:34:51,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355291.7226665, 'message': 'Dec 6 21:34:51 hqnl0246134 sshd[256787]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0417 seconds
INFO [2022-12-06 21:34:51,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355291.7224169, 'message': 'Dec 6 21:34:51 hqnl0246134 sshd[256783]: Disconnected from invalid user xl 46.101.123.135 port 39214 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 21:34:51,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355291.7227955, 'message': 'Dec 6 21:34:51 hqnl0246134 sshd[256787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 21:34:53,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355293.726524, 'message': 'Dec 6 21:34:52 hqnl0246134 sshd[256785]: Disconnected from invalid user oracle 134.122.57.194 port 34432 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:34:55,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355295.7295644, 'message': 'Dec 6 21:34:53 hqnl0246134 sshd[256787]: Failed password for root from 61.177.173.18 port 23430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 21:34:57,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355297.7311502, 'message': 'Dec 6 21:34:55 hqnl0246134 sshd[256787]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:34:57,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355297.7313745, 'message': 'Dec 6 21:34:57 hqnl0246134 sshd[256787]: Failed password for root from 61.177.173.18 port 23430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 21:34:59,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355299.7337558, 'message': 'Dec 6 21:34:58 hqnl0246134 sshd[256787]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 21:35:01,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355301.7362266, 'message': 'Dec 6 21:34:59 hqnl0246134 sshd[256787]: Failed password for root from 61.177.173.18 port 23430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
WARNING [2022-12-06 21:35:10,395] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:35:10,419] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0317 seconds
INFO [2022-12-06 21:35:13,764] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355313.7459385, 'message': 'Dec 6 21:35:12 hqnl0246134 sshd[256817]: Invalid user support from 157.230.228.27 port 40760', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:35:13,785] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355313.7461538, 'message': 'Dec 6 21:35:12 hqnl0246134 sshd[256817]: pam_imunify(sshd:auth): [IM360_RBL] The IP 157.230.228.27 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 21:35:13,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355313.7462733, 'message': 'Dec 6 21:35:12 hqnl0246134 sshd[256817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.228.27 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 21:35:15,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355315.7482898, 'message': 'Dec 6 21:35:14 hqnl0246134 sshd[256817]: Failed password for invalid user support from 157.230.228.27 port 40760 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 21:35:17,838] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:35:17,838] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 21:35:17,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '157.230.228.27', 'timestamp': 1670355317.7502549, 'message': 'Dec 6 21:35:16 hqnl0246134 sshd[256817]: Disconnected from invalid user support 157.230.228.27 port 40760 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0920 seconds
WARNING [2022-12-06 21:35:17,846] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:35:17,857] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 21:35:18,831] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:35:18,831] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:35:18,840] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:35:18,851] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 21:35:20,572] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:35:20,572] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:35:20,579] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:35:20,590] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 21:35:21,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355321.7546968, 'message': 'Dec 6 21:35:20 hqnl0246134 sshd[256845]: pam_imunify(sshd:auth): [IM360_RBL] The IP 192.241.157.126 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:35:21,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355321.7549202, 'message': 'Dec 6 21:35:20 hqnl0246134 sshd[256845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.157.126 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0161 seconds
INFO [2022-12-06 21:35:23,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355323.7577462, 'message': 'Dec 6 21:35:22 hqnl0246134 sshd[256845]: Failed password for root from 192.241.157.126 port 53166 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:35:41,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355341.7709181, 'message': 'Dec 6 21:35:40 hqnl0246134 sshd[256854]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 21:35:41,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355341.771447, 'message': 'Dec 6 21:35:40 hqnl0246134 sshd[256854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 21:35:43,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355343.7724626, 'message': 'Dec 6 21:35:42 hqnl0246134 sshd[256854]: Failed password for root from 61.177.173.18 port 50649 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 21:35:45,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355345.7737818, 'message': 'Dec 6 21:35:44 hqnl0246134 sshd[256854]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:35:47,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355347.7797806, 'message': 'Dec 6 21:35:46 hqnl0246134 sshd[256854]: Failed password for root from 61.177.173.18 port 50649 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 21:35:47,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '146.59.195.105', 'timestamp': 1670355347.780115, 'message': 'Dec 6 21:35:47 hqnl0246134 sshd[256858]: Invalid user svn from 146.59.195.105 port 59722', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 21:35:47,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355347.7799716, 'message': 'Dec 6 21:35:47 hqnl0246134 sshd[256854]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 21:35:47,849] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '146.59.195.105', 'timestamp': 1670355347.780221, 'message': 'Dec 6 21:35:47 hqnl0246134 sshd[256858]: pam_imunify(sshd:auth): [IM360_RBL] The IP 146.59.195.105 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 21:35:47,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '146.59.195.105', 'timestamp': 1670355347.7803833, 'message': 'Dec 6 21:35:47 hqnl0246134 sshd[256858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.59.195.105 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
WARNING [2022-12-06 21:35:49,038] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:35:49,039] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:35:49,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355349.7850165, 'message': 'Dec 6 21:35:49 hqnl0246134 sshd[256854]: Failed password for root from 61.177.173.18 port 50649 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 21:35:51,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '146.59.195.105', 'timestamp': 1670355351.790917, 'message': 'Dec 6 21:35:50 hqnl0246134 sshd[256858]: Failed password for invalid user svn from 146.59.195.105 port 59722 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:35:51,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '146.59.195.105', 'timestamp': 1670355351.7911882, 'message': 'Dec 6 21:35:51 hqnl0246134 sshd[256858]: Disconnected from invalid user svn 146.59.195.105 port 59722 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
WARNING [2022-12-06 21:36:10,403] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:36:10,431] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0381 seconds
INFO [2022-12-06 21:36:17,786] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:36:17,787] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:36:17,794] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:36:17,806] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 21:36:20,448] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:36:20,449] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:36:20,463] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:36:20,481] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0305 seconds
INFO [2022-12-06 21:36:29,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355389.839075, 'message': 'Dec 6 21:36:28 hqnl0246134 sshd[256922]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 21:36:29,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355389.8394494, 'message': 'Dec 6 21:36:28 hqnl0246134 sshd[256922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:36:31,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355391.8400033, 'message': 'Dec 6 21:36:30 hqnl0246134 sshd[256922]: Failed password for root from 61.177.173.18 port 15735 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:36:33,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355393.8437386, 'message': 'Dec 6 21:36:32 hqnl0246134 sshd[256922]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 21:36:35,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355395.8466978, 'message': 'Dec 6 21:36:34 hqnl0246134 sshd[256922]: Failed password for root from 61.177.173.18 port 15735 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:36:35,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355395.8469648, 'message': 'Dec 6 21:36:34 hqnl0246134 sshd[256922]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:36:37,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355397.8498573, 'message': 'Dec 6 21:36:36 hqnl0246134 sshd[256929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 21:36:37,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355397.8502843, 'message': 'Dec 6 21:36:37 hqnl0246134 sshd[256922]: Failed password for root from 61.177.173.18 port 15735 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 21:36:39,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355399.8557293, 'message': 'Dec 6 21:36:38 hqnl0246134 sshd[256929]: Failed password for root from 165.227.166.207 port 43630 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 21:36:40,946] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:36:40,946] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:36:40,954] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:36:40,966] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
WARNING [2022-12-06 21:36:49,042] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:36:49,043] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 21:37:10,409] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:37:10,433] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0348 seconds
INFO [2022-12-06 21:37:13,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355433.8960302, 'message': 'Dec 6 21:37:12 hqnl0246134 sshd[256968]: Invalid user steam from 23.224.81.32 port 59916', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:37:13,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355433.896328, 'message': 'Dec 6 21:37:12 hqnl0246134 sshd[256968]: pam_imunify(sshd:auth): [IM360_RBL] The IP 23.224.81.32 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:37:13,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355433.8965235, 'message': 'Dec 6 21:37:12 hqnl0246134 sshd[256968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.224.81.32 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 21:37:15,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355435.8978703, 'message': 'Dec 6 21:37:14 hqnl0246134 sshd[256968]: Failed password for invalid user steam from 23.224.81.32 port 59916 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 21:37:15,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355435.898077, 'message': 'Dec 6 21:37:15 hqnl0246134 sshd[256968]: Disconnected from invalid user steam 23.224.81.32 port 59916 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:37:17,945] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:37:17,946] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:37:17,960] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:37:17,977] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0286 seconds
INFO [2022-12-06 21:37:17,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355437.9498177, 'message': 'Dec 6 21:37:16 hqnl0246134 sshd[256970]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 21:37:17,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355437.949963, 'message': 'Dec 6 21:37:16 hqnl0246134 sshd[256970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:37:18,013] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355437.9500856, 'message': 'Dec 6 21:37:17 hqnl0246134 sshd[256970]: Failed password for root from 61.177.173.18 port 36858 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:37:19,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355439.9025922, 'message': 'Dec 6 21:37:18 hqnl0246134 sshd[256970]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 21:37:20,676] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:37:20,677] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:37:20,684] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:37:20,696] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 21:37:21,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355441.9051206, 'message': 'Dec 6 21:37:19 hqnl0246134 sshd[256970]: Failed password for root from 61.177.173.18 port 36858 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 21:37:21,943] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355441.9053323, 'message': 'Dec 6 21:37:20 hqnl0246134 sshd[256970]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:37:23,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355443.9083269, 'message': 'Dec 6 21:37:22 hqnl0246134 sshd[256992]: Invalid user zy from 46.101.123.135 port 57134', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 21:37:23,946] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355443.9088457, 'message': 'Dec 6 21:37:22 hqnl0246134 sshd[256970]: Failed password for root from 61.177.173.18 port 36858 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 21:37:23,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355443.9085584, 'message': 'Dec 6 21:37:22 hqnl0246134 sshd[256992]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.123.135 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 21:37:23,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355443.9087358, 'message': 'Dec 6 21:37:22 hqnl0246134 sshd[256992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.123.135 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:37:25,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355445.9144177, 'message': 'Dec 6 21:37:24 hqnl0246134 sshd[256992]: Failed password for invalid user zy from 46.101.123.135 port 57134 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 21:37:25,945] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355445.914652, 'message': 'Dec 6 21:37:24 hqnl0246134 sshd[256994]: Invalid user feng from 134.122.57.194 port 45056', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 21:37:25,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355445.914766, 'message': 'Dec 6 21:37:25 hqnl0246134 sshd[256994]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.122.57.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 21:37:25,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355445.915094, 'message': 'Dec 6 21:37:25 hqnl0246134 sshd[256994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.57.194 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 21:37:27,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355447.9197328, 'message': 'Dec 6 21:37:25 hqnl0246134 sshd[256992]: Disconnected from invalid user zy 46.101.123.135 port 57134 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 21:37:27,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355447.9201026, 'message': 'Dec 6 21:37:26 hqnl0246134 sshd[256994]: Failed password for invalid user feng from 134.122.57.194 port 45056 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 21:37:27,976] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.122.57.194', 'timestamp': 1670355447.9202898, 'message': 'Dec 6 21:37:26 hqnl0246134 sshd[256994]: Disconnected from invalid user feng 134.122.57.194 port 45056 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 21:37:49,046] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:37:49,047] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:37:51,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355471.9605517, 'message': 'Dec 6 21:37:51 hqnl0246134 sshd[257010]: Invalid user spider from 192.241.157.126 port 41960', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 21:37:52,005] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355471.961205, 'message': 'Dec 6 21:37:51 hqnl0246134 sshd[257010]: pam_imunify(sshd:auth): [IM360_RBL] The IP 192.241.157.126 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:37:52,024] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355471.9613934, 'message': 'Dec 6 21:37:51 hqnl0246134 sshd[257010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.157.126 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 21:37:53,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355473.9619014, 'message': 'Dec 6 21:37:52 hqnl0246134 sshd[257010]: Failed password for invalid user spider from 192.241.157.126 port 41960 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 21:37:56,016] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '192.241.157.126', 'timestamp': 1670355475.9622862, 'message': 'Dec 6 21:37:54 hqnl0246134 sshd[257010]: Disconnected from invalid user spider 192.241.157.126 port 41960 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0531 seconds
INFO [2022-12-06 21:37:57,119] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:37:57,119] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:37:57,127] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:37:57,140] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 21:38:06,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355486.0943687, 'message': 'Dec 6 21:38:04 hqnl0246134 sshd[257026]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 21:38:06,128] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355486.0945444, 'message': 'Dec 6 21:38:04 hqnl0246134 sshd[257026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 21:38:08,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355487.9757535, 'message': 'Dec 6 21:38:05 hqnl0246134 sshd[257026]: Failed password for root from 61.177.173.18 port 10392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 21:38:08,035] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355487.9760923, 'message': 'Dec 6 21:38:06 hqnl0246134 sshd[257026]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 21:38:08,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355487.976481, 'message': 'Dec 6 21:38:07 hqnl0246134 sshd[257026]: Failed password for root from 61.177.173.18 port 10392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:38:09,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355489.978119, 'message': 'Dec 6 21:38:08 hqnl0246134 sshd[257026]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 21:38:10,410] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:38:10,435] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0320 seconds
INFO [2022-12-06 21:38:11,685] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 21:38:11,752] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 21:38:11,753] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 21:38:11,753] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 21:38:11,753] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 21:38:11,753] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 21:38:11,762] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 21:38:11,778] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0239 seconds
WARNING [2022-12-06 21:38:11,785] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 21:38:11,787] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:38:11,805] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0335 seconds
INFO [2022-12-06 21:38:11,807] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0318 seconds
INFO [2022-12-06 21:38:12,001] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355491.9831617, 'message': 'Dec 6 21:38:10 hqnl0246134 sshd[257026]: Failed password for root from 61.177.173.18 port 10392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:38:17,715] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:38:17,715] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:38:17,724] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:38:17,736] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 21:38:20,322] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:38:20,322] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:38:20,333] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:38:20,345] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0223 seconds
INFO [2022-12-06 21:38:24,027] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '146.59.195.105', 'timestamp': 1670355503.9945154, 'message': 'Dec 6 21:38:22 hqnl0246134 sshd[257049]: pam_imunify(sshd:auth): [IM360_RBL] The IP 146.59.195.105 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 21:38:24,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '146.59.195.105', 'timestamp': 1670355503.9948108, 'message': 'Dec 6 21:38:22 hqnl0246134 sshd[257049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.59.195.105 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 21:38:24,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '146.59.195.105', 'timestamp': 1670355503.9950407, 'message': 'Dec 6 21:38:23 hqnl0246134 sshd[257049]: Failed password for root from 146.59.195.105 port 48670 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 21:38:30,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355510.0021813, 'message': 'Dec 6 21:38:29 hqnl0246134 sshd[257051]: Invalid user claudia from 202.160.145.243 port 39512', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 21:38:30,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355510.0036833, 'message': 'Dec 6 21:38:29 hqnl0246134 sshd[257051]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.160.145.243 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 21:38:30,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355510.0038981, 'message': 'Dec 6 21:38:29 hqnl0246134 sshd[257051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.160.145.243 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:38:32,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355512.0037794, 'message': 'Dec 6 21:38:31 hqnl0246134 sshd[257053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 21:38:32,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355512.0039465, 'message': 'Dec 6 21:38:31 hqnl0246134 sshd[257051]: Failed password for invalid user claudia from 202.160.145.243 port 39512 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 21:38:34,029] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355514.0068524, 'message': 'Dec 6 21:38:33 hqnl0246134 sshd[257053]: Failed password for root from 165.227.166.207 port 53958 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 21:38:36,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355516.0089374, 'message': 'Dec 6 21:38:34 hqnl0246134 sshd[257051]: Disconnected from invalid user claudia 202.160.145.243 port 39512 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.3306 seconds
INFO [2022-12-06 21:38:42,495] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 21:38:42,496] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 21:38:42,497] im360.plugins.client360: Waiting 6 minutes before retry...
WARNING [2022-12-06 21:38:49,049] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:38:49,050] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:38:52,057] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355532.0269496, 'message': 'Dec 6 21:38:50 hqnl0246134 sshd[257070]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 21:38:52,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355532.0276968, 'message': 'Dec 6 21:38:50 hqnl0246134 sshd[257070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:38:54,047] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355534.0285633, 'message': 'Dec 6 21:38:53 hqnl0246134 sshd[257070]: Failed password for root from 61.177.173.18 port 29449 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 21:38:56,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355536.03085, 'message': 'Dec 6 21:38:55 hqnl0246134 sshd[257070]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 21:38:58,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355538.0338671, 'message': 'Dec 6 21:38:56 hqnl0246134 sshd[257070]: Failed password for root from 61.177.173.18 port 29449 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 21:38:58,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355538.0341296, 'message': 'Dec 6 21:38:57 hqnl0246134 sshd[257070]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 21:39:00,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355540.0364664, 'message': 'Dec 6 21:38:59 hqnl0246134 sshd[257070]: Failed password for root from 61.177.173.18 port 29449 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 21:39:10,415] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:39:10,440] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0323 seconds
INFO [2022-12-06 21:39:18,357] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:39:18,358] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:39:18,365] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:39:18,376] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 21:39:21,362] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:39:21,363] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:39:21,387] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:39:21,423] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0592 seconds
INFO [2022-12-06 21:39:40,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355580.0845113, 'message': 'Dec 6 21:39:38 hqnl0246134 sshd[257225]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 21:39:40,142] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355580.0848427, 'message': 'Dec 6 21:39:38 hqnl0246134 sshd[257225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 21:39:40,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355580.0850477, 'message': 'Dec 6 21:39:39 hqnl0246134 sshd[257225]: Failed password for root from 61.177.173.18 port 46008 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 21:39:42,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355582.0845108, 'message': 'Dec 6 21:39:40 hqnl0246134 sshd[257225]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 21:39:44,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355584.0863523, 'message': 'Dec 6 21:39:42 hqnl0246134 sshd[257225]: Failed password for root from 61.177.173.18 port 46008 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 21:39:46,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355586.0903761, 'message': 'Dec 6 21:39:44 hqnl0246134 sshd[257225]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 21:39:48,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355588.0925171, 'message': 'Dec 6 21:39:46 hqnl0246134 sshd[257225]: Failed password for root from 61.177.173.18 port 46008 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 21:39:48,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355588.0927882, 'message': 'Dec 6 21:39:47 hqnl0246134 sshd[257253]: Invalid user sg from 46.101.123.135 port 46606', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 21:39:48,143] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355588.0929515, 'message': 'Dec 6 21:39:47 hqnl0246134 sshd[257253]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.123.135 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:39:48,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355588.0930772, 'message': 'Dec 6 21:39:47 hqnl0246134 sshd[257253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.123.135 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 21:39:49,055] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:39:49,056] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:39:49,560] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:39:49,560] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:39:49,570] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:39:49,582] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 21:39:50,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355590.0937996, 'message': 'Dec 6 21:39:49 hqnl0246134 sshd[257253]: Failed password for invalid user sg from 46.101.123.135 port 46606 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 21:39:52,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670355592.09729, 'message': 'Dec 6 21:39:50 hqnl0246134 sshd[257253]: Disconnected from invalid user sg 46.101.123.135 port 46606 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 21:40:10,419] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:40:10,440] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0275 seconds
INFO [2022-12-06 21:40:18,191] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:40:18,191] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:40:18,200] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:40:18,230] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0376 seconds
INFO [2022-12-06 21:40:20,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355620.128812, 'message': 'Dec 6 21:40:19 hqnl0246134 sshd[257306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 21:40:21,402] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:40:21,402] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:40:21,411] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:40:21,422] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 21:40:22,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355622.1297424, 'message': 'Dec 6 21:40:21 hqnl0246134 sshd[257306]: Failed password for root from 165.227.166.207 port 35988 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 21:40:28,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355628.1399395, 'message': 'Dec 6 21:40:27 hqnl0246134 sshd[257319]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 21:40:28,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355628.1401315, 'message': 'Dec 6 21:40:27 hqnl0246134 sshd[257319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 21:40:30,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355630.1420019, 'message': 'Dec 6 21:40:29 hqnl0246134 sshd[257319]: Failed password for root from 61.177.173.18 port 20304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 21:40:30,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355630.142215, 'message': 'Dec 6 21:40:29 hqnl0246134 sshd[257319]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 21:40:32,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355632.1445115, 'message': 'Dec 6 21:40:31 hqnl0246134 sshd[257319]: Failed password for root from 61.177.173.18 port 20304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 21:40:34,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355634.1458957, 'message': 'Dec 6 21:40:32 hqnl0246134 sshd[257319]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 21:40:34,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355634.1461716, 'message': 'Dec 6 21:40:34 hqnl0246134 sshd[257319]: Failed password for root from 61.177.173.18 port 20304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0514 seconds
WARNING [2022-12-06 21:40:49,059] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:40:49,061] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:40:52,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355652.1657827, 'message': 'Dec 6 21:40:50 hqnl0246134 sshd[257323]: pam_imunify(sshd:auth): [IM360_RBL] The IP 23.224.81.32 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 21:40:52,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355652.1663797, 'message': 'Dec 6 21:40:50 hqnl0246134 sshd[257323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.224.81.32 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 21:40:52,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '23.224.81.32', 'timestamp': 1670355652.1665614, 'message': 'Dec 6 21:40:52 hqnl0246134 sshd[257323]: Failed password for root from 23.224.81.32 port 43356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:40:55,005] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:40:55,006] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:40:55,013] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:40:55,025] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 21:41:00,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '146.59.195.105', 'timestamp': 1670355660.1792972, 'message': 'Dec 6 21:40:58 hqnl0246134 sshd[257339]: pam_imunify(sshd:auth): [IM360_RBL] The IP 146.59.195.105 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 21:41:00,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '146.59.195.105', 'timestamp': 1670355660.1795325, 'message': 'Dec 6 21:40:58 hqnl0246134 sshd[257339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.59.195.105 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:41:02,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '146.59.195.105', 'timestamp': 1670355662.182099, 'message': 'Dec 6 21:41:00 hqnl0246134 sshd[257339]: Failed password for root from 146.59.195.105 port 37626 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
WARNING [2022-12-06 21:41:10,425] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:41:10,467] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0498 seconds
INFO [2022-12-06 21:41:17,797] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:41:17,798] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:41:17,809] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:41:17,830] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0306 seconds
INFO [2022-12-06 21:41:18,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355678.2001028, 'message': 'Dec 6 21:41:16 hqnl0246134 sshd[257350]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:41:18,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355678.200319, 'message': 'Dec 6 21:41:16 hqnl0246134 sshd[257350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:41:20,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355680.2024412, 'message': 'Dec 6 21:41:18 hqnl0246134 sshd[257350]: Failed password for root from 61.177.173.18 port 42045 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 21:41:22,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355682.2050464, 'message': 'Dec 6 21:41:20 hqnl0246134 sshd[257350]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 21:41:22,408] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:41:22,409] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:41:22,417] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:41:22,430] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 21:41:24,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355684.205756, 'message': 'Dec 6 21:41:22 hqnl0246134 sshd[257350]: Failed password for root from 61.177.173.18 port 42045 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 21:41:26,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355686.2082045, 'message': 'Dec 6 21:41:24 hqnl0246134 sshd[257350]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 21:41:28,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355688.2096968, 'message': 'Dec 6 21:41:27 hqnl0246134 sshd[257350]: Failed password for root from 61.177.173.18 port 42045 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
WARNING [2022-12-06 21:41:49,063] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:41:49,065] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:41:52,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355712.2357202, 'message': 'Dec 6 21:41:51 hqnl0246134 sshd[257384]: Invalid user git from 202.160.145.243 port 60643', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 21:41:52,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355712.236345, 'message': 'Dec 6 21:41:51 hqnl0246134 sshd[257384]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.160.145.243 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 21:41:52,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355712.236534, 'message': 'Dec 6 21:41:51 hqnl0246134 sshd[257384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.160.145.243 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0209 seconds
WARNING [2022-12-06 21:41:54,007] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 21:41:56,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355716.2419, 'message': 'Dec 6 21:41:54 hqnl0246134 sshd[257384]: Failed password for invalid user git from 202.160.145.243 port 60643 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:41:58,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355718.2415917, 'message': 'Dec 6 21:41:56 hqnl0246134 sshd[257384]: Disconnected from invalid user git 202.160.145.243 port 60643 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:42:06,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355726.252395, 'message': 'Dec 6 21:42:04 hqnl0246134 sshd[257404]: Invalid user jenkins from 201.21.236.151 port 57392', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0542 seconds
INFO [2022-12-06 21:42:06,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355726.2538562, 'message': 'Dec 6 21:42:05 hqnl0246134 sshd[257408]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0526 seconds
INFO [2022-12-06 21:42:06,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355726.2532692, 'message': 'Dec 6 21:42:04 hqnl0246134 sshd[257404]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.21.236.151 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 21:42:06,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355726.2541518, 'message': 'Dec 6 21:42:05 hqnl0246134 sshd[257408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 21:42:06,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355726.2536013, 'message': 'Dec 6 21:42:04 hqnl0246134 sshd[257404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.21.236.151 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 21:42:08,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355728.252509, 'message': 'Dec 6 21:42:06 hqnl0246134 sshd[257404]: Failed password for invalid user jenkins from 201.21.236.151 port 57392 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 21:42:08,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355728.252703, 'message': 'Dec 6 21:42:08 hqnl0246134 sshd[257408]: Failed password for root from 61.177.173.18 port 63930 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 21:42:08,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355728.252814, 'message': 'Dec 6 21:42:08 hqnl0246134 sshd[257404]: Disconnected from invalid user jenkins 201.21.236.151 port 57392 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 21:42:10,285] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355730.2547076, 'message': 'Dec 6 21:42:09 hqnl0246134 sshd[257408]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 21:42:10,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355730.2567127, 'message': 'Dec 6 21:42:10 hqnl0246134 sshd[257414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0303 seconds
WARNING [2022-12-06 21:42:10,429] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:42:10,456] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0367 seconds
INFO [2022-12-06 21:42:10,886] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:42:10,886] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:42:10,893] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:42:10,906] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 21:42:12,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355732.2576685, 'message': 'Dec 6 21:42:11 hqnl0246134 sshd[257408]: Failed password for root from 61.177.173.18 port 63930 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 21:42:12,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355732.2580342, 'message': 'Dec 6 21:42:12 hqnl0246134 sshd[257414]: Failed password for root from 165.227.166.207 port 46280 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 21:42:12,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355732.2578485, 'message': 'Dec 6 21:42:11 hqnl0246134 sshd[257408]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:42:14,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355734.2610123, 'message': 'Dec 6 21:42:12 hqnl0246134 sshd[257419]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.98.7 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 21:42:14,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355734.2613497, 'message': 'Dec 6 21:42:13 hqnl0246134 sshd[257408]: Failed password for root from 61.177.173.18 port 63930 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 21:42:14,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355734.2611978, 'message': 'Dec 6 21:42:12 hqnl0246134 sshd[257419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.98.7 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:42:16,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355736.2630377, 'message': 'Dec 6 21:42:15 hqnl0246134 sshd[257419]: Failed password for root from 43.153.98.7 port 43356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:42:17,771] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:42:17,771] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:42:17,782] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:42:17,794] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 21:42:20,360] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:42:20,361] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:42:20,370] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:42:20,381] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 21:42:42,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '85.208.48.167', 'timestamp': 1670355762.2941518, 'message': 'Dec 6 21:42:41 hqnl0246134 sshd[257445]: pam_imunify(sshd:auth): [IM360_RBL] The IP 85.208.48.167 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 21:42:42,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '85.208.48.167', 'timestamp': 1670355762.2944443, 'message': 'Dec 6 21:42:41 hqnl0246134 sshd[257445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.208.48.167 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 21:42:44,321] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '85.208.48.167', 'timestamp': 1670355764.2960274, 'message': 'Dec 6 21:42:44 hqnl0246134 sshd[257445]: Failed password for root from 85.208.48.167 port 53084 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0248 seconds
WARNING [2022-12-06 21:42:49,068] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:42:49,069] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:42:54,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355774.3106322, 'message': 'Dec 6 21:42:53 hqnl0246134 sshd[257457]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 21:42:54,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355774.3110979, 'message': 'Dec 6 21:42:53 hqnl0246134 sshd[257457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 21:42:56,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355776.3131623, 'message': 'Dec 6 21:42:55 hqnl0246134 sshd[257457]: Failed password for root from 61.177.173.18 port 34430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 21:42:56,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355776.3134954, 'message': 'Dec 6 21:42:55 hqnl0246134 sshd[257457]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:42:58,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355778.3158977, 'message': 'Dec 6 21:42:57 hqnl0246134 sshd[257457]: Failed password for root from 61.177.173.18 port 34430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 21:42:58,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '5.141.81.226', 'timestamp': 1670355778.316397, 'message': 'Dec 6 21:42:58 hqnl0246134 sshd[257459]: pam_imunify(sshd:auth): [IM360_RBL] The IP 5.141.81.226 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 21:42:58,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355778.3162317, 'message': 'Dec 6 21:42:58 hqnl0246134 sshd[257457]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 21:42:58,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '5.141.81.226', 'timestamp': 1670355778.3165574, 'message': 'Dec 6 21:42:58 hqnl0246134 sshd[257459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.141.81.226 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 21:43:00,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '5.141.81.226', 'timestamp': 1670355780.320325, 'message': 'Dec 6 21:42:59 hqnl0246134 sshd[257459]: Failed password for root from 5.141.81.226 port 53586 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 21:43:00,359] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355780.320814, 'message': 'Dec 6 21:42:59 hqnl0246134 sshd[257457]: Failed password for root from 61.177.173.18 port 34430 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0368 seconds
WARNING [2022-12-06 21:43:10,433] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:43:10,457] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0342 seconds
INFO [2022-12-06 21:43:17,853] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:43:17,853] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:43:17,862] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:43:17,874] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 21:43:20,624] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:43:20,625] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:43:20,633] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:43:20,646] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 21:43:30,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '211.216.105.176', 'timestamp': 1670355810.3491833, 'message': 'Dec 6 21:43:29 hqnl0246134 sshd[257512]: Invalid user root01 from 211.216.105.176 port 48342', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 21:43:30,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '211.216.105.176', 'timestamp': 1670355810.3494654, 'message': 'Dec 6 21:43:29 hqnl0246134 sshd[257512]: pam_imunify(sshd:auth): [IM360_RBL] The IP 211.216.105.176 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:43:30,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '211.216.105.176', 'timestamp': 1670355810.3496263, 'message': 'Dec 6 21:43:29 hqnl0246134 sshd[257512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.216.105.176 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:43:32,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '211.216.105.176', 'timestamp': 1670355812.3495033, 'message': 'Dec 6 21:43:31 hqnl0246134 sshd[257512]: Failed password for invalid user root01 from 211.216.105.176 port 48342 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 21:43:34,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '211.216.105.176', 'timestamp': 1670355814.3499575, 'message': 'Dec 6 21:43:33 hqnl0246134 sshd[257512]: Disconnected from invalid user root01 211.216.105.176 port 48342 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:43:36,552] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:43:36,553] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:43:36,560] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:43:36,571] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 21:43:38,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.49.17.96', 'timestamp': 1670355818.353385, 'message': 'Dec 6 21:43:36 hqnl0246134 sshd[257520]: Invalid user joe from 110.49.17.96 port 45366', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 21:43:38,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '110.49.17.96', 'timestamp': 1670355818.353656, 'message': 'Dec 6 21:43:36 hqnl0246134 sshd[257520]: pam_imunify(sshd:auth): [IM360_RBL] The IP 110.49.17.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:43:38,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '110.49.17.96', 'timestamp': 1670355818.353831, 'message': 'Dec 6 21:43:36 hqnl0246134 sshd[257520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.17.96 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:43:40,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.49.17.96', 'timestamp': 1670355820.355688, 'message': 'Dec 6 21:43:39 hqnl0246134 sshd[257520]: Failed password for invalid user joe from 110.49.17.96 port 45366 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 21:43:40,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355820.3558936, 'message': 'Dec 6 21:43:40 hqnl0246134 sshd[257527]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 21:43:40,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355820.3560717, 'message': 'Dec 6 21:43:40 hqnl0246134 sshd[257527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:43:42,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '129.226.210.53', 'timestamp': 1670355822.3581197, 'message': 'Dec 6 21:43:40 hqnl0246134 sshd[257525]: pam_imunify(sshd:auth): [IM360_RBL] The IP 129.226.210.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0436 seconds
INFO [2022-12-06 21:43:42,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.49.17.96', 'timestamp': 1670355822.3582962, 'message': 'Dec 6 21:43:40 hqnl0246134 sshd[257520]: Disconnected from invalid user joe 110.49.17.96 port 45366 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0439 seconds
INFO [2022-12-06 21:43:42,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355822.3585138, 'message': 'Dec 6 21:43:41 hqnl0246134 sshd[257527]: Failed password for root from 61.177.173.18 port 49397 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 21:43:42,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '129.226.210.53', 'timestamp': 1670355822.35841, 'message': 'Dec 6 21:43:40 hqnl0246134 sshd[257525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.210.53 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 21:43:42,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355822.3588188, 'message': 'Dec 6 21:43:42 hqnl0246134 sshd[257527]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 21:43:42,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '129.226.210.53', 'timestamp': 1670355822.3586729, 'message': 'Dec 6 21:43:42 hqnl0246134 sshd[257525]: Failed password for root from 129.226.210.53 port 44890 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 21:43:44,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.159.223.158', 'timestamp': 1670355824.3614595, 'message': 'Dec 6 21:43:44 hqnl0246134 sshd[257530]: Invalid user test2 from 103.159.223.158 port 48192', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 21:43:46,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.159.223.158', 'timestamp': 1670355826.3620684, 'message': 'Dec 6 21:43:44 hqnl0246134 sshd[257530]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.159.223.158 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 21:43:46,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355826.3624656, 'message': 'Dec 6 21:43:44 hqnl0246134 sshd[257527]: Failed password for root from 61.177.173.18 port 49397 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 21:43:46,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.159.223.158', 'timestamp': 1670355826.3622935, 'message': 'Dec 6 21:43:44 hqnl0246134 sshd[257530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.159.223.158 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 21:43:46,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.159.223.158', 'timestamp': 1670355826.3625755, 'message': 'Dec 6 21:43:45 hqnl0246134 sshd[257530]: Failed password for invalid user test2 from 103.159.223.158 port 48192 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 21:43:48,472] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.159.223.158', 'timestamp': 1670355828.3646069, 'message': 'Dec 6 21:43:46 hqnl0246134 sshd[257530]: Disconnected from invalid user test2 103.159.223.158 port 48192 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1066 seconds
INFO [2022-12-06 21:43:48,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355828.3648002, 'message': 'Dec 6 21:43:46 hqnl0246134 sshd[257527]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1157 seconds
INFO [2022-12-06 21:43:48,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355828.3649864, 'message': 'Dec 6 21:43:47 hqnl0246134 sshd[257534]: Invalid user usuario from 201.21.236.151 port 54900', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1159 seconds
INFO [2022-12-06 21:43:48,549] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355828.3651154, 'message': 'Dec 6 21:43:47 hqnl0246134 sshd[257534]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.21.236.151 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0663 seconds
INFO [2022-12-06 21:43:48,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355828.3652647, 'message': 'Dec 6 21:43:47 hqnl0246134 sshd[257534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.21.236.151 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0724 seconds
WARNING [2022-12-06 21:43:49,073] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:43:49,074] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:43:50,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355830.36802, 'message': 'Dec 6 21:43:49 hqnl0246134 sshd[257527]: Failed password for root from 61.177.173.18 port 49397 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1313 seconds
INFO [2022-12-06 21:43:50,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355830.3683734, 'message': 'Dec 6 21:43:49 hqnl0246134 sshd[257534]: Failed password for invalid user usuario from 201.21.236.151 port 54900 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1316 seconds
INFO [2022-12-06 21:43:52,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355832.3728368, 'message': 'Dec 6 21:43:51 hqnl0246134 sshd[257534]: Disconnected from invalid user usuario 201.21.236.151 port 54900 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 21:43:58,406] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355838.382565, 'message': 'Dec 6 21:43:57 hqnl0246134 sshd[257548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 21:44:00,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355840.3869686, 'message': 'Dec 6 21:43:59 hqnl0246134 sshd[257548]: Failed password for root from 165.227.166.207 port 56564 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0433 seconds
WARNING [2022-12-06 21:44:10,437] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:44:10,470] defence360agent.internals.the_sink: SensorIncidentList(<20 item(s)>) processed in 0.0428 seconds
INFO [2022-12-06 21:44:16,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.110.241.56', 'timestamp': 1670355856.4112992, 'message': 'Dec 6 21:44:16 hqnl0246134 sshd[257562]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.110.241.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 21:44:16,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.110.241.56', 'timestamp': 1670355856.4117627, 'message': 'Dec 6 21:44:16 hqnl0246134 sshd[257562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.241.56 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:44:17,811] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:44:17,812] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:44:17,821] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:44:17,832] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 21:44:18,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '143.110.241.56', 'timestamp': 1670355858.4119892, 'message': 'Dec 6 21:44:18 hqnl0246134 sshd[257562]: Failed password for root from 143.110.241.56 port 52022 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 21:44:20,536] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:44:20,536] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:44:20,618] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:44:20,663] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1259 seconds
INFO [2022-12-06 21:44:28,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355868.4258924, 'message': 'Dec 6 21:44:26 hqnl0246134 sshd[257585]: Invalid user kiosk from 43.153.98.7 port 39942', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 21:44:28,462] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '80.87.33.100', 'timestamp': 1670355868.4266114, 'message': 'Dec 6 21:44:27 hqnl0246134 sshd[257583]: pam_imunify(sshd:auth): [IM360_RBL] The IP 80.87.33.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 21:44:28,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355868.4262877, 'message': 'Dec 6 21:44:26 hqnl0246134 sshd[257585]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.98.7 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0452 seconds
INFO [2022-12-06 21:44:28,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355868.426891, 'message': 'Dec 6 21:44:27 hqnl0246134 sshd[257587]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0458 seconds
INFO [2022-12-06 21:44:28,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '80.87.33.100', 'timestamp': 1670355868.4267826, 'message': 'Dec 6 21:44:27 hqnl0246134 sshd[257583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.87.33.100 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0458 seconds
INFO [2022-12-06 21:44:28,549] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355868.4264743, 'message': 'Dec 6 21:44:26 hqnl0246134 sshd[257585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.98.7 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-06 21:44:28,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355868.427079, 'message': 'Dec 6 21:44:27 hqnl0246134 sshd[257587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 21:44:28,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '80.87.33.100', 'timestamp': 1670355868.4272795, 'message': 'Dec 6 21:44:28 hqnl0246134 sshd[257583]: Failed password for root from 80.87.33.100 port 57376 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 21:44:28,567] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355868.4271808, 'message': 'Dec 6 21:44:28 hqnl0246134 sshd[257585]: Failed password for invalid user kiosk from 43.153.98.7 port 39942 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 21:44:30,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355870.426456, 'message': 'Dec 6 21:44:29 hqnl0246134 sshd[257585]: Disconnected from invalid user kiosk 43.153.98.7 port 39942 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 21:44:30,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355870.4267528, 'message': 'Dec 6 21:44:29 hqnl0246134 sshd[257587]: Failed password for root from 61.177.173.18 port 21183 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 21:44:30,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355870.4269574, 'message': 'Dec 6 21:44:30 hqnl0246134 sshd[257587]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 21:44:32,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355872.4284494, 'message': 'Dec 6 21:44:32 hqnl0246134 sshd[257587]: Failed password for root from 61.177.173.18 port 21183 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:44:32,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355872.4286246, 'message': 'Dec 6 21:44:32 hqnl0246134 sshd[257587]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:44:34,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355874.431076, 'message': 'Dec 6 21:44:34 hqnl0246134 sshd[257587]: Failed password for root from 61.177.173.18 port 21183 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 21:44:46,970] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 21:44:47,037] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 21:44:47,037] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 21:44:47,037] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 21:44:47,038] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 21:44:47,038] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 21:44:47,053] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 21:44:47,078] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0397 seconds
WARNING [2022-12-06 21:44:47,089] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 21:44:47,093] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:44:47,239] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.1689 seconds
INFO [2022-12-06 21:44:47,240] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.1656 seconds
WARNING [2022-12-06 21:44:49,078] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:44:49,079] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:45:06,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355906.4694257, 'message': 'Dec 6 21:45:05 hqnl0246134 sshd[257623]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.160.145.243 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 21:45:06,509] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '141.147.37.68', 'timestamp': 1670355906.4702091, 'message': 'Dec 6 21:45:05 hqnl0246134 sshd[257625]: pam_imunify(sshd:auth): [IM360_RBL] The IP 141.147.37.68 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 21:45:06,540] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355906.470054, 'message': 'Dec 6 21:45:05 hqnl0246134 sshd[257623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.160.145.243 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 21:45:06,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '141.147.37.68', 'timestamp': 1670355906.470331, 'message': 'Dec 6 21:45:05 hqnl0246134 sshd[257625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.147.37.68 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 21:45:08,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '202.160.145.243', 'timestamp': 1670355908.4698803, 'message': 'Dec 6 21:45:07 hqnl0246134 sshd[257623]: Failed password for root from 202.160.145.243 port 53554 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 21:45:08,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '141.147.37.68', 'timestamp': 1670355908.47011, 'message': 'Dec 6 21:45:07 hqnl0246134 sshd[257625]: Failed password for root from 141.147.37.68 port 50532 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 21:45:10,437] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:45:10,438] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:45:10,457] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 21:45:10,458] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:45:10,517] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0787 seconds
INFO [2022-12-06 21:45:10,518] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0768 seconds
INFO [2022-12-06 21:45:10,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355910.4906318, 'message': 'Dec 6 21:45:10 hqnl0246134 sshd[257632]: Invalid user shawn from 43.153.98.7 port 48050', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 21:45:10,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355910.4908454, 'message': 'Dec 6 21:45:10 hqnl0246134 sshd[257632]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.98.7 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 21:45:10,561] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355910.4910066, 'message': 'Dec 6 21:45:10 hqnl0246134 sshd[257632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.98.7 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-06 21:45:12,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355912.4761636, 'message': 'Dec 6 21:45:12 hqnl0246134 sshd[257632]: Failed password for invalid user shawn from 43.153.98.7 port 48050 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 21:45:14,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355914.4779198, 'message': 'Dec 6 21:45:14 hqnl0246134 sshd[257632]: Disconnected from invalid user shawn 43.153.98.7 port 48050 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 21:45:16,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355916.48125, 'message': 'Dec 6 21:45:15 hqnl0246134 sshd[257644]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 21:45:16,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355916.4815292, 'message': 'Dec 6 21:45:15 hqnl0246134 sshd[257644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:45:17,182] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 21:45:17,183] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 21:45:17,184] im360.plugins.client360: Waiting 7 minutes before retry...
INFO [2022-12-06 21:45:17,915] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:45:17,916] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:45:17,923] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:45:17,934] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 21:45:18,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355918.482351, 'message': 'Dec 6 21:45:17 hqnl0246134 sshd[257644]: Failed password for root from 61.177.173.18 port 48076 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 21:45:18,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355918.4826918, 'message': 'Dec 6 21:45:17 hqnl0246134 sshd[257644]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:45:20,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355920.4840863, 'message': 'Dec 6 21:45:19 hqnl0246134 sshd[257644]: Failed password for root from 61.177.173.18 port 48076 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 21:45:20,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355920.484389, 'message': 'Dec 6 21:45:19 hqnl0246134 sshd[257644]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:45:20,736] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:45:20,737] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:45:20,747] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:45:20,825] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0875 seconds
INFO [2022-12-06 21:45:22,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355922.48631, 'message': 'Dec 6 21:45:21 hqnl0246134 sshd[257644]: Failed password for root from 61.177.173.18 port 48076 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 21:45:40,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355940.5267978, 'message': 'Dec 6 21:45:39 hqnl0246134 sshd[257669]: Invalid user vnc from 201.21.236.151 port 57814', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:45:40,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355940.5270693, 'message': 'Dec 6 21:45:39 hqnl0246134 sshd[257669]: pam_imunify(sshd:auth): [IM360_RBL] The IP 201.21.236.151 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 21:45:40,585] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355940.527213, 'message': 'Dec 6 21:45:39 hqnl0246134 sshd[257669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.21.236.151 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:45:42,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355942.5286627, 'message': 'Dec 6 21:45:40 hqnl0246134 sshd[257669]: Failed password for invalid user vnc from 201.21.236.151 port 57814 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 21:45:44,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '201.21.236.151', 'timestamp': 1670355944.5302315, 'message': 'Dec 6 21:45:42 hqnl0246134 sshd[257669]: Disconnected from invalid user vnc 201.21.236.151 port 57814 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 21:45:44,567] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355944.5304081, 'message': 'Dec 6 21:45:43 hqnl0246134 sshd[257671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 21:45:46,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670355946.5326288, 'message': 'Dec 6 21:45:45 hqnl0246134 sshd[257671]: Failed password for root from 165.227.166.207 port 38622 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 21:45:46,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355946.5328174, 'message': 'Dec 6 21:45:45 hqnl0246134 sshd[257673]: Invalid user lee from 43.153.98.7 port 56132', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 21:45:46,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355946.5329847, 'message': 'Dec 6 21:45:45 hqnl0246134 sshd[257673]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.98.7 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 21:45:46,616] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355946.533093, 'message': 'Dec 6 21:45:45 hqnl0246134 sshd[257673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.98.7 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 21:45:48,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355948.533605, 'message': 'Dec 6 21:45:47 hqnl0246134 sshd[257673]: Failed password for invalid user lee from 43.153.98.7 port 56132 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
WARNING [2022-12-06 21:45:49,082] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:45:49,082] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:45:50,554] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.98.7', 'timestamp': 1670355950.5363426, 'message': 'Dec 6 21:45:49 hqnl0246134 sshd[257673]: Disconnected from invalid user lee 43.153.98.7 port 56132 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:46:06,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355966.5566907, 'message': 'Dec 6 21:46:04 hqnl0246134 sshd[257693]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 21:46:06,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355966.557073, 'message': 'Dec 6 21:46:04 hqnl0246134 sshd[257693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 21:46:08,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355968.557875, 'message': 'Dec 6 21:46:06 hqnl0246134 sshd[257693]: Failed password for root from 61.177.173.18 port 23028 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 21:46:10,453] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:46:10,480] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0350 seconds
INFO [2022-12-06 21:46:10,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355970.560022, 'message': 'Dec 6 21:46:08 hqnl0246134 sshd[257693]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:46:12,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355972.5621884, 'message': 'Dec 6 21:46:11 hqnl0246134 sshd[257693]: Failed password for root from 61.177.173.18 port 23028 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 21:46:12,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355972.5626066, 'message': 'Dec 6 21:46:11 hqnl0246134 sshd[257693]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:46:14,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670355974.5646408, 'message': 'Dec 6 21:46:13 hqnl0246134 sshd[257693]: Failed password for root from 61.177.173.18 port 23028 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:46:18,339] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:46:18,340] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:46:18,347] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:46:18,360] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 21:46:18,706] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:46:18,706] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:46:18,717] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:46:18,737] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0295 seconds
INFO [2022-12-06 21:46:21,343] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:46:21,343] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:46:21,352] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:46:21,371] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0264 seconds
WARNING [2022-12-06 21:46:49,089] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:46:49,090] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:46:52,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '5.141.81.226', 'timestamp': 1670356012.601502, 'message': 'Dec 6 21:46:52 hqnl0246134 sshd[257737]: Invalid user tony from 5.141.81.226 port 39164', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 21:46:52,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '5.141.81.226', 'timestamp': 1670356012.6020575, 'message': 'Dec 6 21:46:52 hqnl0246134 sshd[257737]: pam_imunify(sshd:auth): [IM360_RBL] The IP 5.141.81.226 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 21:46:52,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '5.141.81.226', 'timestamp': 1670356012.6022387, 'message': 'Dec 6 21:46:52 hqnl0246134 sshd[257737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.141.81.226 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 21:46:54,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356014.604053, 'message': 'Dec 6 21:46:53 hqnl0246134 sshd[257739]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 21:46:54,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '5.141.81.226', 'timestamp': 1670356014.6044014, 'message': 'Dec 6 21:46:54 hqnl0246134 sshd[257737]: Failed password for invalid user tony from 5.141.81.226 port 39164 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 21:46:54,651] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356014.6042879, 'message': 'Dec 6 21:46:53 hqnl0246134 sshd[257739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:46:56,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356016.6067646, 'message': 'Dec 6 21:46:55 hqnl0246134 sshd[257739]: Failed password for root from 61.177.173.18 port 43739 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 21:46:56,637] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '5.141.81.226', 'timestamp': 1670356016.6071153, 'message': 'Dec 6 21:46:56 hqnl0246134 sshd[257737]: Disconnected from invalid user tony 5.141.81.226 port 39164 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 21:46:56,654] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356016.6069815, 'message': 'Dec 6 21:46:55 hqnl0246134 sshd[257739]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 21:46:58,632] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356018.6102781, 'message': 'Dec 6 21:46:57 hqnl0246134 sshd[257739]: Failed password for root from 61.177.173.18 port 43739 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 21:46:58,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356018.6104667, 'message': 'Dec 6 21:46:57 hqnl0246134 sshd[257739]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 21:47:00,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356020.6108577, 'message': 'Dec 6 21:47:00 hqnl0246134 sshd[257739]: Failed password for root from 61.177.173.18 port 43739 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 21:47:08,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356028.6223872, 'message': 'Dec 6 21:47:06 hqnl0246134 sshd[257781]: Invalid user contador from 43.153.30.100 port 48662', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 21:47:08,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356028.6228688, 'message': 'Dec 6 21:47:07 hqnl0246134 sshd[257783]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.43.241 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 21:47:08,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356028.6225863, 'message': 'Dec 6 21:47:06 hqnl0246134 sshd[257781]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.30.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0383 seconds
INFO [2022-12-06 21:47:08,703] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356028.622991, 'message': 'Dec 6 21:47:07 hqnl0246134 sshd[257783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.43.241 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 21:47:08,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356028.6227503, 'message': 'Dec 6 21:47:06 hqnl0246134 sshd[257781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.30.100 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0308 seconds
WARNING [2022-12-06 21:47:10,456] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:47:10,481] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0323 seconds
INFO [2022-12-06 21:47:10,654] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356030.624463, 'message': 'Dec 6 21:47:09 hqnl0246134 sshd[257783]: Failed password for root from 143.198.43.241 port 42880 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 21:47:10,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356030.6246727, 'message': 'Dec 6 21:47:09 hqnl0246134 sshd[257781]: Failed password for invalid user contador from 43.153.30.100 port 48662 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 21:47:10,673] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356030.6248171, 'message': 'Dec 6 21:47:10 hqnl0246134 sshd[257781]: Disconnected from invalid user contador 43.153.30.100 port 48662 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:47:18,990] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:47:18,991] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:47:18,999] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:47:19,011] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 21:47:21,695] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:47:21,696] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:47:21,706] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:47:21,719] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-06 21:47:32,685] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356052.6478744, 'message': 'Dec 6 21:47:31 hqnl0246134 sshd[257809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 21:47:34,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356054.6483319, 'message': 'Dec 6 21:47:33 hqnl0246134 sshd[257809]: Failed password for root from 165.227.166.207 port 48916 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 21:47:36,322] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:47:36,323] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:47:36,331] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:47:36,343] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 21:47:42,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356062.657629, 'message': 'Dec 6 21:47:42 hqnl0246134 sshd[257817]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0681 seconds
INFO [2022-12-06 21:47:42,778] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356062.6579869, 'message': 'Dec 6 21:47:42 hqnl0246134 sshd[257817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0511 seconds
INFO [2022-12-06 21:47:44,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356064.6582232, 'message': 'Dec 6 21:47:44 hqnl0246134 sshd[257817]: Failed password for root from 61.177.173.18 port 10793 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 21:47:48,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356068.662077, 'message': 'Dec 6 21:47:46 hqnl0246134 sshd[257817]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0472 seconds
WARNING [2022-12-06 21:47:49,093] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:47:49,093] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:47:50,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356070.664886, 'message': 'Dec 6 21:47:48 hqnl0246134 sshd[257817]: Failed password for root from 61.177.173.18 port 10793 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 21:47:52,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356072.6662383, 'message': 'Dec 6 21:47:51 hqnl0246134 sshd[257817]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 21:47:54,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356074.6684217, 'message': 'Dec 6 21:47:53 hqnl0246134 sshd[257817]: Failed password for root from 61.177.173.18 port 10793 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:47:56,782] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '5.141.81.226', 'timestamp': 1670356076.6718483, 'message': 'Dec 6 21:47:55 hqnl0246134 sshd[257832]: pam_imunify(sshd:auth): [IM360_RBL] The IP 5.141.81.226 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1095 seconds
INFO [2022-12-06 21:47:56,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356076.6723967, 'message': 'Dec 6 21:47:56 hqnl0246134 sshd[257834]: Invalid user shawn from 85.208.48.167 port 58492', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1101 seconds
INFO [2022-12-06 21:47:56,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '5.141.81.226', 'timestamp': 1670356076.6721306, 'message': 'Dec 6 21:47:55 hqnl0246134 sshd[257832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.141.81.226 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1192 seconds
INFO [2022-12-06 21:47:56,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356076.6725926, 'message': 'Dec 6 21:47:56 hqnl0246134 sshd[257834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 85.208.48.167 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1187 seconds
INFO [2022-12-06 21:47:56,967] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356076.6727848, 'message': 'Dec 6 21:47:56 hqnl0246134 sshd[257834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.208.48.167 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0624 seconds
INFO [2022-12-06 21:47:58,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '5.141.81.226', 'timestamp': 1670356078.6760638, 'message': 'Dec 6 21:47:57 hqnl0246134 sshd[257832]: Failed password for root from 5.141.81.226 port 54060 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 21:47:58,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356078.6764038, 'message': 'Dec 6 21:47:58 hqnl0246134 sshd[257834]: Failed password for invalid user shawn from 85.208.48.167 port 58492 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 21:48:00,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356080.6785548, 'message': 'Dec 6 21:48:00 hqnl0246134 sshd[257834]: Disconnected from invalid user shawn 85.208.48.167 port 58492 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0254 seconds
WARNING [2022-12-06 21:48:10,460] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:48:10,483] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0308 seconds
INFO [2022-12-06 21:48:18,097] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:48:18,097] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:48:18,105] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:48:18,116] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 21:48:20,693] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:48:20,693] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:48:20,701] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:48:20,726] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0317 seconds
INFO [2022-12-06 21:48:20,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356100.70245, 'message': 'Dec 6 21:48:20 hqnl0246134 sshd[257855]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.30.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 21:48:20,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356100.7026472, 'message': 'Dec 6 21:48:20 hqnl0246134 sshd[257855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.30.100 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:48:22,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356102.7052736, 'message': 'Dec 6 21:48:22 hqnl0246134 sshd[257855]: Failed password for root from 43.153.30.100 port 33418 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0393 seconds
INFO [2022-12-06 21:48:32,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356112.7140126, 'message': 'Dec 6 21:48:31 hqnl0246134 sshd[257869]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 21:48:32,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356112.7143776, 'message': 'Dec 6 21:48:31 hqnl0246134 sshd[257869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:48:34,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356114.7160826, 'message': 'Dec 6 21:48:33 hqnl0246134 sshd[257869]: Failed password for root from 61.177.173.18 port 34120 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 21:48:34,752] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356114.7163794, 'message': 'Dec 6 21:48:33 hqnl0246134 sshd[257869]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:48:36,740] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356116.7207186, 'message': 'Dec 6 21:48:36 hqnl0246134 sshd[257869]: Failed password for root from 61.177.173.18 port 34120 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:48:38,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356118.7240705, 'message': 'Dec 6 21:48:38 hqnl0246134 sshd[257869]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 21:48:40,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356120.7311022, 'message': 'Dec 6 21:48:40 hqnl0246134 sshd[257869]: Failed password for root from 61.177.173.18 port 34120 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 21:48:49,097] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:48:49,098] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:48:56,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '5.141.81.226', 'timestamp': 1670356136.749174, 'message': 'Dec 6 21:48:56 hqnl0246134 sshd[257883]: pam_imunify(sshd:auth): [IM360_RBL] The IP 5.141.81.226 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 21:48:56,793] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '5.141.81.226', 'timestamp': 1670356136.750037, 'message': 'Dec 6 21:48:56 hqnl0246134 sshd[257883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.141.81.226 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:48:58,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '5.141.81.226', 'timestamp': 1670356138.7498431, 'message': 'Dec 6 21:48:58 hqnl0246134 sshd[257883]: Failed password for root from 5.141.81.226 port 40726 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 21:49:01,138] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:49:01,139] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:49:01,153] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:49:01,173] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0324 seconds
WARNING [2022-12-06 21:49:10,467] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:49:10,490] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0360 seconds
INFO [2022-12-06 21:49:17,811] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:49:17,811] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:49:17,818] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:49:17,829] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 21:49:18,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356158.7788374, 'message': 'Dec 6 21:49:17 hqnl0246134 sshd[257908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:49:20,443] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:49:20,444] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:49:20,451] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:49:20,464] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 21:49:20,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356160.7854705, 'message': 'Dec 6 21:49:19 hqnl0246134 sshd[257911]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 21:49:20,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356160.7860613, 'message': 'Dec 6 21:49:20 hqnl0246134 sshd[257908]: Failed password for root from 165.227.166.207 port 59202 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 21:49:20,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356160.7858062, 'message': 'Dec 6 21:49:19 hqnl0246134 sshd[257911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:49:20,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356160.7862997, 'message': 'Dec 6 21:49:20 hqnl0246134 sshd[257911]: Failed password for root from 61.177.173.18 port 52073 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 21:49:22,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356162.7908745, 'message': 'Dec 6 21:49:21 hqnl0246134 sshd[257911]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 21:49:24,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356164.7928169, 'message': 'Dec 6 21:49:23 hqnl0246134 sshd[257911]: Failed password for root from 61.177.173.18 port 52073 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 21:49:24,827] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356164.7930272, 'message': 'Dec 6 21:49:23 hqnl0246134 sshd[257911]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 21:49:26,825] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356166.7936234, 'message': 'Dec 6 21:49:25 hqnl0246134 sshd[257925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.30.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 21:49:26,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356166.7940066, 'message': 'Dec 6 21:49:26 hqnl0246134 sshd[257911]: Failed password for root from 61.177.173.18 port 52073 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 21:49:26,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356166.7938578, 'message': 'Dec 6 21:49:25 hqnl0246134 sshd[257925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.30.100 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:49:28,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356168.7963853, 'message': 'Dec 6 21:49:27 hqnl0246134 sshd[257925]: Failed password for root from 43.153.30.100 port 60542 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 21:49:38,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356178.8079665, 'message': 'Dec 6 21:49:37 hqnl0246134 sshd[257930]: Invalid user lee from 85.208.48.167 port 52638', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:49:38,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356178.808313, 'message': 'Dec 6 21:49:37 hqnl0246134 sshd[257930]: pam_imunify(sshd:auth): [IM360_RBL] The IP 85.208.48.167 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 21:49:38,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356178.8091087, 'message': 'Dec 6 21:49:37 hqnl0246134 sshd[257930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.208.48.167 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 21:49:40,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356180.8096335, 'message': 'Dec 6 21:49:39 hqnl0246134 sshd[257932]: Invalid user test2 from 181.204.164.18 port 40242', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 21:49:40,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356180.8105779, 'message': 'Dec 6 21:49:39 hqnl0246134 sshd[257930]: Failed password for invalid user lee from 85.208.48.167 port 52638 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 21:49:40,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356180.8098688, 'message': 'Dec 6 21:49:39 hqnl0246134 sshd[257932]: pam_imunify(sshd:auth): [IM360_RBL] The IP 181.204.164.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:49:40,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356180.8100553, 'message': 'Dec 6 21:49:39 hqnl0246134 sshd[257932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.204.164.18 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:49:42,924] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356182.811885, 'message': 'Dec 6 21:49:41 hqnl0246134 sshd[257930]: Disconnected from invalid user lee 85.208.48.167 port 52638 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1116 seconds
INFO [2022-12-06 21:49:42,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356182.8125184, 'message': 'Dec 6 21:49:41 hqnl0246134 sshd[257932]: Failed password for invalid user test2 from 181.204.164.18 port 40242 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1121 seconds
INFO [2022-12-06 21:49:44,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356184.81594, 'message': 'Dec 6 21:49:43 hqnl0246134 sshd[257932]: Disconnected from invalid user test2 181.204.164.18 port 40242 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-06 21:49:49,102] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:49:49,103] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:50:08,888] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356208.8595502, 'message': 'Dec 6 21:50:07 hqnl0246134 sshd[257967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 21:50:08,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356208.860311, 'message': 'Dec 6 21:50:07 hqnl0246134 sshd[257967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 21:50:10,466] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:50:10,494] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0361 seconds
INFO [2022-12-06 21:50:10,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356210.8623815, 'message': 'Dec 6 21:50:09 hqnl0246134 sshd[257967]: Failed password for root from 61.177.173.18 port 24609 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 21:50:10,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356210.86271, 'message': 'Dec 6 21:50:10 hqnl0246134 sshd[257973]: Invalid user bootcamp from 103.100.208.189 port 55354', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 21:50:10,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356210.8625944, 'message': 'Dec 6 21:50:09 hqnl0246134 sshd[257967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 21:50:12,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356212.863963, 'message': 'Dec 6 21:50:10 hqnl0246134 sshd[257973]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.100.208.189 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0772 seconds
INFO [2022-12-06 21:50:12,943] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356212.8646257, 'message': 'Dec 6 21:50:11 hqnl0246134 sshd[257967]: Failed password for root from 61.177.173.18 port 24609 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0763 seconds
INFO [2022-12-06 21:50:12,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356212.8643358, 'message': 'Dec 6 21:50:10 hqnl0246134 sshd[257973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.208.189 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 21:50:12,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356212.86491, 'message': 'Dec 6 21:50:12 hqnl0246134 sshd[257967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 21:50:14,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356214.8649778, 'message': 'Dec 6 21:50:12 hqnl0246134 sshd[257973]: Failed password for invalid user bootcamp from 103.100.208.189 port 55354 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 21:50:14,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356214.8653536, 'message': 'Dec 6 21:50:14 hqnl0246134 sshd[257967]: Failed password for root from 61.177.173.18 port 24609 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 21:50:14,918] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356214.8652263, 'message': 'Dec 6 21:50:13 hqnl0246134 sshd[257973]: Disconnected from invalid user bootcamp 103.100.208.189 port 55354 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 21:50:17,929] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:50:17,929] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:50:17,936] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:50:17,948] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 21:50:22,314] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:50:22,315] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:50:22,324] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:50:22,336] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 21:50:30,919] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356230.8917427, 'message': 'Dec 6 21:50:29 hqnl0246134 sshd[258002]: Invalid user it from 43.153.30.100 port 34672', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 21:50:30,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356230.892082, 'message': 'Dec 6 21:50:29 hqnl0246134 sshd[258002]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.30.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 21:50:30,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356230.8922663, 'message': 'Dec 6 21:50:29 hqnl0246134 sshd[258002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.30.100 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 21:50:32,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356232.894675, 'message': 'Dec 6 21:50:31 hqnl0246134 sshd[258002]: Failed password for invalid user it from 43.153.30.100 port 34672 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 21:50:32,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670356232.8948681, 'message': 'Dec 6 21:50:32 hqnl0246134 sshd[258002]: Disconnected from invalid user it 43.153.30.100 port 34672 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 21:50:34,301] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:50:34,302] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:50:34,311] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:50:34,323] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 21:50:38,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356238.9173787, 'message': 'Dec 6 21:50:37 hqnl0246134 sshd[258010]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.112.202 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 21:50:38,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356238.9177651, 'message': 'Dec 6 21:50:37 hqnl0246134 sshd[258010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.112.202 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 21:50:40,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356240.931487, 'message': 'Dec 6 21:50:39 hqnl0246134 sshd[258010]: Failed password for root from 139.59.112.202 port 45224 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
WARNING [2022-12-06 21:50:49,107] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:50:49,109] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:50:52,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356252.9613469, 'message': 'Dec 6 21:50:52 hqnl0246134 sshd[258020]: pam_imunify(sshd:auth): [IM360_RBL] The IP 147.182.230.251 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 21:50:53,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356252.9619823, 'message': 'Dec 6 21:50:52 hqnl0246134 sshd[258020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.230.251 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:50:55,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356254.9655783, 'message': 'Dec 6 21:50:53 hqnl0246134 sshd[258022]: Invalid user labor from 211.216.105.176 port 58717', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 21:50:55,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356254.9661965, 'message': 'Dec 6 21:50:54 hqnl0246134 sshd[258020]: Failed password for root from 147.182.230.251 port 55324 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 21:50:55,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356254.9658675, 'message': 'Dec 6 21:50:53 hqnl0246134 sshd[258022]: pam_imunify(sshd:auth): [IM360_RBL] The IP 211.216.105.176 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 21:50:55,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356254.9660552, 'message': 'Dec 6 21:50:53 hqnl0246134 sshd[258022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.216.105.176 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:50:57,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356256.9703395, 'message': 'Dec 6 21:50:55 hqnl0246134 sshd[258022]: Failed password for invalid user labor from 211.216.105.176 port 58717 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0608 seconds
INFO [2022-12-06 21:50:57,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356256.9706953, 'message': 'Dec 6 21:50:55 hqnl0246134 sshd[258032]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0621 seconds
INFO [2022-12-06 21:50:57,082] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356256.9705653, 'message': 'Dec 6 21:50:55 hqnl0246134 sshd[258022]: Disconnected from invalid user labor 211.216.105.176 port 58717 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0497 seconds
INFO [2022-12-06 21:50:57,084] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356256.9708254, 'message': 'Dec 6 21:50:55 hqnl0246134 sshd[258032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0500 seconds
INFO [2022-12-06 21:50:59,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356258.985219, 'message': 'Dec 6 21:50:57 hqnl0246134 sshd[258032]: Failed password for root from 61.177.173.18 port 51796 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 21:50:59,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356258.9855347, 'message': 'Dec 6 21:50:58 hqnl0246134 sshd[258032]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 21:51:01,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356260.9910376, 'message': 'Dec 6 21:51:00 hqnl0246134 sshd[258032]: Failed password for root from 61.177.173.18 port 51796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 21:51:01,027] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356260.9913044, 'message': 'Dec 6 21:51:00 hqnl0246134 sshd[258032]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:51:03,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356263.0056443, 'message': 'Dec 6 21:51:02 hqnl0246134 sshd[258058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 21:51:05,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356265.009435, 'message': 'Dec 6 21:51:03 hqnl0246134 sshd[258032]: Failed password for root from 61.177.173.18 port 51796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 21:51:05,037] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356265.0096197, 'message': 'Dec 6 21:51:03 hqnl0246134 sshd[258058]: Failed password for root from 165.227.166.207 port 41270 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0266 seconds
WARNING [2022-12-06 21:51:10,469] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:51:10,497] defence360agent.internals.the_sink: SensorIncidentList(<21 item(s)>) processed in 0.0351 seconds
INFO [2022-12-06 21:51:18,019] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:51:18,020] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:51:18,031] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:51:18,044] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
INFO [2022-12-06 21:51:19,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356279.0868576, 'message': 'Dec 6 21:51:18 hqnl0246134 sshd[258071]: Invalid user kiosk from 85.208.48.167 port 46772', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:51:19,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356279.0870974, 'message': 'Dec 6 21:51:18 hqnl0246134 sshd[258071]: pam_imunify(sshd:auth): [IM360_RBL] The IP 85.208.48.167 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 21:51:19,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356279.08721, 'message': 'Dec 6 21:51:18 hqnl0246134 sshd[258071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.208.48.167 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0161 seconds
INFO [2022-12-06 21:51:20,700] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:51:20,701] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:51:20,709] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:51:20,721] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 21:51:21,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356281.0901182, 'message': 'Dec 6 21:51:21 hqnl0246134 sshd[258071]: Failed password for invalid user kiosk from 85.208.48.167 port 46772 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:51:25,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.208.48.167', 'timestamp': 1670356285.1025324, 'message': 'Dec 6 21:51:23 hqnl0246134 sshd[258071]: Disconnected from invalid user kiosk 85.208.48.167 port 46772 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 21:51:40,113] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 21:51:40,115] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 21:51:40,951] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-06 21:51:43,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356303.136374, 'message': 'Dec 6 21:51:41 hqnl0246134 sshd[258092]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 21:51:43,189] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356303.1369612, 'message': 'Dec 6 21:51:41 hqnl0246134 sshd[258092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:51:45,159] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356305.1399527, 'message': 'Dec 6 21:51:43 hqnl0246134 sshd[258092]: Failed password for root from 61.177.173.18 port 64165 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:51:45,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356305.1402102, 'message': 'Dec 6 21:51:43 hqnl0246134 sshd[258092]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:51:47,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356307.144555, 'message': 'Dec 6 21:51:45 hqnl0246134 sshd[258092]: Failed password for root from 61.177.173.18 port 64165 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 21:51:47,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356307.1448178, 'message': 'Dec 6 21:51:46 hqnl0246134 sshd[258092]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 21:51:49,112] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:51:49,113] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:51:49,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356309.1460185, 'message': 'Dec 6 21:51:48 hqnl0246134 sshd[258092]: Failed password for root from 61.177.173.18 port 64165 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 21:51:53,608] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:51:53,609] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:51:53,627] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:51:53,666] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0550 seconds
WARNING [2022-12-06 21:51:54,009] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 21:52:10,478] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:52:10,505] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0377 seconds
INFO [2022-12-06 21:52:18,035] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:52:18,036] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:52:18,044] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:52:18,057] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 21:52:20,754] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:52:20,755] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:52:20,767] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:52:20,787] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0314 seconds
INFO [2022-12-06 21:52:29,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356349.2026067, 'message': 'Dec 6 21:52:28 hqnl0246134 sshd[258163]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 21:52:29,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356349.2029996, 'message': 'Dec 6 21:52:28 hqnl0246134 sshd[258163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 21:52:31,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356351.2043898, 'message': 'Dec 6 21:52:30 hqnl0246134 sshd[258163]: Failed password for root from 61.177.173.18 port 25435 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 21:52:33,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356353.2070465, 'message': 'Dec 6 21:52:32 hqnl0246134 sshd[258163]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 21:52:35,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356355.2098649, 'message': 'Dec 6 21:52:34 hqnl0246134 sshd[258163]: Failed password for root from 61.177.173.18 port 25435 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:52:37,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356357.212684, 'message': 'Dec 6 21:52:37 hqnl0246134 sshd[258163]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:52:39,177] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 21:52:39,243] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 21:52:39,244] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 21:52:39,244] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 21:52:39,245] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 21:52:39,245] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 21:52:39,260] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 21:52:39,276] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0299 seconds
WARNING [2022-12-06 21:52:39,283] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 21:52:39,285] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:52:39,302] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0315 seconds
INFO [2022-12-06 21:52:39,303] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0299 seconds
INFO [2022-12-06 21:52:41,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356361.2175574, 'message': 'Dec 6 21:52:39 hqnl0246134 sshd[258163]: Failed password for root from 61.177.173.18 port 25435 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 21:52:47,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356367.2273521, 'message': 'Dec 6 21:52:45 hqnl0246134 sshd[258169]: Invalid user test from 211.216.105.176 port 43237', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 21:52:47,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356367.2278032, 'message': 'Dec 6 21:52:45 hqnl0246134 sshd[258171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 21:52:47,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356367.227537, 'message': 'Dec 6 21:52:45 hqnl0246134 sshd[258169]: pam_imunify(sshd:auth): [IM360_RBL] The IP 211.216.105.176 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 21:52:47,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356367.2276504, 'message': 'Dec 6 21:52:45 hqnl0246134 sshd[258169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.216.105.176 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-06 21:52:49,116] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:52:49,116] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:52:49,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356369.2324255, 'message': 'Dec 6 21:52:47 hqnl0246134 sshd[258169]: Failed password for invalid user test from 211.216.105.176 port 43237 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 21:52:49,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356369.232727, 'message': 'Dec 6 21:52:47 hqnl0246134 sshd[258171]: Failed password for root from 165.227.166.207 port 51522 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 21:52:49,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356369.2329283, 'message': 'Dec 6 21:52:48 hqnl0246134 sshd[258169]: Disconnected from invalid user test 211.216.105.176 port 43237 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 21:53:09,378] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 21:53:09,379] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 21:53:09,379] im360.plugins.client360: Waiting 4 minutes before retry...
WARNING [2022-12-06 21:53:10,480] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:53:10,503] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0306 seconds
INFO [2022-12-06 21:53:19,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356399.2944565, 'message': 'Dec 6 21:53:18 hqnl0246134 sshd[258197]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 21:53:19,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356399.2948394, 'message': 'Dec 6 21:53:18 hqnl0246134 sshd[258197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:53:20,231] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:53:20,231] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:53:20,238] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:53:20,252] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 21:53:21,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356401.2941847, 'message': 'Dec 6 21:53:21 hqnl0246134 sshd[258197]: Failed password for root from 61.177.173.18 port 60144 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0615 seconds
INFO [2022-12-06 21:53:23,117] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:53:23,118] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:53:23,126] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:53:23,141] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 21:53:23,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356403.2960267, 'message': 'Dec 6 21:53:23 hqnl0246134 sshd[258197]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 21:53:25,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670356405.3044767, 'message': 'Dec 6 21:53:23 hqnl0246134 sshd[258205]: Invalid user test1 from 186.10.125.209 port 32084', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 21:53:25,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.10.125.209', 'timestamp': 1670356405.304864, 'message': 'Dec 6 21:53:23 hqnl0246134 sshd[258205]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.10.125.209 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 21:53:25,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.10.125.209', 'timestamp': 1670356405.305117, 'message': 'Dec 6 21:53:23 hqnl0246134 sshd[258205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:53:27,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356407.3059, 'message': 'Dec 6 21:53:25 hqnl0246134 sshd[258197]: Failed password for root from 61.177.173.18 port 60144 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 21:53:27,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670356407.3061872, 'message': 'Dec 6 21:53:26 hqnl0246134 sshd[258205]: Failed password for invalid user test1 from 186.10.125.209 port 32084 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 21:53:27,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670356407.3063245, 'message': 'Dec 6 21:53:26 hqnl0246134 sshd[258205]: Disconnected from invalid user test1 186.10.125.209 port 32084 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:53:29,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356409.3111439, 'message': 'Dec 6 21:53:27 hqnl0246134 sshd[258197]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:53:29,448] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:53:29,449] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:53:29,456] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:53:29,468] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 21:53:31,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356411.313474, 'message': 'Dec 6 21:53:29 hqnl0246134 sshd[258197]: Failed password for root from 61.177.173.18 port 60144 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 21:53:49,125] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:53:49,126] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:54:09,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356449.368966, 'message': 'Dec 6 21:54:07 hqnl0246134 sshd[258249]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 21:54:09,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356449.369338, 'message': 'Dec 6 21:54:07 hqnl0246134 sshd[258249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
WARNING [2022-12-06 21:54:10,485] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:54:10,506] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0293 seconds
INFO [2022-12-06 21:54:11,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356451.3720496, 'message': 'Dec 6 21:54:10 hqnl0246134 sshd[258249]: Failed password for root from 61.177.173.18 port 20928 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 21:54:13,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356453.377117, 'message': 'Dec 6 21:54:12 hqnl0246134 sshd[258249]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:54:15,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356455.3776536, 'message': 'Dec 6 21:54:14 hqnl0246134 sshd[258249]: Failed password for root from 61.177.173.18 port 20928 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:54:17,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356457.3801124, 'message': 'Dec 6 21:54:16 hqnl0246134 sshd[258249]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 21:54:17,858] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:54:17,859] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:54:17,872] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:54:17,892] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0304 seconds
INFO [2022-12-06 21:54:19,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356459.3874583, 'message': 'Dec 6 21:54:17 hqnl0246134 sshd[258249]: Failed password for root from 61.177.173.18 port 20928 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 21:54:20,437] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:54:20,437] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:54:20,449] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:54:20,461] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0237 seconds
INFO [2022-12-06 21:54:31,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356471.4097595, 'message': 'Dec 6 21:54:30 hqnl0246134 sshd[258294]: pam_imunify(sshd:auth): [IM360_RBL] The IP 211.216.105.176 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 21:54:31,458] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356471.4107006, 'message': 'Dec 6 21:54:30 hqnl0246134 sshd[258294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.216.105.176 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 21:54:33,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '211.216.105.176', 'timestamp': 1670356473.4128125, 'message': 'Dec 6 21:54:32 hqnl0246134 sshd[258294]: Failed password for root from 211.216.105.176 port 55975 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:54:35,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356475.4150512, 'message': 'Dec 6 21:54:34 hqnl0246134 sshd[258297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 21:54:37,444] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356477.41791, 'message': 'Dec 6 21:54:37 hqnl0246134 sshd[258297]: Failed password for root from 165.227.166.207 port 33678 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 21:54:37,615] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:54:37,616] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:54:37,623] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:54:37,635] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 21:54:43,463] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.114.67.95', 'timestamp': 1670356483.426437, 'message': 'Dec 6 21:54:43 hqnl0246134 sshd[258306]: Invalid user gmodserver from 167.114.67.95 port 41904', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 21:54:45,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.114.67.95', 'timestamp': 1670356485.4288735, 'message': 'Dec 6 21:54:43 hqnl0246134 sshd[258306]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.114.67.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:54:45,463] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.114.67.95', 'timestamp': 1670356485.429104, 'message': 'Dec 6 21:54:43 hqnl0246134 sshd[258306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.67.95 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 21:54:47,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.114.67.95', 'timestamp': 1670356487.4311512, 'message': 'Dec 6 21:54:46 hqnl0246134 sshd[258306]: Failed password for invalid user gmodserver from 167.114.67.95 port 41904 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
WARNING [2022-12-06 21:54:49,129] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:54:49,130] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:54:49,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.114.67.95', 'timestamp': 1670356489.4324572, 'message': 'Dec 6 21:54:47 hqnl0246134 sshd[258306]: Disconnected from invalid user gmodserver 167.114.67.95 port 41904 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 21:54:55,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356495.446044, 'message': 'Dec 6 21:54:54 hqnl0246134 sshd[258321]: Invalid user tuxedo from 103.159.223.158 port 56854', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 21:54:55,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356495.4491951, 'message': 'Dec 6 21:54:55 hqnl0246134 sshd[258321]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.159.223.158 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 21:54:55,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356495.4494612, 'message': 'Dec 6 21:54:55 hqnl0246134 sshd[258321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.159.223.158 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 21:54:59,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356499.4510407, 'message': 'Dec 6 21:54:57 hqnl0246134 sshd[258323]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 21:54:59,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356499.4514332, 'message': 'Dec 6 21:54:57 hqnl0246134 sshd[258321]: Failed password for invalid user tuxedo from 103.159.223.158 port 56854 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 21:54:59,504] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356499.4512863, 'message': 'Dec 6 21:54:57 hqnl0246134 sshd[258323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 21:55:01,490] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356501.4560955, 'message': 'Dec 6 21:54:59 hqnl0246134 sshd[258321]: Disconnected from invalid user tuxedo 103.159.223.158 port 56854 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 21:55:01,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356501.4564195, 'message': 'Dec 6 21:54:59 hqnl0246134 sshd[258323]: Failed password for root from 61.177.173.18 port 50693 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 21:55:03,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356503.4580946, 'message': 'Dec 6 21:55:01 hqnl0246134 sshd[258323]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 21:55:05,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356505.4606476, 'message': 'Dec 6 21:55:03 hqnl0246134 sshd[258323]: Failed password for root from 61.177.173.18 port 50693 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:55:05,496] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356505.4608605, 'message': 'Dec 6 21:55:04 hqnl0246134 sshd[258323]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 21:55:07,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356507.4624743, 'message': 'Dec 6 21:55:06 hqnl0246134 sshd[258323]: Failed password for root from 61.177.173.18 port 50693 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 21:55:10,488] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:55:10,550] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0693 seconds
INFO [2022-12-06 21:55:19,219] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:55:19,220] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:55:19,228] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:55:19,238] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-06 21:55:21,804] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:55:21,805] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:55:21,811] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:55:21,822] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0166 seconds
INFO [2022-12-06 21:55:31,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356531.5095177, 'message': 'Dec 6 21:55:29 hqnl0246134 sshd[258368]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 21:55:31,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356531.509976, 'message': 'Dec 6 21:55:29 hqnl0246134 sshd[258368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 21:55:33,530] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356533.5124211, 'message': 'Dec 6 21:55:31 hqnl0246134 sshd[258368]: Failed password for root from 222.168.30.19 port 21993 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:55:35,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356535.5150692, 'message': 'Dec 6 21:55:33 hqnl0246134 sshd[258368]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 21:55:37,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356537.519308, 'message': 'Dec 6 21:55:36 hqnl0246134 sshd[258368]: Failed password for root from 222.168.30.19 port 21993 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 21:55:39,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356539.52158, 'message': 'Dec 6 21:55:38 hqnl0246134 sshd[258368]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:55:41,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356541.5247562, 'message': 'Dec 6 21:55:39 hqnl0246134 sshd[258368]: Failed password for root from 222.168.30.19 port 21993 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0464 seconds
INFO [2022-12-06 21:55:41,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356541.5251064, 'message': 'Dec 6 21:55:39 hqnl0246134 sshd[258382]: pam_imunify(sshd:auth): [IM360_RBL] The IP 129.226.210.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0464 seconds
INFO [2022-12-06 21:55:41,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356541.525466, 'message': 'Dec 6 21:55:40 hqnl0246134 sshd[258368]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0394 seconds
INFO [2022-12-06 21:55:41,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356541.5253136, 'message': 'Dec 6 21:55:39 hqnl0246134 sshd[258382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.210.53 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0393 seconds
INFO [2022-12-06 21:55:43,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356543.5248349, 'message': 'Dec 6 21:55:41 hqnl0246134 sshd[258382]: Failed password for root from 129.226.210.53 port 33326 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 21:55:43,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356543.5251262, 'message': 'Dec 6 21:55:43 hqnl0246134 sshd[258368]: Failed password for root from 222.168.30.19 port 21993 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 21:55:45,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356545.5264375, 'message': 'Dec 6 21:55:43 hqnl0246134 sshd[258385]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 21:55:45,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356545.5269494, 'message': 'Dec 6 21:55:44 hqnl0246134 sshd[258368]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 21:55:45,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356545.5267782, 'message': 'Dec 6 21:55:43 hqnl0246134 sshd[258385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 21:55:46,611] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:55:46,612] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:55:46,622] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:55:46,637] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0241 seconds
INFO [2022-12-06 21:55:47,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356547.533427, 'message': 'Dec 6 21:55:45 hqnl0246134 sshd[258385]: Failed password for root from 61.177.173.18 port 15341 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 21:55:47,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356547.5336056, 'message': 'Dec 6 21:55:47 hqnl0246134 sshd[258368]: Failed password for root from 222.168.30.19 port 21993 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
WARNING [2022-12-06 21:55:49,133] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:55:49,134] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:55:49,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356549.5363023, 'message': 'Dec 6 21:55:47 hqnl0246134 sshd[258385]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0390 seconds
INFO [2022-12-06 21:55:49,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356549.5366306, 'message': 'Dec 6 21:55:49 hqnl0246134 sshd[258368]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 21:55:49,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356549.5368366, 'message': 'Dec 6 21:55:49 hqnl0246134 sshd[258385]: Failed password for root from 61.177.173.18 port 15341 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 21:55:51,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356551.5381277, 'message': 'Dec 6 21:55:50 hqnl0246134 sshd[258385]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0403 seconds
INFO [2022-12-06 21:55:51,580] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356551.5384083, 'message': 'Dec 6 21:55:51 hqnl0246134 sshd[258368]: Failed password for root from 222.168.30.19 port 21993 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0402 seconds
INFO [2022-12-06 21:55:51,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356551.5386314, 'message': 'Dec 6 21:55:51 hqnl0246134 sshd[258385]: Failed password for root from 61.177.173.18 port 15341 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 21:55:53,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5758, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356553.5425386, 'message': 'Dec 6 21:55:53 hqnl0246134 sshd[258368]: error: maximum authentication attempts exceeded for root from 222.168.30.19 port 21993 ssh2 [preauth]', 'severity': 3, 'name': 'Maximum authentication attempts exceeded.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 21:55:59,588] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356559.5587027, 'message': 'Dec 6 21:55:57 hqnl0246134 sshd[258400]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 21:55:59,606] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356559.5592742, 'message': 'Dec 6 21:55:57 hqnl0246134 sshd[258400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:55:59,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356559.5595002, 'message': 'Dec 6 21:55:59 hqnl0246134 sshd[258400]: Failed password for root from 222.168.30.19 port 35246 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:56:01,598] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356561.5617046, 'message': 'Dec 6 21:56:00 hqnl0246134 sshd[258400]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-06 21:56:03,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356563.566459, 'message': 'Dec 6 21:56:02 hqnl0246134 sshd[258400]: Failed password for root from 222.168.30.19 port 35246 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 21:56:03,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356563.5667477, 'message': 'Dec 6 21:56:02 hqnl0246134 sshd[258400]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 21:56:05,588] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356565.5689874, 'message': 'Dec 6 21:56:03 hqnl0246134 sshd[258400]: Failed password for root from 222.168.30.19 port 35246 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:56:05,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356565.569187, 'message': 'Dec 6 21:56:04 hqnl0246134 sshd[258400]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 21:56:07,592] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356567.572027, 'message': 'Dec 6 21:56:07 hqnl0246134 sshd[258400]: Failed password for root from 222.168.30.19 port 35246 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 21:56:09,599] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356569.5819926, 'message': 'Dec 6 21:56:09 hqnl0246134 sshd[258400]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 21:56:10,492] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:56:10,513] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0284 seconds
INFO [2022-12-06 21:56:11,597] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356571.5774748, 'message': 'Dec 6 21:56:10 hqnl0246134 sshd[258400]: Failed password for root from 222.168.30.19 port 35246 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 21:56:13,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356573.5840044, 'message': 'Dec 6 21:56:11 hqnl0246134 sshd[258400]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 21:56:15,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356575.588054, 'message': 'Dec 6 21:56:13 hqnl0246134 sshd[258400]: Failed password for root from 222.168.30.19 port 35246 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:56:17,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5758, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356577.5905497, 'message': 'Dec 6 21:56:15 hqnl0246134 sshd[258400]: error: maximum authentication attempts exceeded for root from 222.168.30.19 port 35246 ssh2 [preauth]', 'severity': 3, 'name': 'Maximum authentication attempts exceeded.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 21:56:17,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356577.5907896, 'message': 'Dec 6 21:56:17 hqnl0246134 sshd[258414]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 21:56:17,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356577.590933, 'message': 'Dec 6 21:56:17 hqnl0246134 sshd[258414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 21:56:17,996] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:56:17,997] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:56:18,007] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:56:18,019] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 21:56:19,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356579.592392, 'message': 'Dec 6 21:56:18 hqnl0246134 sshd[258421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0883 seconds
INFO [2022-12-06 21:56:19,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356579.5925896, 'message': 'Dec 6 21:56:18 hqnl0246134 sshd[258423]: Invalid user hassan from 143.198.43.241 port 46786', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0935 seconds
INFO [2022-12-06 21:56:19,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356579.592702, 'message': 'Dec 6 21:56:18 hqnl0246134 sshd[258423]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.43.241 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0666 seconds
INFO [2022-12-06 21:56:19,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356579.5928051, 'message': 'Dec 6 21:56:18 hqnl0246134 sshd[258423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.43.241 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0676 seconds
INFO [2022-12-06 21:56:21,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356581.5943813, 'message': 'Dec 6 21:56:19 hqnl0246134 sshd[258414]: Failed password for root from 222.168.30.19 port 44476 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0460 seconds
INFO [2022-12-06 21:56:21,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356581.59456, 'message': 'Dec 6 21:56:20 hqnl0246134 sshd[258421]: Failed password for root from 165.227.166.207 port 43884 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0463 seconds
INFO [2022-12-06 21:56:21,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356581.594713, 'message': 'Dec 6 21:56:20 hqnl0246134 sshd[258423]: Failed password for invalid user hassan from 143.198.43.241 port 46786 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0459 seconds
INFO [2022-12-06 21:56:23,338] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:56:23,339] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:56:23,442] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:56:23,457] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1180 seconds
INFO [2022-12-06 21:56:23,786] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356583.5981345, 'message': 'Dec 6 21:56:21 hqnl0246134 sshd[258414]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1872 seconds
INFO [2022-12-06 21:56:23,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356583.598433, 'message': 'Dec 6 21:56:22 hqnl0246134 sshd[258423]: Disconnected from invalid user hassan 143.198.43.241 port 46786 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1881 seconds
INFO [2022-12-06 21:56:23,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356583.5986068, 'message': 'Dec 6 21:56:23 hqnl0246134 sshd[258414]: Failed password for root from 222.168.30.19 port 44476 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 21:56:25,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356585.6010716, 'message': 'Dec 6 21:56:24 hqnl0246134 sshd[258414]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 21:56:27,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356587.6019251, 'message': 'Dec 6 21:56:26 hqnl0246134 sshd[258414]: Failed password for root from 222.168.30.19 port 44476 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 21:56:29,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356589.6038108, 'message': 'Dec 6 21:56:27 hqnl0246134 sshd[258463]: Invalid user admin from 222.168.30.19 port 48726', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 21:56:29,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356589.6043386, 'message': 'Dec 6 21:56:28 hqnl0246134 sshd[258466]: Invalid user manager1 from 143.110.241.56 port 40528', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 21:56:29,664] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356589.6040702, 'message': 'Dec 6 21:56:27 hqnl0246134 sshd[258463]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 21:56:29,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356589.6044397, 'message': 'Dec 6 21:56:28 hqnl0246134 sshd[258466]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.110.241.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 21:56:29,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356589.604211, 'message': 'Dec 6 21:56:27 hqnl0246134 sshd[258463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 21:56:29,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356589.604539, 'message': 'Dec 6 21:56:28 hqnl0246134 sshd[258466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.241.56 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 21:56:31,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356591.6073363, 'message': 'Dec 6 21:56:30 hqnl0246134 sshd[258463]: Failed password for invalid user admin from 222.168.30.19 port 48726 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 21:56:31,637] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356591.607512, 'message': 'Dec 6 21:56:30 hqnl0246134 sshd[258466]: Failed password for invalid user manager1 from 143.110.241.56 port 40528 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 21:56:31,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356591.6076229, 'message': 'Dec 6 21:56:31 hqnl0246134 sshd[258466]: Disconnected from invalid user manager1 143.110.241.56 port 40528 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:56:33,629] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356593.6125844, 'message': 'Dec 6 21:56:31 hqnl0246134 sshd[258463]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 21:56:35,632] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356595.6137846, 'message': 'Dec 6 21:56:34 hqnl0246134 sshd[258463]: Failed password for invalid user admin from 222.168.30.19 port 48726 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 21:56:37,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356597.6160543, 'message': 'Dec 6 21:56:35 hqnl0246134 sshd[258463]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:56:39,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356599.6645367, 'message': 'Dec 6 21:56:37 hqnl0246134 sshd[258463]: Failed password for invalid user admin from 222.168.30.19 port 48726 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:56:39,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356599.6647794, 'message': 'Dec 6 21:56:38 hqnl0246134 sshd[258463]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 21:56:41,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356601.6213312, 'message': 'Dec 6 21:56:39 hqnl0246134 sshd[258463]: Failed password for invalid user admin from 222.168.30.19 port 48726 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-06 21:56:41,672] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356601.6216497, 'message': 'Dec 6 21:56:41 hqnl0246134 sshd[258471]: Invalid user test from 147.182.230.251 port 36584', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0496 seconds
INFO [2022-12-06 21:56:41,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356601.6215365, 'message': 'Dec 6 21:56:40 hqnl0246134 sshd[258463]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 21:56:41,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356601.6217673, 'message': 'Dec 6 21:56:41 hqnl0246134 sshd[258471]: pam_imunify(sshd:auth): [IM360_RBL] The IP 147.182.230.251 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 21:56:41,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356601.6218827, 'message': 'Dec 6 21:56:41 hqnl0246134 sshd[258471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.230.251 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 21:56:43,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356603.621896, 'message': 'Dec 6 21:56:41 hqnl0246134 sshd[258463]: Failed password for invalid user admin from 222.168.30.19 port 48726 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:56:43,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356603.6221263, 'message': 'Dec 6 21:56:42 hqnl0246134 sshd[258463]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:56:45,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356605.6258192, 'message': 'Dec 6 21:56:43 hqnl0246134 sshd[258471]: Failed password for invalid user test from 147.182.230.251 port 36584 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0590 seconds
INFO [2022-12-06 21:56:45,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356605.6262617, 'message': 'Dec 6 21:56:43 hqnl0246134 sshd[258463]: Failed password for invalid user admin from 222.168.30.19 port 48726 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0601 seconds
INFO [2022-12-06 21:56:45,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356605.6260812, 'message': 'Dec 6 21:56:43 hqnl0246134 sshd[258471]: Disconnected from invalid user test 147.182.230.251 port 36584 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0444 seconds
INFO [2022-12-06 21:56:45,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356605.6268618, 'message': 'Dec 6 21:56:44 hqnl0246134 sshd[258475]: Invalid user roots from 110.49.17.96 port 38938', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0441 seconds
INFO [2022-12-06 21:56:45,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356605.6264942, 'message': 'Dec 6 21:56:44 hqnl0246134 sshd[258463]: error: maximum authentication attempts exceeded for invalid user admin from 222.168.30.19 port 48726 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0435 seconds
INFO [2022-12-06 21:56:45,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356605.6270561, 'message': 'Dec 6 21:56:44 hqnl0246134 sshd[258475]: pam_imunify(sshd:auth): [IM360_RBL] The IP 110.49.17.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0394 seconds
INFO [2022-12-06 21:56:45,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356605.6266775, 'message': 'Dec 6 21:56:44 hqnl0246134 sshd[258463]: Disconnecting invalid user admin 222.168.30.19 port 48726: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0403 seconds
INFO [2022-12-06 21:56:45,802] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356605.6272352, 'message': 'Dec 6 21:56:44 hqnl0246134 sshd[258475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.17.96 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 21:56:47,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356607.6283522, 'message': 'Dec 6 21:56:45 hqnl0246134 sshd[258475]: Failed password for invalid user roots from 110.49.17.96 port 38938 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 21:56:47,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356607.628605, 'message': 'Dec 6 21:56:46 hqnl0246134 sshd[258477]: Invalid user admin from 222.168.30.19 port 55556', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 21:56:47,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356607.62906, 'message': 'Dec 6 21:56:47 hqnl0246134 sshd[258475]: Disconnected from invalid user roots 110.49.17.96 port 38938 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 21:56:47,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356607.628769, 'message': 'Dec 6 21:56:46 hqnl0246134 sshd[258477]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 21:56:47,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356607.6289098, 'message': 'Dec 6 21:56:46 hqnl0246134 sshd[258477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 21:56:49,135] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:56:49,136] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:56:49,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356609.6293557, 'message': 'Dec 6 21:56:47 hqnl0246134 sshd[258477]: Failed password for invalid user admin from 222.168.30.19 port 55556 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:56:51,653] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356611.6337912, 'message': 'Dec 6 21:56:50 hqnl0246134 sshd[258477]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 21:56:53,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356613.6370826, 'message': 'Dec 6 21:56:52 hqnl0246134 sshd[258477]: Failed password for invalid user admin from 222.168.30.19 port 55556 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:56:55,677] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356615.6411502, 'message': 'Dec 6 21:56:54 hqnl0246134 sshd[258481]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.100.208.189 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 21:56:55,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356615.6417065, 'message': 'Dec 6 21:56:54 hqnl0246134 sshd[258477]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 21:56:55,698] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356615.6414735, 'message': 'Dec 6 21:56:54 hqnl0246134 sshd[258481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.208.189 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 21:56:57,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356617.642086, 'message': 'Dec 6 21:56:56 hqnl0246134 sshd[258481]: Failed password for root from 103.100.208.189 port 40486 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0466 seconds
INFO [2022-12-06 21:56:57,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356617.642294, 'message': 'Dec 6 21:56:56 hqnl0246134 sshd[258477]: Failed password for invalid user admin from 222.168.30.19 port 55556 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0469 seconds
INFO [2022-12-06 21:56:59,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356619.6445816, 'message': 'Dec 6 21:56:58 hqnl0246134 sshd[258477]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0604 seconds
INFO [2022-12-06 21:57:01,328] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:57:01,328] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:57:01,339] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:57:01,356] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0272 seconds
INFO [2022-12-06 21:57:01,664] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356621.6458344, 'message': 'Dec 6 21:57:00 hqnl0246134 sshd[258477]: Failed password for invalid user admin from 222.168.30.19 port 55556 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:57:03,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356623.6489925, 'message': 'Dec 6 21:57:02 hqnl0246134 sshd[258477]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 21:57:05,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356625.649652, 'message': 'Dec 6 21:57:04 hqnl0246134 sshd[258477]: Failed password for invalid user admin from 222.168.30.19 port 55556 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:57:05,688] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356625.649864, 'message': 'Dec 6 21:57:04 hqnl0246134 sshd[258477]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:57:07,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356627.6535637, 'message': 'Dec 6 21:57:06 hqnl0246134 sshd[258477]: Failed password for invalid user admin from 222.168.30.19 port 55556 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 21:57:09,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356629.7509873, 'message': 'Dec 6 21:57:08 hqnl0246134 sshd[258477]: error: maximum authentication attempts exceeded for invalid user admin from 222.168.30.19 port 55556 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 21:57:09,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356629.7511547, 'message': 'Dec 6 21:57:08 hqnl0246134 sshd[258477]: Disconnecting invalid user admin 222.168.30.19 port 55556: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 21:57:10,496] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:57:10,531] defence360agent.internals.the_sink: SensorIncidentList(<23 item(s)>) processed in 0.0430 seconds
INFO [2022-12-06 21:57:11,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356631.6605918, 'message': 'Dec 6 21:57:10 hqnl0246134 sshd[258517]: Invalid user admin from 222.168.30.19 port 64151', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 21:57:11,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356631.6608503, 'message': 'Dec 6 21:57:10 hqnl0246134 sshd[258517]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 21:57:11,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356631.660991, 'message': 'Dec 6 21:57:10 hqnl0246134 sshd[258517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 21:57:13,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356633.6627927, 'message': 'Dec 6 21:57:12 hqnl0246134 sshd[258517]: Failed password for invalid user admin from 222.168.30.19 port 64151 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:57:15,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356635.665964, 'message': 'Dec 6 21:57:14 hqnl0246134 sshd[258517]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:57:17,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356637.6687636, 'message': 'Dec 6 21:57:16 hqnl0246134 sshd[258517]: Failed password for invalid user admin from 222.168.30.19 port 64151 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:57:17,783] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:57:17,784] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:57:17,791] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:57:17,803] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 21:57:18,120] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 21:57:18,184] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 21:57:18,185] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 21:57:18,185] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 21:57:18,185] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 21:57:18,186] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 21:57:18,197] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 21:57:18,214] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0274 seconds
WARNING [2022-12-06 21:57:18,220] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 21:57:18,223] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:57:18,241] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0329 seconds
INFO [2022-12-06 21:57:18,242] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0311 seconds
INFO [2022-12-06 21:57:19,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356639.6702855, 'message': 'Dec 6 21:57:18 hqnl0246134 sshd[258517]: Disconnected from invalid user admin 222.168.30.19 port 64151 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 21:57:20,351] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:57:20,351] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:57:20,359] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:57:20,371] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 21:57:21,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356641.6727285, 'message': 'Dec 6 21:57:19 hqnl0246134 sshd[258529]: Invalid user oracle from 222.168.30.19 port 2896', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 21:57:21,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356641.6729922, 'message': 'Dec 6 21:57:19 hqnl0246134 sshd[258529]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:57:21,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356641.6731055, 'message': 'Dec 6 21:57:19 hqnl0246134 sshd[258529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 21:57:21,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356641.6732213, 'message': 'Dec 6 21:57:21 hqnl0246134 sshd[258529]: Failed password for invalid user oracle from 222.168.30.19 port 2896 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:57:23,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356643.6741352, 'message': 'Dec 6 21:57:21 hqnl0246134 sshd[258529]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 21:57:25,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356645.6743283, 'message': 'Dec 6 21:57:23 hqnl0246134 sshd[258534]: Invalid user roots from 181.204.164.18 port 50194', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 21:57:25,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356645.6755655, 'message': 'Dec 6 21:57:24 hqnl0246134 sshd[258529]: Failed password for invalid user oracle from 222.168.30.19 port 2896 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 21:57:25,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356645.675304, 'message': 'Dec 6 21:57:23 hqnl0246134 sshd[258534]: pam_imunify(sshd:auth): [IM360_RBL] The IP 181.204.164.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 21:57:25,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356645.6754386, 'message': 'Dec 6 21:57:23 hqnl0246134 sshd[258534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.204.164.18 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:57:25,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356645.675697, 'message': 'Dec 6 21:57:25 hqnl0246134 sshd[258534]: Failed password for invalid user roots from 181.204.164.18 port 50194 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:57:27,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356647.6780465, 'message': 'Dec 6 21:57:25 hqnl0246134 sshd[258529]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 21:57:27,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356647.678304, 'message': 'Dec 6 21:57:26 hqnl0246134 sshd[258534]: Disconnected from invalid user roots 181.204.164.18 port 50194 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 21:57:29,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356649.6806734, 'message': 'Dec 6 21:57:27 hqnl0246134 sshd[258529]: Failed password for invalid user oracle from 222.168.30.19 port 2896 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:57:29,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356649.6809576, 'message': 'Dec 6 21:57:29 hqnl0246134 sshd[258529]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 21:57:31,698] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356651.6814592, 'message': 'Dec 6 21:57:31 hqnl0246134 sshd[258529]: Failed password for invalid user oracle from 222.168.30.19 port 2896 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:57:31,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356651.6816401, 'message': 'Dec 6 21:57:31 hqnl0246134 sshd[258529]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 21:57:33,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356653.6845675, 'message': 'Dec 6 21:57:33 hqnl0246134 sshd[258529]: Failed password for invalid user oracle from 222.168.30.19 port 2896 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 21:57:35,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356655.6884043, 'message': 'Dec 6 21:57:33 hqnl0246134 sshd[258529]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:57:37,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356657.6902583, 'message': 'Dec 6 21:57:35 hqnl0246134 sshd[258529]: Failed password for invalid user oracle from 222.168.30.19 port 2896 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 21:57:37,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356657.6905541, 'message': 'Dec 6 21:57:37 hqnl0246134 sshd[258529]: error: maximum authentication attempts exceeded for invalid user oracle from 222.168.30.19 port 2896 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 21:57:37,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356657.6907206, 'message': 'Dec 6 21:57:37 hqnl0246134 sshd[258529]: Disconnecting invalid user oracle 222.168.30.19 port 2896: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:57:39,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356659.6926954, 'message': 'Dec 6 21:57:38 hqnl0246134 sshd[258547]: Invalid user oracle from 222.168.30.19 port 9236', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:57:39,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356659.6929765, 'message': 'Dec 6 21:57:38 hqnl0246134 sshd[258547]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1443 seconds
INFO [2022-12-06 21:57:39,876] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356659.6931157, 'message': 'Dec 6 21:57:38 hqnl0246134 sshd[258547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 21:57:41,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356661.694255, 'message': 'Dec 6 21:57:40 hqnl0246134 sshd[258547]: Failed password for invalid user oracle from 222.168.30.19 port 9236 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 21:57:41,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356661.6945276, 'message': 'Dec 6 21:57:40 hqnl0246134 sshd[258547]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:57:43,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356663.696452, 'message': 'Dec 6 21:57:43 hqnl0246134 sshd[258547]: Failed password for invalid user oracle from 222.168.30.19 port 9236 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:57:45,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356665.699046, 'message': 'Dec 6 21:57:44 hqnl0246134 sshd[258547]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 21:57:47,735] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356667.7018542, 'message': 'Dec 6 21:57:46 hqnl0246134 sshd[258550]: Invalid user psql from 139.59.112.202 port 37976', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 21:57:47,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356667.7023695, 'message': 'Dec 6 21:57:46 hqnl0246134 sshd[258547]: Failed password for invalid user oracle from 222.168.30.19 port 9236 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 21:57:47,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356667.7020457, 'message': 'Dec 6 21:57:46 hqnl0246134 sshd[258550]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.112.202 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 21:57:47,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356667.702204, 'message': 'Dec 6 21:57:46 hqnl0246134 sshd[258550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.112.202 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 21:57:49,057] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 21:57:49,057] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 21:57:49,058] im360.plugins.client360: Waiting 4 minutes before retry...
WARNING [2022-12-06 21:57:49,139] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:57:49,140] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:57:49,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356669.7040482, 'message': 'Dec 6 21:57:48 hqnl0246134 sshd[258547]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 21:57:49,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356669.70426, 'message': 'Dec 6 21:57:48 hqnl0246134 sshd[258550]: Failed password for invalid user psql from 139.59.112.202 port 37976 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 21:57:51,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356671.7069929, 'message': 'Dec 6 21:57:49 hqnl0246134 sshd[258550]: Disconnected from invalid user psql 139.59.112.202 port 37976 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 21:57:51,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356671.7072532, 'message': 'Dec 6 21:57:50 hqnl0246134 sshd[258547]: Failed password for invalid user oracle from 222.168.30.19 port 9236 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 21:57:53,785] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356673.7199037, 'message': 'Dec 6 21:57:52 hqnl0246134 sshd[258547]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0651 seconds
INFO [2022-12-06 21:57:55,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356675.7105231, 'message': 'Dec 6 21:57:54 hqnl0246134 sshd[258547]: Failed password for invalid user oracle from 222.168.30.19 port 9236 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 21:57:57,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356677.7130802, 'message': 'Dec 6 21:57:56 hqnl0246134 sshd[258547]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 21:57:57,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356677.7133052, 'message': 'Dec 6 21:57:57 hqnl0246134 sshd[258561]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 21:57:57,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356677.7134593, 'message': 'Dec 6 21:57:57 hqnl0246134 sshd[258561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 21:57:59,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356679.7149055, 'message': 'Dec 6 21:57:57 hqnl0246134 sshd[258547]: Failed password for invalid user oracle from 222.168.30.19 port 9236 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 21:57:59,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356679.7150853, 'message': 'Dec 6 21:57:59 hqnl0246134 sshd[258561]: Failed password for root from 61.177.173.18 port 57112 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 21:57:59,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356679.715347, 'message': 'Dec 6 21:57:59 hqnl0246134 sshd[258547]: error: maximum authentication attempts exceeded for invalid user oracle from 222.168.30.19 port 9236 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 21:57:59,777] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356679.7151992, 'message': 'Dec 6 21:57:59 hqnl0246134 sshd[258561]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 21:57:59,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356679.715482, 'message': 'Dec 6 21:57:59 hqnl0246134 sshd[258547]: Disconnecting invalid user oracle 222.168.30.19 port 9236: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 21:58:01,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356681.717627, 'message': 'Dec 6 21:58:01 hqnl0246134 sshd[258561]: Failed password for root from 61.177.173.18 port 57112 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 21:58:01,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356681.717996, 'message': 'Dec 6 21:58:01 hqnl0246134 sshd[258566]: Invalid user oracle from 222.168.30.19 port 16266', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 21:58:01,785] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356681.717843, 'message': 'Dec 6 21:58:01 hqnl0246134 sshd[258561]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 21:58:01,786] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356681.7181034, 'message': 'Dec 6 21:58:01 hqnl0246134 sshd[258566]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 21:58:01,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356681.718208, 'message': 'Dec 6 21:58:01 hqnl0246134 sshd[258566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 21:58:03,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356683.718106, 'message': 'Dec 6 21:58:03 hqnl0246134 sshd[258561]: Failed password for root from 61.177.173.18 port 57112 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0434 seconds
INFO [2022-12-06 21:58:03,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356683.71833, 'message': 'Dec 6 21:58:03 hqnl0246134 sshd[258566]: Failed password for invalid user oracle from 222.168.30.19 port 16266 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0439 seconds
INFO [2022-12-06 21:58:03,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356683.7184772, 'message': 'Dec 6 21:58:03 hqnl0246134 sshd[258566]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 21:58:05,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356685.7205927, 'message': 'Dec 6 21:58:03 hqnl0246134 sshd[258580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 21:58:07,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356687.7230392, 'message': 'Dec 6 21:58:05 hqnl0246134 sshd[258566]: Failed password for invalid user oracle from 222.168.30.19 port 16266 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 21:58:07,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356687.72324, 'message': 'Dec 6 21:58:06 hqnl0246134 sshd[258580]: Failed password for root from 165.227.166.207 port 54154 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 21:58:07,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356687.7233517, 'message': 'Dec 6 21:58:07 hqnl0246134 sshd[258566]: Disconnected from invalid user oracle 222.168.30.19 port 16266 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:58:09,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356689.7259667, 'message': 'Dec 6 21:58:08 hqnl0246134 sshd[258583]: Invalid user usuario from 222.168.30.19 port 18676', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 21:58:09,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356689.7261724, 'message': 'Dec 6 21:58:08 hqnl0246134 sshd[258583]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:58:09,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356689.7262838, 'message': 'Dec 6 21:58:08 hqnl0246134 sshd[258583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 21:58:10,501] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:58:10,529] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0347 seconds
INFO [2022-12-06 21:58:11,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356691.7280307, 'message': 'Dec 6 21:58:11 hqnl0246134 sshd[258583]: Failed password for invalid user usuario from 222.168.30.19 port 18676 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 21:58:13,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356693.731183, 'message': 'Dec 6 21:58:11 hqnl0246134 sshd[258585]: Invalid user roots from 103.159.223.158 port 49486', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 21:58:13,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356693.732982, 'message': 'Dec 6 21:58:13 hqnl0246134 sshd[258583]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 21:58:13,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356693.732746, 'message': 'Dec 6 21:58:11 hqnl0246134 sshd[258585]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.159.223.158 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 21:58:13,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356693.7328727, 'message': 'Dec 6 21:58:11 hqnl0246134 sshd[258585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.159.223.158 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:58:15,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356695.7338424, 'message': 'Dec 6 21:58:13 hqnl0246134 sshd[258585]: Failed password for invalid user roots from 103.159.223.158 port 49486 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 21:58:15,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356695.734048, 'message': 'Dec 6 21:58:14 hqnl0246134 sshd[258583]: Failed password for invalid user usuario from 222.168.30.19 port 18676 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 21:58:15,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356695.734161, 'message': 'Dec 6 21:58:14 hqnl0246134 sshd[258585]: Disconnected from invalid user roots 103.159.223.158 port 49486 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 21:58:15,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356695.7342696, 'message': 'Dec 6 21:58:15 hqnl0246134 sshd[258583]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 21:58:17,583] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:58:17,583] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:58:17,591] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:58:17,609] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0245 seconds
INFO [2022-12-06 21:58:17,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356697.7361736, 'message': 'Dec 6 21:58:17 hqnl0246134 sshd[258583]: Failed password for invalid user usuario from 222.168.30.19 port 18676 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:58:17,921] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:58:17,922] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:58:17,929] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:58:17,941] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 21:58:19,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356699.7390742, 'message': 'Dec 6 21:58:19 hqnl0246134 sshd[258583]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 21:58:20,633] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:58:20,634] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:58:20,641] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:58:20,654] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 21:58:21,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356701.7424986, 'message': 'Dec 6 21:58:21 hqnl0246134 sshd[258583]: Failed password for invalid user usuario from 222.168.30.19 port 18676 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 21:58:23,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356703.744736, 'message': 'Dec 6 21:58:23 hqnl0246134 sshd[258583]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 21:58:25,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356705.7461648, 'message': 'Dec 6 21:58:25 hqnl0246134 sshd[258583]: Failed password for invalid user usuario from 222.168.30.19 port 18676 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 21:58:25,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356705.7465003, 'message': 'Dec 6 21:58:25 hqnl0246134 sshd[258583]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 21:58:29,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356709.7518008, 'message': 'Dec 6 21:58:27 hqnl0246134 sshd[258583]: Failed password for invalid user usuario from 222.168.30.19 port 18676 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 21:58:29,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356709.752081, 'message': 'Dec 6 21:58:29 hqnl0246134 sshd[258583]: error: maximum authentication attempts exceeded for invalid user usuario from 222.168.30.19 port 18676 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 21:58:29,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356709.7522347, 'message': 'Dec 6 21:58:29 hqnl0246134 sshd[258583]: Disconnecting invalid user usuario 222.168.30.19 port 18676: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 21:58:31,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356711.7539577, 'message': 'Dec 6 21:58:31 hqnl0246134 sshd[258612]: Invalid user usuario from 222.168.30.19 port 26053', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 21:58:31,793] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356711.7542071, 'message': 'Dec 6 21:58:31 hqnl0246134 sshd[258612]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:58:31,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356711.754353, 'message': 'Dec 6 21:58:31 hqnl0246134 sshd[258612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:58:33,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356713.7564125, 'message': 'Dec 6 21:58:33 hqnl0246134 sshd[258612]: Failed password for invalid user usuario from 222.168.30.19 port 26053 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:58:35,778] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356715.757769, 'message': 'Dec 6 21:58:35 hqnl0246134 sshd[258612]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 21:58:37,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356717.7609882, 'message': 'Dec 6 21:58:37 hqnl0246134 sshd[258612]: Failed password for invalid user usuario from 222.168.30.19 port 26053 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 21:58:39,786] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356719.7646701, 'message': 'Dec 6 21:58:37 hqnl0246134 sshd[258612]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 21:58:41,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356721.765886, 'message': 'Dec 6 21:58:39 hqnl0246134 sshd[258612]: Failed password for invalid user usuario from 222.168.30.19 port 26053 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 21:58:43,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356723.7684317, 'message': 'Dec 6 21:58:41 hqnl0246134 sshd[258612]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 21:58:43,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356723.768702, 'message': 'Dec 6 21:58:43 hqnl0246134 sshd[258616]: Invalid user user from 129.226.210.53 port 60040', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 21:58:43,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356723.7688215, 'message': 'Dec 6 21:58:43 hqnl0246134 sshd[258616]: pam_imunify(sshd:auth): [IM360_RBL] The IP 129.226.210.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 21:58:43,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356723.76903, 'message': 'Dec 6 21:58:43 hqnl0246134 sshd[258616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.210.53 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:58:45,854] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356725.7698762, 'message': 'Dec 6 21:58:44 hqnl0246134 sshd[258612]: Failed password for invalid user usuario from 222.168.30.19 port 26053 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0840 seconds
INFO [2022-12-06 21:58:45,855] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356725.770147, 'message': 'Dec 6 21:58:45 hqnl0246134 sshd[258616]: Failed password for invalid user user from 129.226.210.53 port 60040 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0844 seconds
INFO [2022-12-06 21:58:47,802] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356727.7744174, 'message': 'Dec 6 21:58:46 hqnl0246134 sshd[258612]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 21:58:47,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356727.7746484, 'message': 'Dec 6 21:58:47 hqnl0246134 sshd[258616]: Disconnected from invalid user user 129.226.210.53 port 60040 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0278 seconds
WARNING [2022-12-06 21:58:49,145] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:58:49,146] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:58:49,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356729.7775002, 'message': 'Dec 6 21:58:48 hqnl0246134 sshd[258612]: Failed password for invalid user usuario from 222.168.30.19 port 26053 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 21:58:51,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356731.7780511, 'message': 'Dec 6 21:58:50 hqnl0246134 sshd[258612]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 21:58:51,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356731.778292, 'message': 'Dec 6 21:58:50 hqnl0246134 sshd[258624]: Invalid user supperinspur from 143.198.43.241 port 33908', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 21:58:51,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356731.778414, 'message': 'Dec 6 21:58:50 hqnl0246134 sshd[258624]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.43.241 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:58:51,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356731.7785168, 'message': 'Dec 6 21:58:50 hqnl0246134 sshd[258624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.43.241 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 21:58:53,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356733.7808113, 'message': 'Dec 6 21:58:52 hqnl0246134 sshd[258612]: Failed password for invalid user usuario from 222.168.30.19 port 26053 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 21:58:53,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356733.7810528, 'message': 'Dec 6 21:58:52 hqnl0246134 sshd[258624]: Failed password for invalid user supperinspur from 143.198.43.241 port 33908 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 21:58:55,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356735.787329, 'message': 'Dec 6 21:58:53 hqnl0246134 sshd[258624]: Disconnected from invalid user supperinspur 143.198.43.241 port 33908 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 21:58:55,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356735.7877238, 'message': 'Dec 6 21:58:54 hqnl0246134 sshd[258612]: error: maximum authentication attempts exceeded for invalid user usuario from 222.168.30.19 port 26053 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 21:58:55,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356735.7879362, 'message': 'Dec 6 21:58:54 hqnl0246134 sshd[258612]: Disconnecting invalid user usuario 222.168.30.19 port 26053: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 21:58:55,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356735.7880847, 'message': 'Dec 6 21:58:55 hqnl0246134 sshd[258635]: Invalid user usuario from 222.168.30.19 port 34067', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 21:58:57,825] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356737.805091, 'message': 'Dec 6 21:58:55 hqnl0246134 sshd[258635]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 21:58:57,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356737.8054144, 'message': 'Dec 6 21:58:55 hqnl0246134 sshd[258635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 21:58:59,833] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356739.8134477, 'message': 'Dec 6 21:58:58 hqnl0246134 sshd[258635]: Failed password for invalid user usuario from 222.168.30.19 port 34067 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 21:59:01,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356741.8215592, 'message': 'Dec 6 21:58:59 hqnl0246134 sshd[258635]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 21:59:01,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356741.8217824, 'message': 'Dec 6 21:59:01 hqnl0246134 sshd[258635]: Failed password for invalid user usuario from 222.168.30.19 port 34067 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 21:59:03,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356743.841473, 'message': 'Dec 6 21:59:02 hqnl0246134 sshd[258635]: Disconnected from invalid user usuario 222.168.30.19 port 34067 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 21:59:03,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356743.8417954, 'message': 'Dec 6 21:59:03 hqnl0246134 sshd[258645]: Invalid user test from 222.168.30.19 port 36555', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:59:03,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356743.8420098, 'message': 'Dec 6 21:59:03 hqnl0246134 sshd[258645]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:59:03,922] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356743.8421896, 'message': 'Dec 6 21:59:03 hqnl0246134 sshd[258645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 21:59:05,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356745.8496904, 'message': 'Dec 6 21:59:05 hqnl0246134 sshd[258645]: Failed password for invalid user test from 222.168.30.19 port 36555 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:59:07,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356747.8610115, 'message': 'Dec 6 21:59:06 hqnl0246134 sshd[258645]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 21:59:08,087] defence360agent.files: Updating all files
INFO [2022-12-06 21:59:08,365] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 21:59:08,365] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 21:59:08,713] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 21:59:08,713] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 21:59:08,975] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 21:59:08,975] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 21:59:09,266] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 21:59:09,266] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 21:59:09,267] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 21:59:09,576] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 19:59:09 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4C9D20CF2EFD'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 21:59:09,579] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 21:59:09,580] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 21:59:09,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356749.880047, 'message': 'Dec 6 21:59:07 hqnl0246134 sshd[258645]: Failed password for invalid user test from 222.168.30.19 port 36555 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 21:59:09,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356749.8802624, 'message': 'Dec 6 21:59:08 hqnl0246134 sshd[258645]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 21:59:10,178] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 21:59:10,179] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 21:59:10,491] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 21:59:10,491] defence360agent.files: ip-record files update finished (not updated)
WARNING [2022-12-06 21:59:10,509] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:59:10,534] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0350 seconds
INFO [2022-12-06 21:59:10,829] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 21:59:10,829] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 21:59:11,228] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 21:59:11,228] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 21:59:11,699] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 21:59:11,700] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 21:59:11,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356751.8828027, 'message': 'Dec 6 21:59:10 hqnl0246134 sshd[258645]: Failed password for invalid user test from 222.168.30.19 port 36555 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 21:59:11,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356751.8830042, 'message': 'Dec 6 21:59:11 hqnl0246134 sshd[258645]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 21:59:13,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356753.8850796, 'message': 'Dec 6 21:59:12 hqnl0246134 sshd[258645]: Failed password for invalid user test from 222.168.30.19 port 36555 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 21:59:13,922] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356753.885279, 'message': 'Dec 6 21:59:13 hqnl0246134 sshd[258645]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 21:59:15,927] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356755.8955812, 'message': 'Dec 6 21:59:15 hqnl0246134 sshd[258645]: Failed password for invalid user test from 222.168.30.19 port 36555 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 21:59:17,814] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:59:17,814] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:59:17,822] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:59:17,841] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0256 seconds
INFO [2022-12-06 21:59:17,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356757.9016435, 'message': 'Dec 6 21:59:16 hqnl0246134 sshd[258645]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 21:59:19,924] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356759.9071443, 'message': 'Dec 6 21:59:18 hqnl0246134 sshd[258645]: Failed password for invalid user test from 222.168.30.19 port 36555 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 21:59:20,464] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:59:20,464] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:59:20,471] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:59:20,482] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 21:59:21,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356761.9100797, 'message': 'Dec 6 21:59:20 hqnl0246134 sshd[258645]: error: maximum authentication attempts exceeded for invalid user test from 222.168.30.19 port 36555 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 21:59:21,949] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356761.9102566, 'message': 'Dec 6 21:59:20 hqnl0246134 sshd[258645]: Disconnecting invalid user test 222.168.30.19 port 36555: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 21:59:23,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356763.9235, 'message': 'Dec 6 21:59:22 hqnl0246134 sshd[258658]: Invalid user test from 222.168.30.19 port 42098', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 21:59:23,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356763.9241998, 'message': 'Dec 6 21:59:22 hqnl0246134 sshd[258658]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 21:59:24,083] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356763.9245296, 'message': 'Dec 6 21:59:22 hqnl0246134 sshd[258658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1131 seconds
INFO [2022-12-06 21:59:25,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356765.9279814, 'message': 'Dec 6 21:59:24 hqnl0246134 sshd[258658]: Failed password for invalid user test from 222.168.30.19 port 42098 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0554 seconds
INFO [2022-12-06 21:59:25,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356765.928718, 'message': 'Dec 6 21:59:25 hqnl0246134 sshd[258668]: pam_imunify(sshd:auth): [IM360_RBL] The IP 147.182.230.251 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0557 seconds
INFO [2022-12-06 21:59:26,018] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356765.928488, 'message': 'Dec 6 21:59:25 hqnl0246134 sshd[258658]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 21:59:26,018] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356765.928958, 'message': 'Dec 6 21:59:25 hqnl0246134 sshd[258668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.230.251 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 21:59:27,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356767.9310215, 'message': 'Dec 6 21:59:27 hqnl0246134 sshd[258658]: Failed password for invalid user test from 222.168.30.19 port 42098 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 21:59:27,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356767.9312396, 'message': 'Dec 6 21:59:27 hqnl0246134 sshd[258668]: Failed password for root from 147.182.230.251 port 35880 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 21:59:27,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356767.9313655, 'message': 'Dec 6 21:59:27 hqnl0246134 sshd[258658]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 21:59:29,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356769.9330356, 'message': 'Dec 6 21:59:29 hqnl0246134 sshd[258673]: Invalid user arun from 143.110.241.56 port 57640', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 21:59:29,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356769.9377296, 'message': 'Dec 6 21:59:29 hqnl0246134 sshd[258658]: Failed password for invalid user test from 222.168.30.19 port 42098 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 21:59:29,988] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356769.9332466, 'message': 'Dec 6 21:59:29 hqnl0246134 sshd[258673]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.110.241.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 21:59:30,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356769.9376109, 'message': 'Dec 6 21:59:29 hqnl0246134 sshd[258673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.241.56 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 21:59:31,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356771.9337666, 'message': 'Dec 6 21:59:30 hqnl0246134 sshd[258658]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0489 seconds
INFO [2022-12-06 21:59:31,984] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356771.9340637, 'message': 'Dec 6 21:59:31 hqnl0246134 sshd[258673]: Failed password for invalid user arun from 143.110.241.56 port 57640 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 21:59:32,011] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356771.934194, 'message': 'Dec 6 21:59:31 hqnl0246134 sshd[258673]: Disconnected from invalid user arun 143.110.241.56 port 57640 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 21:59:33,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356773.9360528, 'message': 'Dec 6 21:59:32 hqnl0246134 sshd[258658]: Failed password for invalid user test from 222.168.30.19 port 42098 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0532 seconds
INFO [2022-12-06 21:59:34,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356773.9363074, 'message': 'Dec 6 21:59:32 hqnl0246134 sshd[258658]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0482 seconds
INFO [2022-12-06 21:59:35,379] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 21:59:35,380] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 21:59:35,387] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 21:59:35,403] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 21:59:35,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356775.9459395, 'message': 'Dec 6 21:59:34 hqnl0246134 sshd[258658]: Failed password for invalid user test from 222.168.30.19 port 42098 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 21:59:36,018] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356775.9462404, 'message': 'Dec 6 21:59:35 hqnl0246134 sshd[258658]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 21:59:37,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356777.9418, 'message': 'Dec 6 21:59:37 hqnl0246134 sshd[258658]: Failed password for invalid user test from 222.168.30.19 port 42098 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 21:59:37,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356777.942046, 'message': 'Dec 6 21:59:37 hqnl0246134 sshd[258658]: error: maximum authentication attempts exceeded for invalid user test from 222.168.30.19 port 42098 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:59:38,000] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356777.942196, 'message': 'Dec 6 21:59:37 hqnl0246134 sshd[258658]: Disconnecting invalid user test 222.168.30.19 port 42098: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 21:59:39,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356779.942599, 'message': 'Dec 6 21:59:39 hqnl0246134 sshd[258683]: Invalid user test from 222.168.30.19 port 47669', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 21:59:40,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356779.9431198, 'message': 'Dec 6 21:59:39 hqnl0246134 sshd[258683]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 21:59:40,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356779.9440646, 'message': 'Dec 6 21:59:39 hqnl0246134 sshd[258683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 21:59:41,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356781.9457846, 'message': 'Dec 6 21:59:41 hqnl0246134 sshd[258683]: Failed password for invalid user test from 222.168.30.19 port 47669 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 21:59:45,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356785.9512231, 'message': 'Dec 6 21:59:44 hqnl0246134 sshd[258683]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 21:59:45,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356785.9515347, 'message': 'Dec 6 21:59:45 hqnl0246134 sshd[258686]: Invalid user carla from 103.100.208.189 port 34584', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 21:59:46,001] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356785.9516594, 'message': 'Dec 6 21:59:45 hqnl0246134 sshd[258686]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.100.208.189 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 21:59:46,021] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356785.951828, 'message': 'Dec 6 21:59:45 hqnl0246134 sshd[258686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.208.189 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 21:59:47,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356787.9546227, 'message': 'Dec 6 21:59:46 hqnl0246134 sshd[258683]: Failed password for invalid user test from 222.168.30.19 port 47669 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 21:59:47,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356787.95504, 'message': 'Dec 6 21:59:47 hqnl0246134 sshd[258686]: Failed password for invalid user carla from 103.100.208.189 port 34584 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 21:59:48,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356787.9548962, 'message': 'Dec 6 21:59:46 hqnl0246134 sshd[258683]: Disconnected from invalid user test 222.168.30.19 port 47669 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 21:59:49,150] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 21:59:49,151] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 21:59:49,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356789.9588852, 'message': 'Dec 6 21:59:48 hqnl0246134 sshd[258689]: Invalid user user from 222.168.30.19 port 50149', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 21:59:49,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356789.9594297, 'message': 'Dec 6 21:59:49 hqnl0246134 sshd[258686]: Disconnected from invalid user carla 103.100.208.189 port 34584 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 21:59:50,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356789.9591818, 'message': 'Dec 6 21:59:48 hqnl0246134 sshd[258689]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 21:59:50,029] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356789.9593241, 'message': 'Dec 6 21:59:48 hqnl0246134 sshd[258689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 21:59:51,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356791.9609885, 'message': 'Dec 6 21:59:50 hqnl0246134 sshd[258689]: Failed password for invalid user user from 222.168.30.19 port 50149 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 21:59:51,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356791.9613273, 'message': 'Dec 6 21:59:50 hqnl0246134 sshd[258691]: Invalid user tuxedo from 110.49.17.96 port 56280', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 21:59:52,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356791.9611819, 'message': 'Dec 6 21:59:50 hqnl0246134 sshd[258689]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0395 seconds
INFO [2022-12-06 21:59:52,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356791.9616523, 'message': 'Dec 6 21:59:51 hqnl0246134 sshd[258694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 21:59:52,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356791.9614456, 'message': 'Dec 6 21:59:50 hqnl0246134 sshd[258691]: pam_imunify(sshd:auth): [IM360_RBL] The IP 110.49.17.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0396 seconds
INFO [2022-12-06 21:59:52,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356791.9615498, 'message': 'Dec 6 21:59:50 hqnl0246134 sshd[258691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.17.96 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 21:59:54,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356793.964172, 'message': 'Dec 6 21:59:52 hqnl0246134 sshd[258689]: Failed password for invalid user user from 222.168.30.19 port 50149 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 21:59:54,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356793.9644172, 'message': 'Dec 6 21:59:52 hqnl0246134 sshd[258691]: Failed password for invalid user tuxedo from 110.49.17.96 port 56280 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0415 seconds
INFO [2022-12-06 21:59:54,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356793.9645875, 'message': 'Dec 6 21:59:53 hqnl0246134 sshd[258694]: Failed password for root from 165.227.166.207 port 36226 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0413 seconds
INFO [2022-12-06 21:59:56,011] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356795.9682546, 'message': 'Dec 6 21:59:54 hqnl0246134 sshd[258689]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-06 21:59:56,012] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356795.9688222, 'message': 'Dec 6 21:59:55 hqnl0246134 sshd[258691]: Disconnected from invalid user tuxedo 110.49.17.96 port 56280 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0419 seconds
INFO [2022-12-06 21:59:57,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356797.9696395, 'message': 'Dec 6 21:59:56 hqnl0246134 sshd[258689]: Failed password for invalid user user from 222.168.30.19 port 50149 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 21:59:59,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356799.9727147, 'message': 'Dec 6 21:59:58 hqnl0246134 sshd[258689]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 22:00:02,060] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356801.9947538, 'message': 'Dec 6 22:00:01 hqnl0246134 sshd[258689]: Failed password for invalid user user from 222.168.30.19 port 50149 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0652 seconds
INFO [2022-12-06 22:00:04,011] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356803.97678, 'message': 'Dec 6 22:00:02 hqnl0246134 sshd[258689]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 22:00:06,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356805.979605, 'message': 'Dec 6 22:00:05 hqnl0246134 sshd[258689]: Failed password for invalid user user from 222.168.30.19 port 50149 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 22:00:08,001] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356807.9825618, 'message': 'Dec 6 22:00:06 hqnl0246134 sshd[258689]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:00:10,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356809.9869614, 'message': 'Dec 6 22:00:09 hqnl0246134 sshd[258689]: Failed password for invalid user user from 222.168.30.19 port 50149 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 22:00:10,511] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:00:10,537] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0349 seconds
INFO [2022-12-06 22:00:12,011] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356811.9916508, 'message': 'Dec 6 22:00:10 hqnl0246134 sshd[258689]: error: maximum authentication attempts exceeded for invalid user user from 222.168.30.19 port 50149 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:00:12,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356811.9918454, 'message': 'Dec 6 22:00:10 hqnl0246134 sshd[258689]: Disconnecting invalid user user 222.168.30.19 port 50149: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:00:14,019] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356813.9996533, 'message': 'Dec 6 22:00:12 hqnl0246134 sshd[258746]: Invalid user user from 222.168.30.19 port 57636', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:00:14,037] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356813.9998965, 'message': 'Dec 6 22:00:12 hqnl0246134 sshd[258746]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:00:14,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356814.000084, 'message': 'Dec 6 22:00:12 hqnl0246134 sshd[258746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:00:16,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356816.0045455, 'message': 'Dec 6 22:00:14 hqnl0246134 sshd[258746]: Failed password for invalid user user from 222.168.30.19 port 57636 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 22:00:16,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356816.0047896, 'message': 'Dec 6 22:00:14 hqnl0246134 sshd[258746]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 22:00:17,900] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:00:17,900] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:00:17,908] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:00:17,920] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 22:00:18,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356818.006064, 'message': 'Dec 6 22:00:16 hqnl0246134 sshd[258746]: Failed password for invalid user user from 222.168.30.19 port 57636 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:00:20,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356820.017421, 'message': 'Dec 6 22:00:18 hqnl0246134 sshd[258755]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0452 seconds
INFO [2022-12-06 22:00:20,064] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356820.0179267, 'message': 'Dec 6 22:00:18 hqnl0246134 sshd[258746]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0449 seconds
INFO [2022-12-06 22:00:20,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356820.017711, 'message': 'Dec 6 22:00:18 hqnl0246134 sshd[258755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 22:00:20,576] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:00:20,576] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:00:20,584] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:00:20,595] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 22:00:22,060] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356822.017775, 'message': 'Dec 6 22:00:20 hqnl0246134 sshd[258755]: Failed password for root from 61.177.173.18 port 37297 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 22:00:22,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356822.0207489, 'message': 'Dec 6 22:00:20 hqnl0246134 sshd[258746]: Failed password for invalid user user from 222.168.30.19 port 57636 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0431 seconds
INFO [2022-12-06 22:00:22,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356822.020879, 'message': 'Dec 6 22:00:22 hqnl0246134 sshd[258768]: Invalid user tuxedo from 181.204.164.18 port 38664', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0442 seconds
INFO [2022-12-06 22:00:22,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356822.0180256, 'message': 'Dec 6 22:00:20 hqnl0246134 sshd[258755]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 22:00:24,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356824.022394, 'message': 'Dec 6 22:00:22 hqnl0246134 sshd[258768]: pam_imunify(sshd:auth): [IM360_RBL] The IP 181.204.164.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0490 seconds
INFO [2022-12-06 22:00:24,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356824.0227664, 'message': 'Dec 6 22:00:23 hqnl0246134 sshd[258746]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0495 seconds
INFO [2022-12-06 22:00:24,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356824.0229363, 'message': 'Dec 6 22:00:23 hqnl0246134 sshd[258755]: Failed password for root from 61.177.173.18 port 37297 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0494 seconds
INFO [2022-12-06 22:00:24,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356824.0226138, 'message': 'Dec 6 22:00:22 hqnl0246134 sshd[258768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.204.164.18 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 22:00:26,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356826.023056, 'message': 'Dec 6 22:00:24 hqnl0246134 sshd[258746]: Failed password for invalid user user from 222.168.30.19 port 57636 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0527 seconds
INFO [2022-12-06 22:00:26,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356826.0235317, 'message': 'Dec 6 22:00:24 hqnl0246134 sshd[258755]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0532 seconds
INFO [2022-12-06 22:00:26,079] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356826.0236678, 'message': 'Dec 6 22:00:24 hqnl0246134 sshd[258768]: Failed password for invalid user tuxedo from 181.204.164.18 port 38664 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0532 seconds
INFO [2022-12-06 22:00:26,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356826.023785, 'message': 'Dec 6 22:00:25 hqnl0246134 sshd[258746]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 22:00:28,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356828.0253935, 'message': 'Dec 6 22:00:26 hqnl0246134 sshd[258755]: Failed password for root from 61.177.173.18 port 37297 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0680 seconds
INFO [2022-12-06 22:00:28,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356828.0257177, 'message': 'Dec 6 22:00:26 hqnl0246134 sshd[258768]: Disconnected from invalid user tuxedo 181.204.164.18 port 38664 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0688 seconds
INFO [2022-12-06 22:00:28,097] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356828.0259273, 'message': 'Dec 6 22:00:27 hqnl0246134 sshd[258746]: Failed password for invalid user user from 222.168.30.19 port 57636 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0688 seconds
INFO [2022-12-06 22:00:30,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356830.0277746, 'message': 'Dec 6 22:00:29 hqnl0246134 sshd[258746]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 22:00:32,068] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356832.0305567, 'message': 'Dec 6 22:00:31 hqnl0246134 sshd[258746]: Failed password for invalid user user from 222.168.30.19 port 57636 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-06 22:00:32,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356832.0309453, 'message': 'Dec 6 22:00:31 hqnl0246134 sshd[258746]: error: maximum authentication attempts exceeded for invalid user user from 222.168.30.19 port 57636 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 22:00:32,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356832.0311215, 'message': 'Dec 6 22:00:31 hqnl0246134 sshd[258746]: Disconnecting invalid user user 222.168.30.19 port 57636: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:00:34,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356834.0325155, 'message': 'Dec 6 22:00:33 hqnl0246134 sshd[258781]: Invalid user user from 222.168.30.19 port 63894', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 22:00:34,071] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356834.032761, 'message': 'Dec 6 22:00:33 hqnl0246134 sshd[258781]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:00:34,090] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356834.0328858, 'message': 'Dec 6 22:00:33 hqnl0246134 sshd[258781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:00:36,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356836.0341687, 'message': 'Dec 6 22:00:35 hqnl0246134 sshd[258781]: Failed password for invalid user user from 222.168.30.19 port 63894 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 22:00:38,060] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356838.037698, 'message': 'Dec 6 22:00:37 hqnl0246134 sshd[258781]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 22:00:40,060] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356840.0397718, 'message': 'Dec 6 22:00:39 hqnl0246134 sshd[258781]: Failed password for invalid user user from 222.168.30.19 port 63894 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:00:42,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356842.042127, 'message': 'Dec 6 22:00:41 hqnl0246134 sshd[258781]: Disconnected from invalid user user 222.168.30.19 port 63894 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 22:00:44,064] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356844.0450785, 'message': 'Dec 6 22:00:42 hqnl0246134 sshd[258788]: Invalid user ftpuser from 222.168.30.19 port 2251', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:00:44,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356844.0453417, 'message': 'Dec 6 22:00:42 hqnl0246134 sshd[258788]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 22:00:44,101] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356844.0455031, 'message': 'Dec 6 22:00:42 hqnl0246134 sshd[258788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:00:46,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356846.048293, 'message': 'Dec 6 22:00:44 hqnl0246134 sshd[258788]: Failed password for invalid user ftpuser from 222.168.30.19 port 2251 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:00:46,146] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:00:46,146] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:00:46,163] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:00:46,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356846.048566, 'message': 'Dec 6 22:00:45 hqnl0246134 sshd[258788]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1138 seconds
INFO [2022-12-06 22:00:46,185] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0372 seconds
WARNING [2022-12-06 22:00:49,158] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:00:49,159] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:00:50,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356850.0524094, 'message': 'Dec 6 22:00:48 hqnl0246134 sshd[258788]: Failed password for invalid user ftpuser from 222.168.30.19 port 2251 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 22:00:50,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356850.052593, 'message': 'Dec 6 22:00:48 hqnl0246134 sshd[258788]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:00:52,084] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356852.0554366, 'message': 'Dec 6 22:00:50 hqnl0246134 sshd[258788]: Failed password for invalid user ftpuser from 222.168.30.19 port 2251 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 22:00:52,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356852.0556483, 'message': 'Dec 6 22:00:50 hqnl0246134 sshd[258793]: Invalid user user from 139.59.112.202 port 54816', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 22:00:52,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356852.0560305, 'message': 'Dec 6 22:00:51 hqnl0246134 sshd[258788]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 22:00:52,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356852.05577, 'message': 'Dec 6 22:00:51 hqnl0246134 sshd[258793]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.112.202 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 22:00:52,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356852.0558913, 'message': 'Dec 6 22:00:51 hqnl0246134 sshd[258793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.112.202 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:00:54,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356854.0577269, 'message': 'Dec 6 22:00:53 hqnl0246134 sshd[258793]: Failed password for invalid user user from 139.59.112.202 port 54816 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 22:00:54,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356854.057927, 'message': 'Dec 6 22:00:53 hqnl0246134 sshd[258788]: Failed password for invalid user ftpuser from 222.168.30.19 port 2251 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 22:00:56,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.112.202', 'timestamp': 1670356856.0624752, 'message': 'Dec 6 22:00:55 hqnl0246134 sshd[258793]: Disconnected from invalid user user 139.59.112.202 port 54816 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 22:00:58,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356858.065093, 'message': 'Dec 6 22:00:56 hqnl0246134 sshd[258788]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 22:01:00,082] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356860.0654535, 'message': 'Dec 6 22:00:59 hqnl0246134 sshd[258788]: Failed password for invalid user ftpuser from 222.168.30.19 port 2251 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:01:02,088] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356862.0683613, 'message': 'Dec 6 22:01:02 hqnl0246134 sshd[258788]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:01:04,088] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356864.0697966, 'message': 'Dec 6 22:01:03 hqnl0246134 sshd[258788]: Failed password for invalid user ftpuser from 222.168.30.19 port 2251 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:01:06,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356866.0732505, 'message': 'Dec 6 22:01:04 hqnl0246134 sshd[258788]: error: maximum authentication attempts exceeded for invalid user ftpuser from 222.168.30.19 port 2251 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 22:01:06,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356866.0735517, 'message': 'Dec 6 22:01:04 hqnl0246134 sshd[258788]: Disconnecting invalid user ftpuser 222.168.30.19 port 2251: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 22:01:08,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356868.0736535, 'message': 'Dec 6 22:01:06 hqnl0246134 sshd[258816]: Invalid user ftpuser from 222.168.30.19 port 8766', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0378 seconds
INFO [2022-12-06 22:01:08,136] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356868.073866, 'message': 'Dec 6 22:01:06 hqnl0246134 sshd[258816]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 22:01:08,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356868.0743163, 'message': 'Dec 6 22:01:06 hqnl0246134 sshd[258816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:01:08,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356868.0744317, 'message': 'Dec 6 22:01:07 hqnl0246134 sshd[258816]: Failed password for invalid user ftpuser from 222.168.30.19 port 8766 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 22:01:10,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356870.0784156, 'message': 'Dec 6 22:01:08 hqnl0246134 sshd[258816]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0274 seconds
WARNING [2022-12-06 22:01:10,588] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:01:10,610] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0303 seconds
INFO [2022-12-06 22:01:12,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356872.0810843, 'message': 'Dec 6 22:01:11 hqnl0246134 sshd[258816]: Failed password for invalid user ftpuser from 222.168.30.19 port 8766 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 22:01:12,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356872.0814035, 'message': 'Dec 6 22:01:11 hqnl0246134 sshd[258816]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 22:01:14,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356874.0818207, 'message': 'Dec 6 22:01:13 hqnl0246134 sshd[258816]: Failed password for invalid user ftpuser from 222.168.30.19 port 8766 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0732 seconds
INFO [2022-12-06 22:01:16,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356876.0856934, 'message': 'Dec 6 22:01:14 hqnl0246134 sshd[258816]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:01:18,110] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356878.0887454, 'message': 'Dec 6 22:01:16 hqnl0246134 sshd[258816]: Failed password for invalid user ftpuser from 222.168.30.19 port 8766 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 22:01:18,129] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356878.0890813, 'message': 'Dec 6 22:01:17 hqnl0246134 sshd[258816]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:01:18,241] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:01:18,241] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:01:18,248] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:01:18,260] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 22:01:20,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356880.090122, 'message': 'Dec 6 22:01:18 hqnl0246134 sshd[258816]: Failed password for invalid user ftpuser from 222.168.30.19 port 8766 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 22:01:20,129] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356880.0903888, 'message': 'Dec 6 22:01:18 hqnl0246134 sshd[258816]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:01:20,880] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:01:20,881] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:01:20,889] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:01:20,902] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 22:01:22,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356882.093361, 'message': 'Dec 6 22:01:20 hqnl0246134 sshd[258816]: Failed password for invalid user ftpuser from 222.168.30.19 port 8766 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:01:22,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356882.1004844, 'message': 'Dec 6 22:01:21 hqnl0246134 sshd[258816]: error: maximum authentication attempts exceeded for invalid user ftpuser from 222.168.30.19 port 8766 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 22:01:22,157] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356882.100659, 'message': 'Dec 6 22:01:21 hqnl0246134 sshd[258816]: Disconnecting invalid user ftpuser 222.168.30.19 port 8766: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:01:24,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356884.0941558, 'message': 'Dec 6 22:01:22 hqnl0246134 sshd[258832]: Invalid user joe from 103.159.223.158 port 41410', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 22:01:24,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356884.0949757, 'message': 'Dec 6 22:01:23 hqnl0246134 sshd[258834]: Invalid user ftpuser from 222.168.30.19 port 13781', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 22:01:24,159] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356884.0943987, 'message': 'Dec 6 22:01:22 hqnl0246134 sshd[258832]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.159.223.158 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 22:01:24,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356884.0950913, 'message': 'Dec 6 22:01:23 hqnl0246134 sshd[258834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 22:01:24,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356884.0948677, 'message': 'Dec 6 22:01:22 hqnl0246134 sshd[258832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.159.223.158 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 22:01:24,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356884.0952039, 'message': 'Dec 6 22:01:23 hqnl0246134 sshd[258834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 22:01:26,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356886.0983262, 'message': 'Dec 6 22:01:24 hqnl0246134 sshd[258832]: Failed password for invalid user joe from 103.159.223.158 port 41410 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 22:01:26,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356886.0987837, 'message': 'Dec 6 22:01:25 hqnl0246134 sshd[258834]: Failed password for invalid user ftpuser from 222.168.30.19 port 13781 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 22:01:26,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356886.0989957, 'message': 'Dec 6 22:01:25 hqnl0246134 sshd[258844]: Invalid user teste from 143.198.43.241 port 42666', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0477 seconds
INFO [2022-12-06 22:01:26,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356886.0992541, 'message': 'Dec 6 22:01:25 hqnl0246134 sshd[258844]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.43.241 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:01:26,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356886.099449, 'message': 'Dec 6 22:01:25 hqnl0246134 sshd[258844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.43.241 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:01:28,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356888.0981936, 'message': 'Dec 6 22:01:26 hqnl0246134 sshd[258834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0468 seconds
INFO [2022-12-06 22:01:28,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.159.223.158', 'timestamp': 1670356888.0984771, 'message': 'Dec 6 22:01:26 hqnl0246134 sshd[258832]: Disconnected from invalid user joe 103.159.223.158 port 41410 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0476 seconds
INFO [2022-12-06 22:01:28,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356888.0986066, 'message': 'Dec 6 22:01:27 hqnl0246134 sshd[258844]: Failed password for invalid user teste from 143.198.43.241 port 42666 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0477 seconds
INFO [2022-12-06 22:01:28,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.43.241', 'timestamp': 1670356888.0987086, 'message': 'Dec 6 22:01:28 hqnl0246134 sshd[258844]: Disconnected from invalid user teste 143.198.43.241 port 42666 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 22:01:30,120] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356890.1011608, 'message': 'Dec 6 22:01:28 hqnl0246134 sshd[258834]: Failed password for invalid user ftpuser from 222.168.30.19 port 13781 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:01:30,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356890.1014454, 'message': 'Dec 6 22:01:28 hqnl0246134 sshd[258834]: Disconnected from invalid user ftpuser 222.168.30.19 port 13781 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:01:32,128] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356892.104603, 'message': 'Dec 6 22:01:30 hqnl0246134 sshd[258846]: Invalid user test1 from 222.168.30.19 port 15869', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 22:01:32,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356892.1055923, 'message': 'Dec 6 22:01:30 hqnl0246134 sshd[258846]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:01:32,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356892.1057808, 'message': 'Dec 6 22:01:30 hqnl0246134 sshd[258846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:01:34,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356894.1072497, 'message': 'Dec 6 22:01:32 hqnl0246134 sshd[258846]: Failed password for invalid user test1 from 222.168.30.19 port 15869 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 22:01:34,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356894.107598, 'message': 'Dec 6 22:01:33 hqnl0246134 sshd[258846]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0453 seconds
INFO [2022-12-06 22:01:38,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356898.1117525, 'message': 'Dec 6 22:01:36 hqnl0246134 sshd[258846]: Failed password for invalid user test1 from 222.168.30.19 port 15869 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0835 seconds
INFO [2022-12-06 22:01:38,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356898.1125271, 'message': 'Dec 6 22:01:36 hqnl0246134 sshd[258850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0828 seconds
INFO [2022-12-06 22:01:38,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356898.1122727, 'message': 'Dec 6 22:01:36 hqnl0246134 sshd[258846]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0389 seconds
INFO [2022-12-06 22:01:40,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356900.1130702, 'message': 'Dec 6 22:01:38 hqnl0246134 sshd[258846]: Failed password for invalid user test1 from 222.168.30.19 port 15869 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 22:01:40,151] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670356900.1133726, 'message': 'Dec 6 22:01:38 hqnl0246134 sshd[258850]: Failed password for root from 165.227.166.207 port 46484 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 22:01:40,169] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356900.1134858, 'message': 'Dec 6 22:01:40 hqnl0246134 sshd[258846]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:01:42,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356902.1151252, 'message': 'Dec 6 22:01:41 hqnl0246134 sshd[258846]: Failed password for invalid user test1 from 222.168.30.19 port 15869 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 22:01:44,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356904.1206293, 'message': 'Dec 6 22:01:43 hqnl0246134 sshd[258846]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 22:01:44,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356904.1208112, 'message': 'Dec 6 22:01:43 hqnl0246134 sshd[258855]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 22:01:44,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356904.1209567, 'message': 'Dec 6 22:01:43 hqnl0246134 sshd[258855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:01:46,151] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356906.1218338, 'message': 'Dec 6 22:01:45 hqnl0246134 sshd[258846]: Failed password for invalid user test1 from 222.168.30.19 port 15869 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 22:01:46,151] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356906.1220891, 'message': 'Dec 6 22:01:45 hqnl0246134 sshd[258855]: Failed password for root from 61.177.173.18 port 55521 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 22:01:48,156] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356908.1246123, 'message': 'Dec 6 22:01:46 hqnl0246134 sshd[258846]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 22:01:48,157] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356908.1248398, 'message': 'Dec 6 22:01:48 hqnl0246134 sshd[258855]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
WARNING [2022-12-06 22:01:49,165] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:01:49,166] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:01:50,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356910.1263025, 'message': 'Dec 6 22:01:49 hqnl0246134 sshd[258846]: Failed password for invalid user test1 from 222.168.30.19 port 15869 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0406 seconds
INFO [2022-12-06 22:01:50,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356910.1264977, 'message': 'Dec 6 22:01:49 hqnl0246134 sshd[258857]: Invalid user psql from 129.226.210.53 port 50018', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-06 22:01:50,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356910.1269197, 'message': 'Dec 6 22:01:49 hqnl0246134 sshd[258855]: Failed password for root from 61.177.173.18 port 55521 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-06 22:01:50,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356910.1266336, 'message': 'Dec 6 22:01:49 hqnl0246134 sshd[258857]: pam_imunify(sshd:auth): [IM360_RBL] The IP 129.226.210.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0580 seconds
INFO [2022-12-06 22:01:50,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356910.1270533, 'message': 'Dec 6 22:01:49 hqnl0246134 sshd[258846]: error: maximum authentication attempts exceeded for invalid user test1 from 222.168.30.19 port 15869 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0583 seconds
INFO [2022-12-06 22:01:50,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356910.1267533, 'message': 'Dec 6 22:01:49 hqnl0246134 sshd[258857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.210.53 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0563 seconds
INFO [2022-12-06 22:01:50,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356910.1271563, 'message': 'Dec 6 22:01:49 hqnl0246134 sshd[258846]: Disconnecting invalid user test1 222.168.30.19 port 15869: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0570 seconds
INFO [2022-12-06 22:01:52,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356912.1290495, 'message': 'Dec 6 22:01:50 hqnl0246134 sshd[258855]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0545 seconds
INFO [2022-12-06 22:01:52,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356912.1293185, 'message': 'Dec 6 22:01:51 hqnl0246134 sshd[258857]: Failed password for invalid user psql from 129.226.210.53 port 50018 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0546 seconds
INFO [2022-12-06 22:01:52,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356912.1295083, 'message': 'Dec 6 22:01:51 hqnl0246134 sshd[258861]: Invalid user test1 from 222.168.30.19 port 21431', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0541 seconds
INFO [2022-12-06 22:01:52,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356912.1297219, 'message': 'Dec 6 22:01:51 hqnl0246134 sshd[258861]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:01:52,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356912.129948, 'message': 'Dec 6 22:01:51 hqnl0246134 sshd[258861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:01:52,451] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:01:52,452] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:01:52,465] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:01:52,487] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0340 seconds
WARNING [2022-12-06 22:01:54,020] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 22:01:54,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356914.138268, 'message': 'Dec 6 22:01:52 hqnl0246134 sshd[258855]: Failed password for root from 61.177.173.18 port 55521 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0554 seconds
INFO [2022-12-06 22:01:54,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '129.226.210.53', 'timestamp': 1670356914.1404202, 'message': 'Dec 6 22:01:52 hqnl0246134 sshd[258857]: Disconnected from invalid user psql 129.226.210.53 port 50018 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0537 seconds
INFO [2022-12-06 22:01:54,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356914.140621, 'message': 'Dec 6 22:01:53 hqnl0246134 sshd[258861]: Failed password for invalid user test1 from 222.168.30.19 port 21431 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0524 seconds
INFO [2022-12-06 22:01:56,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356916.142295, 'message': 'Dec 6 22:01:54 hqnl0246134 sshd[258861]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 22:01:58,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356918.1442254, 'message': 'Dec 6 22:01:57 hqnl0246134 sshd[258861]: Failed password for invalid user test1 from 222.168.30.19 port 21431 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:01:58,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356918.144438, 'message': 'Dec 6 22:01:58 hqnl0246134 sshd[258861]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:02:02,177] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356922.1529508, 'message': 'Dec 6 22:02:00 hqnl0246134 sshd[258861]: Failed password for invalid user test1 from 222.168.30.19 port 21431 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 22:02:02,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356922.153375, 'message': 'Dec 6 22:02:01 hqnl0246134 sshd[258861]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:02:04,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356924.1556823, 'message': 'Dec 6 22:02:03 hqnl0246134 sshd[258861]: Failed password for invalid user test1 from 222.168.30.19 port 21431 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:02:06,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356926.1577663, 'message': 'Dec 6 22:02:04 hqnl0246134 sshd[258861]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:02:08,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356928.1600852, 'message': 'Dec 6 22:02:06 hqnl0246134 sshd[258861]: Failed password for invalid user test1 from 222.168.30.19 port 21431 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:02:08,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356928.1602871, 'message': 'Dec 6 22:02:08 hqnl0246134 sshd[258861]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:02:10,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356930.1627896, 'message': 'Dec 6 22:02:10 hqnl0246134 sshd[258861]: Failed password for invalid user test1 from 222.168.30.19 port 21431 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 22:02:10,592] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:02:10,622] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0371 seconds
INFO [2022-12-06 22:02:12,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356932.1657882, 'message': 'Dec 6 22:02:11 hqnl0246134 sshd[258861]: error: maximum authentication attempts exceeded for invalid user test1 from 222.168.30.19 port 21431 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 22:02:12,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356932.166031, 'message': 'Dec 6 22:02:11 hqnl0246134 sshd[258861]: Disconnecting invalid user test1 222.168.30.19 port 21431: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:02:14,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356934.1704738, 'message': 'Dec 6 22:02:12 hqnl0246134 sshd[258892]: Invalid user test1 from 222.168.30.19 port 27105', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:02:14,209] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356934.1706765, 'message': 'Dec 6 22:02:12 hqnl0246134 sshd[258892]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:02:14,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356934.1707895, 'message': 'Dec 6 22:02:12 hqnl0246134 sshd[258892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:02:14,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356934.1709166, 'message': 'Dec 6 22:02:14 hqnl0246134 sshd[258892]: Failed password for invalid user test1 from 222.168.30.19 port 27105 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:02:16,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356936.1729963, 'message': 'Dec 6 22:02:14 hqnl0246134 sshd[258892]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 22:02:16,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356936.173192, 'message': 'Dec 6 22:02:16 hqnl0246134 sshd[258892]: Failed password for invalid user test1 from 222.168.30.19 port 27105 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 22:02:17,730] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:02:17,731] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:02:17,740] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:02:17,753] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 22:02:18,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356938.1739452, 'message': 'Dec 6 22:02:17 hqnl0246134 sshd[258892]: Disconnected from invalid user test1 222.168.30.19 port 27105 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 22:02:20,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356940.1776426, 'message': 'Dec 6 22:02:18 hqnl0246134 sshd[258897]: pam_imunify(sshd:auth): [IM360_RBL] The IP 147.182.230.251 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 22:02:20,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356940.1780362, 'message': 'Dec 6 22:02:19 hqnl0246134 sshd[258902]: Invalid user test2 from 222.168.30.19 port 28998', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-06 22:02:20,306] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:02:20,306] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 22:02:20,321] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356940.1779184, 'message': 'Dec 6 22:02:18 hqnl0246134 sshd[258897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.230.251 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1066 seconds
WARNING [2022-12-06 22:02:20,322] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:02:20,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356940.178142, 'message': 'Dec 6 22:02:19 hqnl0246134 sshd[258902]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1072 seconds
INFO [2022-12-06 22:02:20,348] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0406 seconds
INFO [2022-12-06 22:02:20,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356940.1782458, 'message': 'Dec 6 22:02:19 hqnl0246134 sshd[258902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 22:02:22,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '147.182.230.251', 'timestamp': 1670356942.178577, 'message': 'Dec 6 22:02:20 hqnl0246134 sshd[258897]: Failed password for root from 147.182.230.251 port 54012 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-06 22:02:22,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356942.1788905, 'message': 'Dec 6 22:02:21 hqnl0246134 sshd[258902]: Failed password for invalid user test2 from 222.168.30.19 port 28998 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-06 22:02:22,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356942.179045, 'message': 'Dec 6 22:02:21 hqnl0246134 sshd[258902]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 22:02:24,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356944.1873407, 'message': 'Dec 6 22:02:23 hqnl0246134 sshd[258902]: Failed password for invalid user test2 from 222.168.30.19 port 28998 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:02:26,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356946.1914113, 'message': 'Dec 6 22:02:25 hqnl0246134 sshd[258902]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 22:02:28,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356948.1973035, 'message': 'Dec 6 22:02:27 hqnl0246134 sshd[258902]: Failed password for invalid user test2 from 222.168.30.19 port 28998 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 22:02:28,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356948.1975935, 'message': 'Dec 6 22:02:27 hqnl0246134 sshd[258902]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 22:02:30,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356950.2003434, 'message': 'Dec 6 22:02:29 hqnl0246134 sshd[258917]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 22:02:30,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356950.2008333, 'message': 'Dec 6 22:02:30 hqnl0246134 sshd[258902]: Failed password for invalid user test2 from 222.168.30.19 port 28998 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 22:02:30,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356950.2006729, 'message': 'Dec 6 22:02:29 hqnl0246134 sshd[258917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:02:32,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356952.2027051, 'message': 'Dec 6 22:02:31 hqnl0246134 sshd[258917]: Failed password for root from 61.177.173.18 port 22093 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 22:02:34,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356954.2055514, 'message': 'Dec 6 22:02:32 hqnl0246134 sshd[258902]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0414 seconds
INFO [2022-12-06 22:02:34,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670356954.2058077, 'message': 'Dec 6 22:02:32 hqnl0246134 sshd[258919]: Invalid user ubnt from 152.89.196.220 port 17058', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-06 22:02:34,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356954.2061846, 'message': 'Dec 6 22:02:33 hqnl0246134 sshd[258917]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0417 seconds
INFO [2022-12-06 22:02:34,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670356954.205938, 'message': 'Dec 6 22:02:33 hqnl0246134 sshd[258919]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 22:02:34,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670356954.2060668, 'message': 'Dec 6 22:02:33 hqnl0246134 sshd[258919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 22:02:36,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356956.2085369, 'message': 'Dec 6 22:02:34 hqnl0246134 sshd[258921]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.110.241.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0577 seconds
INFO [2022-12-06 22:02:36,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356956.2089975, 'message': 'Dec 6 22:02:34 hqnl0246134 sshd[258902]: Failed password for invalid user test2 from 222.168.30.19 port 28998 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0587 seconds
INFO [2022-12-06 22:02:36,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670356956.2091353, 'message': 'Dec 6 22:02:35 hqnl0246134 sshd[258919]: Failed password for invalid user ubnt from 152.89.196.220 port 17058 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0588 seconds
INFO [2022-12-06 22:02:36,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356956.2092807, 'message': 'Dec 6 22:02:35 hqnl0246134 sshd[258917]: Failed password for root from 61.177.173.18 port 22093 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0586 seconds
INFO [2022-12-06 22:02:36,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356956.208808, 'message': 'Dec 6 22:02:34 hqnl0246134 sshd[258921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.241.56 user=news', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 22:02:36,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356956.2094421, 'message': 'Dec 6 22:02:36 hqnl0246134 sshd[258917]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 22:02:38,222] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 22:02:38,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '143.110.241.56', 'timestamp': 1670356958.2112303, 'message': 'Dec 6 22:02:36 hqnl0246134 sshd[258921]: Failed password for news from 143.110.241.56 port 46514 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0638 seconds
INFO [2022-12-06 22:02:38,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356958.2115343, 'message': 'Dec 6 22:02:36 hqnl0246134 sshd[258902]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0641 seconds
INFO [2022-12-06 22:02:38,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670356958.2116807, 'message': 'Dec 6 22:02:37 hqnl0246134 sshd[258919]: Disconnected from invalid user ubnt 152.89.196.220 port 17058 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0644 seconds
INFO [2022-12-06 22:02:38,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356958.21182, 'message': 'Dec 6 22:02:37 hqnl0246134 sshd[258917]: Failed password for root from 61.177.173.18 port 22093 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0644 seconds
INFO [2022-12-06 22:02:38,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356958.2119625, 'message': 'Dec 6 22:02:38 hqnl0246134 sshd[258902]: Failed password for invalid user test2 from 222.168.30.19 port 28998 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 22:02:38,311] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 22:02:38,312] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 22:02:38,312] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 22:02:38,312] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 22:02:38,312] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 22:02:38,322] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 22:02:38,339] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0260 seconds
WARNING [2022-12-06 22:02:38,346] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 22:02:38,348] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:02:38,386] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0536 seconds
INFO [2022-12-06 22:02:38,389] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0521 seconds
INFO [2022-12-06 22:02:40,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356960.214662, 'message': 'Dec 6 22:02:38 hqnl0246134 sshd[258902]: error: maximum authentication attempts exceeded for invalid user test2 from 222.168.30.19 port 28998 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-06 22:02:40,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356960.2152915, 'message': 'Dec 6 22:02:39 hqnl0246134 sshd[258923]: Invalid user vmuser from 103.100.208.189 port 56913', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0391 seconds
INFO [2022-12-06 22:02:40,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356960.21507, 'message': 'Dec 6 22:02:38 hqnl0246134 sshd[258902]: Disconnecting invalid user test2 222.168.30.19 port 28998: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 22:02:40,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356960.2154958, 'message': 'Dec 6 22:02:39 hqnl0246134 sshd[258923]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.100.208.189 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 22:02:40,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356960.2156885, 'message': 'Dec 6 22:02:39 hqnl0246134 sshd[258923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.208.189 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:02:42,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356962.2183967, 'message': 'Dec 6 22:02:40 hqnl0246134 sshd[258925]: Invalid user test2 from 222.168.30.19 port 34999', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 22:02:42,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356962.2191432, 'message': 'Dec 6 22:02:41 hqnl0246134 sshd[258923]: Failed password for invalid user vmuser from 103.100.208.189 port 56913 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 22:02:42,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356962.2187402, 'message': 'Dec 6 22:02:40 hqnl0246134 sshd[258925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:02:42,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356962.2189589, 'message': 'Dec 6 22:02:40 hqnl0246134 sshd[258925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:02:42,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356962.2193246, 'message': 'Dec 6 22:02:42 hqnl0246134 sshd[258925]: Failed password for invalid user test2 from 222.168.30.19 port 34999 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:02:44,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356964.2199771, 'message': 'Dec 6 22:02:42 hqnl0246134 sshd[258925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 22:02:44,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.100.208.189', 'timestamp': 1670356964.220203, 'message': 'Dec 6 22:02:42 hqnl0246134 sshd[258923]: Disconnected from invalid user vmuser 103.100.208.189 port 56913 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 22:02:46,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356966.2235465, 'message': 'Dec 6 22:02:44 hqnl0246134 sshd[258925]: Failed password for invalid user test2 from 222.168.30.19 port 34999 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:02:46,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356966.22376, 'message': 'Dec 6 22:02:44 hqnl0246134 sshd[258925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:02:48,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356968.2258103, 'message': 'Dec 6 22:02:46 hqnl0246134 sshd[258925]: Failed password for invalid user test2 from 222.168.30.19 port 34999 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0243 seconds
WARNING [2022-12-06 22:02:49,172] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:02:49,173] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:02:50,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356970.2305074, 'message': 'Dec 6 22:02:49 hqnl0246134 sshd[258925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 22:02:52,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356972.233343, 'message': 'Dec 6 22:02:50 hqnl0246134 sshd[258925]: Failed password for invalid user test2 from 222.168.30.19 port 34999 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 22:02:52,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356972.2335246, 'message': 'Dec 6 22:02:51 hqnl0246134 sshd[258925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:02:54,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356974.237918, 'message': 'Dec 6 22:02:53 hqnl0246134 sshd[258925]: Failed password for invalid user test2 from 222.168.30.19 port 34999 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 22:02:56,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356976.2428918, 'message': 'Dec 6 22:02:55 hqnl0246134 sshd[258925]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 22:02:58,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356978.2451625, 'message': 'Dec 6 22:02:57 hqnl0246134 sshd[258925]: Failed password for invalid user test2 from 222.168.30.19 port 34999 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 22:02:58,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356978.2453804, 'message': 'Dec 6 22:02:57 hqnl0246134 sshd[258925]: error: maximum authentication attempts exceeded for invalid user test2 from 222.168.30.19 port 34999 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 22:02:58,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356978.245515, 'message': 'Dec 6 22:02:57 hqnl0246134 sshd[258925]: Disconnecting invalid user test2 222.168.30.19 port 34999: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:03:00,398] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:03:00,399] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:03:00,417] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:03:00,443] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0437 seconds
INFO [2022-12-06 22:03:00,444] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356980.4006987, 'message': 'Dec 6 22:02:59 hqnl0246134 sshd[258939]: Invalid user test2 from 222.168.30.19 port 40129', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-06 22:03:00,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356980.40119, 'message': 'Dec 6 22:02:59 hqnl0246134 sshd[258941]: Invalid user test2 from 110.49.17.96 port 45404', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0434 seconds
INFO [2022-12-06 22:03:00,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356980.400956, 'message': 'Dec 6 22:02:59 hqnl0246134 sshd[258939]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 22:03:00,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356980.4012969, 'message': 'Dec 6 22:02:59 hqnl0246134 sshd[258941]: pam_imunify(sshd:auth): [IM360_RBL] The IP 110.49.17.96 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 22:03:00,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356980.4010692, 'message': 'Dec 6 22:02:59 hqnl0246134 sshd[258939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 22:03:00,511] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356980.4016736, 'message': 'Dec 6 22:02:59 hqnl0246134 sshd[258941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.17.96 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 22:03:02,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356982.2509146, 'message': 'Dec 6 22:03:00 hqnl0246134 sshd[258939]: Failed password for invalid user test2 from 222.168.30.19 port 40129 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-06 22:03:02,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356982.2511182, 'message': 'Dec 6 22:03:01 hqnl0246134 sshd[258941]: Failed password for invalid user test2 from 110.49.17.96 port 45404 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-06 22:03:02,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356982.2518437, 'message': 'Dec 6 22:03:01 hqnl0246134 sshd[258939]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 22:03:02,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '110.49.17.96', 'timestamp': 1670356982.251966, 'message': 'Dec 6 22:03:02 hqnl0246134 sshd[258941]: Disconnected from invalid user test2 110.49.17.96 port 45404 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 22:03:04,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356984.2553828, 'message': 'Dec 6 22:03:02 hqnl0246134 sshd[258939]: Failed password for invalid user test2 from 222.168.30.19 port 40129 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:03:04,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356984.255579, 'message': 'Dec 6 22:03:03 hqnl0246134 sshd[258939]: Disconnected from invalid user test2 222.168.30.19 port 40129 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 22:03:06,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356986.2619274, 'message': 'Dec 6 22:03:05 hqnl0246134 sshd[258955]: Invalid user contador from 222.168.30.19 port 41759', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 22:03:06,295] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.114.67.95', 'timestamp': 1670356986.2623458, 'message': 'Dec 6 22:03:05 hqnl0246134 sshd[258957]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.114.67.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 22:03:06,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356986.2621086, 'message': 'Dec 6 22:03:05 hqnl0246134 sshd[258955]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 22:03:06,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.114.67.95', 'timestamp': 1670356986.2624624, 'message': 'Dec 6 22:03:05 hqnl0246134 sshd[258957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.67.95 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 22:03:06,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356986.2622423, 'message': 'Dec 6 22:03:05 hqnl0246134 sshd[258955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 22:03:08,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356988.2692757, 'message': 'Dec 6 22:03:07 hqnl0246134 sshd[258955]: Failed password for invalid user contador from 222.168.30.19 port 41759 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 22:03:08,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '167.114.67.95', 'timestamp': 1670356988.2694798, 'message': 'Dec 6 22:03:07 hqnl0246134 sshd[258957]: Failed password for root from 167.114.67.95 port 38602 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 22:03:08,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356988.2695985, 'message': 'Dec 6 22:03:07 hqnl0246134 sshd[258955]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:03:08,462] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 22:03:08,463] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 22:03:08,464] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 22:03:10,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356990.2743921, 'message': 'Dec 6 22:03:09 hqnl0246134 sshd[258955]: Failed password for invalid user contador from 222.168.30.19 port 41759 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 22:03:10,597] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:03:10,631] defence360agent.internals.the_sink: SensorIncidentList(<24 item(s)>) processed in 0.0409 seconds
INFO [2022-12-06 22:03:12,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356992.2805803, 'message': 'Dec 6 22:03:11 hqnl0246134 sshd[258955]: Disconnected from invalid user contador 222.168.30.19 port 41759 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 22:03:14,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356994.2883546, 'message': 'Dec 6 22:03:12 hqnl0246134 sshd[258959]: Invalid user duni from 222.168.30.19 port 43786', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:03:14,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356994.2886167, 'message': 'Dec 6 22:03:12 hqnl0246134 sshd[258959]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:03:14,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356994.2887297, 'message': 'Dec 6 22:03:12 hqnl0246134 sshd[258959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:03:14,362] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356994.289599, 'message': 'Dec 6 22:03:13 hqnl0246134 sshd[258959]: Failed password for invalid user duni from 222.168.30.19 port 43786 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:03:14,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356994.2897053, 'message': 'Dec 6 22:03:14 hqnl0246134 sshd[258959]: Disconnected from invalid user duni 222.168.30.19 port 43786 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:03:16,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356996.289953, 'message': 'Dec 6 22:03:15 hqnl0246134 sshd[258961]: Invalid user joe from 181.204.164.18 port 55358', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 22:03:16,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356996.290339, 'message': 'Dec 6 22:03:15 hqnl0246134 sshd[258963]: Invalid user pi from 222.168.30.19 port 44651', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 22:03:16,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356996.2901294, 'message': 'Dec 6 22:03:15 hqnl0246134 sshd[258961]: pam_imunify(sshd:auth): [IM360_RBL] The IP 181.204.164.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-06 22:03:16,362] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356996.2904575, 'message': 'Dec 6 22:03:15 hqnl0246134 sshd[258963]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-06 22:03:16,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356996.2906685, 'message': 'Dec 6 22:03:16 hqnl0246134 sshd[258965]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-06 22:03:16,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356996.2902381, 'message': 'Dec 6 22:03:15 hqnl0246134 sshd[258961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.204.164.18 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 22:03:16,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356996.2905571, 'message': 'Dec 6 22:03:15 hqnl0246134 sshd[258963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0472 seconds
INFO [2022-12-06 22:03:16,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670356996.290781, 'message': 'Dec 6 22:03:16 hqnl0246134 sshd[258965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0468 seconds
INFO [2022-12-06 22:03:17,814] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:03:17,814] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:03:17,821] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:03:17,833] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 22:03:18,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356998.2956674, 'message': 'Dec 6 22:03:16 hqnl0246134 sshd[258961]: Failed password for invalid user joe from 181.204.164.18 port 55358 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-06 22:03:18,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356998.29599, 'message': 'Dec 6 22:03:17 hqnl0246134 sshd[258963]: Failed password for invalid user pi from 222.168.30.19 port 44651 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-06 22:03:18,372] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.204.164.18', 'timestamp': 1670356998.2958558, 'message': 'Dec 6 22:03:17 hqnl0246134 sshd[258961]: Disconnected from invalid user joe 181.204.164.18 port 55358 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 22:03:18,372] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670356998.2960987, 'message': 'Dec 6 22:03:18 hqnl0246134 sshd[258963]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 22:03:20,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357000.3003383, 'message': 'Dec 6 22:03:18 hqnl0246134 sshd[258965]: Failed password for root from 61.177.173.18 port 60016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 22:03:20,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670357000.3005166, 'message': 'Dec 6 22:03:19 hqnl0246134 sshd[258963]: Failed password for invalid user pi from 222.168.30.19 port 44651 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 22:03:20,405] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:03:20,405] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:03:20,419] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:03:20,432] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0260 seconds
INFO [2022-12-06 22:03:22,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357002.303441, 'message': 'Dec 6 22:03:20 hqnl0246134 sshd[258965]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 22:03:22,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670357002.3036275, 'message': 'Dec 6 22:03:20 hqnl0246134 sshd[258963]: Disconnected from invalid user pi 222.168.30.19 port 44651 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 22:03:22,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670357002.3037374, 'message': 'Dec 6 22:03:22 hqnl0246134 sshd[258977]: Invalid user baikal from 222.168.30.19 port 46528', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 22:03:22,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357002.3040812, 'message': 'Dec 6 22:03:22 hqnl0246134 sshd[258965]: Failed password for root from 61.177.173.18 port 60016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 22:03:22,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '222.168.30.19', 'timestamp': 1670357002.3038642, 'message': 'Dec 6 22:03:22 hqnl0246134 sshd[258977]: pam_imunify(sshd:auth): [IM360_RBL] The IP 222.168.30.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:03:22,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '222.168.30.19', 'timestamp': 1670357002.3039684, 'message': 'Dec 6 22:03:22 hqnl0246134 sshd[258977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 22:03:24,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357004.312502, 'message': 'Dec 6 22:03:22 hqnl0246134 sshd[258965]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 22:03:24,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357004.3127186, 'message': 'Dec 6 22:03:24 hqnl0246134 sshd[258979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 22:03:26,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670357006.3207638, 'message': 'Dec 6 22:03:24 hqnl0246134 sshd[258977]: Failed password for invalid user baikal from 222.168.30.19 port 46528 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0521 seconds
INFO [2022-12-06 22:03:26,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357006.321139, 'message': 'Dec 6 22:03:25 hqnl0246134 sshd[258965]: Failed password for root from 61.177.173.18 port 60016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0526 seconds
INFO [2022-12-06 22:03:26,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357006.3218923, 'message': 'Dec 6 22:03:25 hqnl0246134 sshd[258979]: Failed password for root from 165.227.166.207 port 56810 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0524 seconds
INFO [2022-12-06 22:03:26,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '222.168.30.19', 'timestamp': 1670357006.3213084, 'message': 'Dec 6 22:03:25 hqnl0246134 sshd[258977]: Disconnected from invalid user baikal 222.168.30.19 port 46528 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0231 seconds
WARNING [2022-12-06 22:03:49,176] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:03:49,178] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:03:52,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.112.202', 'timestamp': 1670357032.3646374, 'message': 'Dec 6 22:03:50 hqnl0246134 sshd[258998]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.112.202 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 22:03:52,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.112.202', 'timestamp': 1670357032.365212, 'message': 'Dec 6 22:03:50 hqnl0246134 sshd[258998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.112.202 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:03:54,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.59.112.202', 'timestamp': 1670357034.368448, 'message': 'Dec 6 22:03:52 hqnl0246134 sshd[258998]: Failed password for root from 139.59.112.202 port 43422 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:04:00,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '80.87.33.100', 'timestamp': 1670357040.3856184, 'message': 'Dec 6 22:03:59 hqnl0246134 sshd[259011]: Invalid user alex from 80.87.33.100 port 37878', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0563 seconds
INFO [2022-12-06 22:04:00,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357040.3864195, 'message': 'Dec 6 22:04:00 hqnl0246134 sshd[259013]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0578 seconds
INFO [2022-12-06 22:04:00,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '80.87.33.100', 'timestamp': 1670357040.3861248, 'message': 'Dec 6 22:03:59 hqnl0246134 sshd[259011]: pam_imunify(sshd:auth): [IM360_RBL] The IP 80.87.33.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0555 seconds
INFO [2022-12-06 22:04:00,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357040.3871605, 'message': 'Dec 6 22:04:00 hqnl0246134 sshd[259013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0554 seconds
INFO [2022-12-06 22:04:00,521] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '80.87.33.100', 'timestamp': 1670357040.3862927, 'message': 'Dec 6 22:03:59 hqnl0246134 sshd[259011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.87.33.100 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:04:02,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357042.3884482, 'message': 'Dec 6 22:04:01 hqnl0246134 sshd[259013]: Failed password for root from 61.177.173.18 port 22694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0414 seconds
INFO [2022-12-06 22:04:02,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '80.87.33.100', 'timestamp': 1670357042.3887455, 'message': 'Dec 6 22:04:01 hqnl0246134 sshd[259011]: Failed password for invalid user alex from 80.87.33.100 port 37878 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0416 seconds
INFO [2022-12-06 22:04:02,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '80.87.33.100', 'timestamp': 1670357042.3899379, 'message': 'Dec 6 22:04:02 hqnl0246134 sshd[259011]: Disconnected from invalid user alex 80.87.33.100 port 37878 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 22:04:04,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357044.3902009, 'message': 'Dec 6 22:04:02 hqnl0246134 sshd[259013]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 22:04:04,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357044.3904836, 'message': 'Dec 6 22:04:04 hqnl0246134 sshd[259013]: Failed password for root from 61.177.173.18 port 22694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 22:04:04,840] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:04:04,841] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:04:04,850] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:04:04,861] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 22:04:06,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357046.397274, 'message': 'Dec 6 22:04:04 hqnl0246134 sshd[259013]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:04:08,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357048.3994315, 'message': 'Dec 6 22:04:07 hqnl0246134 sshd[259013]: Failed password for root from 61.177.173.18 port 22694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 22:04:10,602] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:04:10,628] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0334 seconds
INFO [2022-12-06 22:04:17,766] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:04:17,767] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:04:17,777] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:04:17,788] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 22:04:20,307] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:04:20,307] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:04:20,318] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:04:20,335] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0269 seconds
INFO [2022-12-06 22:04:26,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.129.82.220', 'timestamp': 1670357066.4320836, 'message': 'Dec 6 22:04:26 hqnl0246134 sshd[259042]: Invalid user aaa from 125.129.82.220 port 51538', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 22:04:28,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.129.82.220', 'timestamp': 1670357068.4421165, 'message': 'Dec 6 22:04:26 hqnl0246134 sshd[259042]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.129.82.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:04:28,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.129.82.220', 'timestamp': 1670357068.4423583, 'message': 'Dec 6 22:04:26 hqnl0246134 sshd[259042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.82.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:04:28,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.129.82.220', 'timestamp': 1670357068.442533, 'message': 'Dec 6 22:04:28 hqnl0246134 sshd[259042]: Failed password for invalid user aaa from 125.129.82.220 port 51538 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0160 seconds
INFO [2022-12-06 22:04:30,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.129.82.220', 'timestamp': 1670357070.4458442, 'message': 'Dec 6 22:04:30 hqnl0246134 sshd[259042]: Disconnected from invalid user aaa 125.129.82.220 port 51538 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:04:44,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357084.479718, 'message': 'Dec 6 22:04:43 hqnl0246134 sshd[259053]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 22:04:44,521] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357084.4800956, 'message': 'Dec 6 22:04:43 hqnl0246134 sshd[259053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:04:46,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357086.4815774, 'message': 'Dec 6 22:04:45 hqnl0246134 sshd[259053]: Failed password for root from 61.177.173.18 port 35957 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:04:46,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357086.481921, 'message': 'Dec 6 22:04:46 hqnl0246134 sshd[259053]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
WARNING [2022-12-06 22:04:49,182] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:04:49,182] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:04:50,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357090.4861069, 'message': 'Dec 6 22:04:48 hqnl0246134 sshd[259053]: Failed password for root from 61.177.173.18 port 35957 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 22:04:52,523] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357092.495552, 'message': 'Dec 6 22:04:50 hqnl0246134 sshd[259053]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 22:04:54,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357094.5009267, 'message': 'Dec 6 22:04:52 hqnl0246134 sshd[259053]: Failed password for root from 61.177.173.18 port 35957 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:05:00,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.10.125.209', 'timestamp': 1670357100.5166228, 'message': 'Dec 6 22:04:59 hqnl0246134 sshd[259089]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.10.125.209 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 22:05:00,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.10.125.209', 'timestamp': 1670357100.5172048, 'message': 'Dec 6 22:04:59 hqnl0246134 sshd[259089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 22:05:02,561] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '186.10.125.209', 'timestamp': 1670357102.52042, 'message': 'Dec 6 22:05:01 hqnl0246134 sshd[259089]: Failed password for root from 186.10.125.209 port 25807 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0406 seconds
INFO [2022-12-06 22:05:06,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357106.5375912, 'message': 'Dec 6 22:05:06 hqnl0246134 sshd[259112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:05:08,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357108.5404668, 'message': 'Dec 6 22:05:08 hqnl0246134 sshd[259112]: Failed password for root from 165.227.166.207 port 38866 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
WARNING [2022-12-06 22:05:10,605] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:05:10,631] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0328 seconds
INFO [2022-12-06 22:05:17,944] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:05:17,944] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:05:17,953] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:05:17,965] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 22:05:20,879] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:05:20,879] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:05:20,893] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:05:20,904] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0241 seconds
INFO [2022-12-06 22:05:24,591] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.80.61', 'timestamp': 1670357124.5706868, 'message': 'Dec 6 22:05:24 hqnl0246134 sshd[259142]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.80.61 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 22:05:24,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.80.61', 'timestamp': 1670357124.57095, 'message': 'Dec 6 22:05:24 hqnl0246134 sshd[259142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.61 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:05:26,599] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.59.80.61', 'timestamp': 1670357126.5728545, 'message': 'Dec 6 22:05:26 hqnl0246134 sshd[259142]: Failed password for root from 139.59.80.61 port 45370 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 22:05:30,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357130.5783105, 'message': 'Dec 6 22:05:30 hqnl0246134 sshd[259155]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 22:05:30,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357130.5788038, 'message': 'Dec 6 22:05:30 hqnl0246134 sshd[259155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:05:30,926] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:05:30,927] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:05:30,933] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:05:30,945] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 22:05:32,598] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357132.5798717, 'message': 'Dec 6 22:05:32 hqnl0246134 sshd[259155]: Failed password for root from 61.177.173.18 port 16997 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:05:34,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357134.5825782, 'message': 'Dec 6 22:05:32 hqnl0246134 sshd[259155]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 22:05:34,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357134.582783, 'message': 'Dec 6 22:05:34 hqnl0246134 sshd[259155]: Failed password for root from 61.177.173.18 port 16997 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 22:05:36,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357136.5858393, 'message': 'Dec 6 22:05:34 hqnl0246134 sshd[259155]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 22:05:38,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357138.589522, 'message': 'Dec 6 22:05:37 hqnl0246134 sshd[259155]: Failed password for root from 61.177.173.18 port 16997 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 22:05:40,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.114.67.95', 'timestamp': 1670357140.5915747, 'message': 'Dec 6 22:05:40 hqnl0246134 sshd[259160]: Invalid user elk from 167.114.67.95 port 56334', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:05:42,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.114.67.95', 'timestamp': 1670357142.5938945, 'message': 'Dec 6 22:05:40 hqnl0246134 sshd[259160]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.114.67.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 22:05:42,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.114.67.95', 'timestamp': 1670357142.5941553, 'message': 'Dec 6 22:05:40 hqnl0246134 sshd[259160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.67.95 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:05:44,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.114.67.95', 'timestamp': 1670357144.5978267, 'message': 'Dec 6 22:05:43 hqnl0246134 sshd[259160]: Failed password for invalid user elk from 167.114.67.95 port 56334 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 22:05:44,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.114.67.95', 'timestamp': 1670357144.5983815, 'message': 'Dec 6 22:05:43 hqnl0246134 sshd[259160]: Disconnected from invalid user elk 167.114.67.95 port 56334 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
WARNING [2022-12-06 22:05:49,198] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:05:49,199] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 22:06:10,625] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:06:10,656] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0508 seconds
INFO [2022-12-06 22:06:18,901] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:06:18,901] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:06:18,916] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:06:18,943] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0412 seconds
INFO [2022-12-06 22:06:20,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357180.6681714, 'message': 'Dec 6 22:06:18 hqnl0246134 sshd[259186]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:06:20,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357180.6683958, 'message': 'Dec 6 22:06:18 hqnl0246134 sshd[259186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:06:22,418] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:06:22,418] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:06:22,426] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:06:22,439] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 22:06:22,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357182.672206, 'message': 'Dec 6 22:06:20 hqnl0246134 sshd[259186]: Failed password for root from 61.177.173.18 port 58846 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 22:06:24,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357184.6754336, 'message': 'Dec 6 22:06:22 hqnl0246134 sshd[259186]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 22:06:26,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357186.67842, 'message': 'Dec 6 22:06:25 hqnl0246134 sshd[259186]: Failed password for root from 61.177.173.18 port 58846 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 22:06:28,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357188.6845014, 'message': 'Dec 6 22:06:27 hqnl0246134 sshd[259186]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 22:06:30,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357190.6885808, 'message': 'Dec 6 22:06:29 hqnl0246134 sshd[259186]: Failed password for root from 61.177.173.18 port 58846 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
WARNING [2022-12-06 22:06:49,202] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:06:49,204] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:06:50,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357210.7579312, 'message': 'Dec 6 22:06:50 hqnl0246134 sshd[259210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 22:06:52,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357212.759412, 'message': 'Dec 6 22:06:52 hqnl0246134 sshd[259210]: Failed password for root from 165.227.166.207 port 49154 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 22:06:56,945] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:06:56,946] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:06:56,956] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:06:56,970] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
INFO [2022-12-06 22:07:06,802] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357226.7761922, 'message': 'Dec 6 22:07:04 hqnl0246134 sshd[259242]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 22:07:06,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357226.776758, 'message': 'Dec 6 22:07:04 hqnl0246134 sshd[259242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 22:07:08,802] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357228.7798262, 'message': 'Dec 6 22:07:07 hqnl0246134 sshd[259242]: Failed password for root from 61.177.173.18 port 19094 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
WARNING [2022-12-06 22:07:11,219] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:07:11,248] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.6351 seconds
INFO [2022-12-06 22:07:11,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357231.2111015, 'message': 'Dec 6 22:07:09 hqnl0246134 sshd[259242]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0393 seconds
INFO [2022-12-06 22:07:12,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357232.7945533, 'message': 'Dec 6 22:07:11 hqnl0246134 sshd[259242]: Failed password for root from 61.177.173.18 port 19094 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 22:07:12,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357232.7947428, 'message': 'Dec 6 22:07:11 hqnl0246134 sshd[259242]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 22:07:14,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357234.796944, 'message': 'Dec 6 22:07:14 hqnl0246134 sshd[259242]: Failed password for root from 61.177.173.18 port 19094 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 22:07:17,957] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:07:17,958] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:07:17,967] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:07:17,979] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 22:07:20,534] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:07:20,534] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:07:20,542] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:07:20,554] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 22:07:26,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357246.8153958, 'message': 'Dec 6 22:07:25 hqnl0246134 sshd[259256]: Invalid user seedbox from 183.180.128.204 port 27466', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 22:07:26,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357246.8158143, 'message': 'Dec 6 22:07:25 hqnl0246134 sshd[259256]: pam_imunify(sshd:auth): [IM360_RBL] The IP 183.180.128.204 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 22:07:26,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357246.8160486, 'message': 'Dec 6 22:07:25 hqnl0246134 sshd[259256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.180.128.204 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 22:07:28,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357248.8167908, 'message': 'Dec 6 22:07:27 hqnl0246134 sshd[259256]: Failed password for invalid user seedbox from 183.180.128.204 port 27466 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 22:07:30,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357250.8181734, 'message': 'Dec 6 22:07:29 hqnl0246134 sshd[259256]: Disconnected from invalid user seedbox 183.180.128.204 port 27466 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0256 seconds
WARNING [2022-12-06 22:07:49,208] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:07:49,209] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:07:52,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357272.8479571, 'message': 'Dec 6 22:07:51 hqnl0246134 sshd[259271]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 22:07:52,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357272.848267, 'message': 'Dec 6 22:07:51 hqnl0246134 sshd[259271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 22:07:54,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357274.849574, 'message': 'Dec 6 22:07:53 hqnl0246134 sshd[259271]: Failed password for root from 61.177.173.18 port 40857 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 22:07:56,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357276.850406, 'message': 'Dec 6 22:07:55 hqnl0246134 sshd[259271]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 22:07:58,888] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357278.8540447, 'message': 'Dec 6 22:07:57 hqnl0246134 sshd[259271]: Failed password for root from 61.177.173.18 port 40857 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 22:07:58,922] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357278.8544722, 'message': 'Dec 6 22:07:57 hqnl0246134 sshd[259271]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 22:08:00,650] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 22:08:00,718] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 22:08:00,718] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 22:08:00,719] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 22:08:00,719] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 22:08:00,719] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 22:08:00,727] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 22:08:00,743] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0231 seconds
WARNING [2022-12-06 22:08:00,749] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 22:08:00,752] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:08:00,768] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0310 seconds
INFO [2022-12-06 22:08:00,776] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0361 seconds
INFO [2022-12-06 22:08:00,893] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '142.93.145.85', 'timestamp': 1670357280.8571322, 'message': 'Dec 6 22:07:59 hqnl0246134 sshd[259281]: Invalid user vincent from 142.93.145.85 port 52748', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 22:08:00,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357280.8576224, 'message': 'Dec 6 22:07:59 hqnl0246134 sshd[259271]: Failed password for root from 61.177.173.18 port 40857 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 22:08:00,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '142.93.145.85', 'timestamp': 1670357280.8573525, 'message': 'Dec 6 22:07:59 hqnl0246134 sshd[259281]: pam_imunify(sshd:auth): [IM360_RBL] The IP 142.93.145.85 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:08:00,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '142.93.145.85', 'timestamp': 1670357280.8574984, 'message': 'Dec 6 22:07:59 hqnl0246134 sshd[259281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.145.85 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:08:02,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '142.93.145.85', 'timestamp': 1670357282.860837, 'message': 'Dec 6 22:08:02 hqnl0246134 sshd[259281]: Failed password for invalid user vincent from 142.93.145.85 port 52748 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:08:04,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '142.93.145.85', 'timestamp': 1670357284.8630025, 'message': 'Dec 6 22:08:03 hqnl0246134 sshd[259281]: Disconnected from invalid user vincent 142.93.145.85 port 52748 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0281 seconds
WARNING [2022-12-06 22:08:10,623] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:08:10,644] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0289 seconds
INFO [2022-12-06 22:08:17,835] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:08:17,835] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:08:17,844] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:08:17,856] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 22:08:20,450] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:08:20,450] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:08:20,458] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:08:20,469] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 22:08:26,920] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.114.67.95', 'timestamp': 1670357306.8905134, 'message': 'Dec 6 22:08:25 hqnl0246134 sshd[259305]: Invalid user testuser from 167.114.67.95 port 45848', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 22:08:26,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.114.67.95', 'timestamp': 1670357306.8908978, 'message': 'Dec 6 22:08:25 hqnl0246134 sshd[259305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.114.67.95 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 22:08:26,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.114.67.95', 'timestamp': 1670357306.8910844, 'message': 'Dec 6 22:08:25 hqnl0246134 sshd[259305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.67.95 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:08:28,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670357308.8930383, 'message': 'Dec 6 22:08:27 hqnl0246134 sshd[259307]: Invalid user lol from 186.10.125.209 port 4920', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 22:08:28,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.114.67.95', 'timestamp': 1670357308.8935232, 'message': 'Dec 6 22:08:27 hqnl0246134 sshd[259305]: Failed password for invalid user testuser from 167.114.67.95 port 45848 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 22:08:28,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.10.125.209', 'timestamp': 1670357308.893267, 'message': 'Dec 6 22:08:27 hqnl0246134 sshd[259307]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.10.125.209 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 22:08:28,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.114.67.95', 'timestamp': 1670357308.8936586, 'message': 'Dec 6 22:08:28 hqnl0246134 sshd[259305]: Disconnected from invalid user testuser 167.114.67.95 port 45848 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 22:08:28,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.10.125.209', 'timestamp': 1670357308.8934166, 'message': 'Dec 6 22:08:27 hqnl0246134 sshd[259307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:08:30,669] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:08:30,669] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:08:30,676] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:08:30,688] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 22:08:30,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670357310.894128, 'message': 'Dec 6 22:08:29 hqnl0246134 sshd[259307]: Failed password for invalid user lol from 186.10.125.209 port 4920 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:08:30,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '186.10.125.209', 'timestamp': 1670357310.8943334, 'message': 'Dec 6 22:08:30 hqnl0246134 sshd[259307]: Disconnected from invalid user lol 186.10.125.209 port 4920 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 22:08:36,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357316.9093935, 'message': 'Dec 6 22:08:36 hqnl0246134 sshd[259322]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:08:36,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357316.9096315, 'message': 'Dec 6 22:08:36 hqnl0246134 sshd[259322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:08:38,943] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357318.9195766, 'message': 'Dec 6 22:08:37 hqnl0246134 sshd[259322]: Failed password for root from 61.177.173.18 port 60382 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 22:08:38,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357318.9197915, 'message': 'Dec 6 22:08:38 hqnl0246134 sshd[259322]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:08:39,927] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 22:08:39,927] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 22:08:39,928] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 22:08:40,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357320.928789, 'message': 'Dec 6 22:08:39 hqnl0246134 sshd[259340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0667 seconds
INFO [2022-12-06 22:08:40,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357320.92982, 'message': 'Dec 6 22:08:40 hqnl0246134 sshd[259322]: Failed password for root from 61.177.173.18 port 60382 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0664 seconds
INFO [2022-12-06 22:08:41,024] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357320.9311152, 'message': 'Dec 6 22:08:40 hqnl0246134 sshd[259322]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 22:08:42,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357322.933898, 'message': 'Dec 6 22:08:41 hqnl0246134 sshd[259340]: Failed password for root from 165.227.166.207 port 59438 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 22:08:42,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357322.9340847, 'message': 'Dec 6 22:08:42 hqnl0246134 sshd[259322]: Failed password for root from 61.177.173.18 port 60382 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0309 seconds
WARNING [2022-12-06 22:08:49,214] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:08:49,214] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 22:09:10,634] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:09:10,669] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0472 seconds
INFO [2022-12-06 22:09:17,862] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:09:17,862] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:09:17,872] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:09:17,885] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 22:09:20,687] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:09:20,687] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:09:20,698] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:09:20,710] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
INFO [2022-12-06 22:09:23,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357363.0115335, 'message': 'Dec 6 22:09:22 hqnl0246134 sshd[259510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 22:09:23,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357363.0118406, 'message': 'Dec 6 22:09:22 hqnl0246134 sshd[259510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:09:25,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357365.0135128, 'message': 'Dec 6 22:09:24 hqnl0246134 sshd[259510]: Failed password for root from 61.177.173.18 port 34782 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:09:27,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357367.0137854, 'message': 'Dec 6 22:09:26 hqnl0246134 sshd[259510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:09:29,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357369.0159268, 'message': 'Dec 6 22:09:28 hqnl0246134 sshd[259510]: Failed password for root from 61.177.173.18 port 34782 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:09:29,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357369.016131, 'message': 'Dec 6 22:09:28 hqnl0246134 sshd[259510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 22:09:31,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357371.018144, 'message': 'Dec 6 22:09:30 hqnl0246134 sshd[259510]: Failed password for root from 61.177.173.18 port 34782 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:09:33,572] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:09:33,572] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:09:33,579] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:09:33,590] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
WARNING [2022-12-06 22:09:49,217] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:09:49,218] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:10:09,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357409.0476043, 'message': 'Dec 6 22:10:07 hqnl0246134 sshd[259560]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 22:10:09,090] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357409.0480812, 'message': 'Dec 6 22:10:07 hqnl0246134 sshd[259560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 22:10:10,634] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:10:10,665] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0389 seconds
INFO [2022-12-06 22:10:11,068] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357411.0488386, 'message': 'Dec 6 22:10:09 hqnl0246134 sshd[259560]: Failed password for root from 61.177.173.18 port 59307 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:10:11,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357411.0490754, 'message': 'Dec 6 22:10:10 hqnl0246134 sshd[259560]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:10:13,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357413.049926, 'message': 'Dec 6 22:10:12 hqnl0246134 sshd[259560]: Failed password for root from 61.177.173.18 port 59307 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:10:13,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357413.0502193, 'message': 'Dec 6 22:10:12 hqnl0246134 sshd[259560]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:10:15,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357415.0536385, 'message': 'Dec 6 22:10:13 hqnl0246134 sshd[259560]: Failed password for root from 61.177.173.18 port 59307 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:10:17,885] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:10:17,885] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:10:17,892] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:10:17,904] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 22:10:22,559] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:10:22,559] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:10:22,569] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:10:22,582] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0223 seconds
INFO [2022-12-06 22:10:29,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357429.0707383, 'message': 'Dec 6 22:10:28 hqnl0246134 sshd[259593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 22:10:33,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357433.0724657, 'message': 'Dec 6 22:10:31 hqnl0246134 sshd[259593]: Failed password for root from 165.227.166.207 port 41546 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 22:10:35,733] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:10:35,733] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:10:35,741] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:10:35,754] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
WARNING [2022-12-06 22:10:49,222] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:10:49,223] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:10:55,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357455.104547, 'message': 'Dec 6 22:10:54 hqnl0246134 sshd[259602]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:10:55,143] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357455.1049166, 'message': 'Dec 6 22:10:54 hqnl0246134 sshd[259602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:10:57,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357457.106356, 'message': 'Dec 6 22:10:55 hqnl0246134 sshd[259602]: Failed password for root from 61.177.173.18 port 41931 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 22:10:57,177] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357457.1066847, 'message': 'Dec 6 22:10:56 hqnl0246134 sshd[259602]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 22:10:59,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357459.1084912, 'message': 'Dec 6 22:10:58 hqnl0246134 sshd[259602]: Failed password for root from 61.177.173.18 port 41931 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:10:59,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357459.108668, 'message': 'Dec 6 22:10:58 hqnl0246134 sshd[259602]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:11:01,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357461.1118944, 'message': 'Dec 6 22:11:00 hqnl0246134 sshd[259602]: Failed password for root from 61.177.173.18 port 41931 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
WARNING [2022-12-06 22:11:10,638] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:11:10,660] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0297 seconds
INFO [2022-12-06 22:11:17,815] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:11:17,815] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:11:17,823] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:11:17,836] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-06 22:11:21,158] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357481.1361544, 'message': 'Dec 6 22:11:19 hqnl0246134 sshd[259633]: Invalid user test from 183.180.128.204 port 32512', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 22:11:21,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357481.1365545, 'message': 'Dec 6 22:11:19 hqnl0246134 sshd[259633]: pam_imunify(sshd:auth): [IM360_RBL] The IP 183.180.128.204 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:11:21,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357481.1366868, 'message': 'Dec 6 22:11:19 hqnl0246134 sshd[259633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.180.128.204 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:11:21,211] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357481.1368425, 'message': 'Dec 6 22:11:21 hqnl0246134 sshd[259633]: Failed password for invalid user test from 183.180.128.204 port 32512 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:11:22,436] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:11:22,437] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:11:22,445] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:11:22,456] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 22:11:23,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357483.136926, 'message': 'Dec 6 22:11:21 hqnl0246134 sshd[259633]: Disconnected from invalid user test 183.180.128.204 port 32512 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:11:41,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357501.1576116, 'message': 'Dec 6 22:11:39 hqnl0246134 sshd[259651]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 22:11:41,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357501.1581993, 'message': 'Dec 6 22:11:39 hqnl0246134 sshd[259651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:11:43,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357503.1623976, 'message': 'Dec 6 22:11:41 hqnl0246134 sshd[259651]: Failed password for root from 61.177.173.18 port 60504 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:11:43,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357503.162587, 'message': 'Dec 6 22:11:41 hqnl0246134 sshd[259651]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:11:45,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357505.1645005, 'message': 'Dec 6 22:11:44 hqnl0246134 sshd[259651]: Failed password for root from 61.177.173.18 port 60504 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:11:47,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357507.167701, 'message': 'Dec 6 22:11:45 hqnl0246134 sshd[259651]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:11:49,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357509.1734881, 'message': 'Dec 6 22:11:48 hqnl0246134 sshd[259651]: Failed password for root from 61.177.173.18 port 60504 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0196 seconds
WARNING [2022-12-06 22:11:49,226] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:11:49,227] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:11:53,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '186.10.125.209', 'timestamp': 1670357513.1739967, 'message': 'Dec 6 22:11:51 hqnl0246134 sshd[259675]: pam_imunify(sshd:auth): [IM360_RBL] The IP 186.10.125.209 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 22:11:53,324] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '186.10.125.209', 'timestamp': 1670357513.1742456, 'message': 'Dec 6 22:11:51 hqnl0246134 sshd[259675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1294 seconds
INFO [2022-12-06 22:11:53,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '186.10.125.209', 'timestamp': 1670357513.1743617, 'message': 'Dec 6 22:11:53 hqnl0246134 sshd[259675]: Failed password for root from 186.10.125.209 port 5206 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-06 22:11:54,023] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 22:11:55,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357515.1765873, 'message': 'Dec 6 22:11:53 hqnl0246134 sshd[259677]: Invalid user formation from 183.180.128.204 port 34088', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 22:11:55,216] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357515.1767612, 'message': 'Dec 6 22:11:53 hqnl0246134 sshd[259677]: pam_imunify(sshd:auth): [IM360_RBL] The IP 183.180.128.204 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:11:55,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357515.176874, 'message': 'Dec 6 22:11:53 hqnl0246134 sshd[259677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.180.128.204 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:11:57,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357517.1791284, 'message': 'Dec 6 22:11:55 hqnl0246134 sshd[259677]: Failed password for invalid user formation from 183.180.128.204 port 34088 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 22:11:59,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '183.180.128.204', 'timestamp': 1670357519.1811488, 'message': 'Dec 6 22:11:58 hqnl0246134 sshd[259677]: Disconnected from invalid user formation 183.180.128.204 port 34088 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0869 seconds
WARNING [2022-12-06 22:12:10,643] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:12:10,668] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0341 seconds
INFO [2022-12-06 22:12:17,875] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:12:17,876] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:12:17,883] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:12:17,894] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 22:12:20,445] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:12:20,445] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:12:20,454] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:12:20,466] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 22:12:23,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357543.2063532, 'message': 'Dec 6 22:12:22 hqnl0246134 sshd[259723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 22:12:25,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357545.205882, 'message': 'Dec 6 22:12:24 hqnl0246134 sshd[259723]: Failed password for root from 165.227.166.207 port 51838 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:12:27,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357547.20981, 'message': 'Dec 6 22:12:25 hqnl0246134 sshd[259725]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 22:12:27,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357547.2102606, 'message': 'Dec 6 22:12:25 hqnl0246134 sshd[259725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 22:12:28,745] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:12:28,746] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:12:28,756] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:12:28,774] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0272 seconds
INFO [2022-12-06 22:12:29,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357549.2105055, 'message': 'Dec 6 22:12:27 hqnl0246134 sshd[259725]: Failed password for root from 61.177.173.18 port 26634 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:12:29,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357549.2107368, 'message': 'Dec 6 22:12:27 hqnl0246134 sshd[259725]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:12:31,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.89.73.6', 'timestamp': 1670357551.2131138, 'message': 'Dec 6 22:12:29 hqnl0246134 sshd[259738]: Invalid user cedric from 202.89.73.6 port 56890', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0516 seconds
INFO [2022-12-06 22:12:31,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357551.2139142, 'message': 'Dec 6 22:12:30 hqnl0246134 sshd[259725]: Failed password for root from 61.177.173.18 port 26634 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0515 seconds
INFO [2022-12-06 22:12:31,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.89.73.6', 'timestamp': 1670357551.2135024, 'message': 'Dec 6 22:12:29 hqnl0246134 sshd[259738]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.89.73.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 22:12:31,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.89.73.6', 'timestamp': 1670357551.2137065, 'message': 'Dec 6 22:12:29 hqnl0246134 sshd[259738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.89.73.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 22:12:33,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.89.73.6', 'timestamp': 1670357553.214466, 'message': 'Dec 6 22:12:31 hqnl0246134 sshd[259738]: Failed password for invalid user cedric from 202.89.73.6 port 56890 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 22:12:33,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357553.2147682, 'message': 'Dec 6 22:12:32 hqnl0246134 sshd[259725]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 22:12:33,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.89.73.6', 'timestamp': 1670357553.2148826, 'message': 'Dec 6 22:12:32 hqnl0246134 sshd[259738]: Disconnected from invalid user cedric 202.89.73.6 port 56890 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:12:35,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357555.2163603, 'message': 'Dec 6 22:12:34 hqnl0246134 sshd[259725]: Failed password for root from 61.177.173.18 port 26634 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
WARNING [2022-12-06 22:12:49,230] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:12:49,231] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:13:02,254] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 22:13:02,264] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:13:02,277] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0213 seconds
WARNING [2022-12-06 22:13:10,644] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:13:10,667] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0294 seconds
INFO [2022-12-06 22:13:13,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357593.2622395, 'message': 'Dec 6 22:13:12 hqnl0246134 sshd[259780]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:13:13,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357593.2624474, 'message': 'Dec 6 22:13:12 hqnl0246134 sshd[259780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:13:15,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357595.2641776, 'message': 'Dec 6 22:13:14 hqnl0246134 sshd[259780]: Failed password for root from 61.177.173.18 port 45553 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:13:15,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357595.2643607, 'message': 'Dec 6 22:13:14 hqnl0246134 sshd[259780]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:13:17,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357597.2657933, 'message': 'Dec 6 22:13:16 hqnl0246134 sshd[259780]: Failed password for root from 61.177.173.18 port 45553 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:13:18,033] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:13:18,034] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:13:18,041] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:13:18,053] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 22:13:19,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357599.271196, 'message': 'Dec 6 22:13:19 hqnl0246134 sshd[259780]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 22:13:19,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '80.87.33.100', 'timestamp': 1670357599.2713916, 'message': 'Dec 6 22:13:19 hqnl0246134 sshd[259785]: Invalid user vagrant from 80.87.33.100 port 37062', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 22:13:19,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '80.87.33.100', 'timestamp': 1670357599.2715187, 'message': 'Dec 6 22:13:19 hqnl0246134 sshd[259785]: pam_imunify(sshd:auth): [IM360_RBL] The IP 80.87.33.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:13:19,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '80.87.33.100', 'timestamp': 1670357599.2716205, 'message': 'Dec 6 22:13:19 hqnl0246134 sshd[259785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.87.33.100 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 22:13:19,542] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 22:13:19,614] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 22:13:19,615] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 22:13:19,615] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 22:13:19,615] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 22:13:19,616] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 22:13:19,626] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 22:13:19,642] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0249 seconds
WARNING [2022-12-06 22:13:19,648] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 22:13:19,650] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:13:19,666] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0306 seconds
INFO [2022-12-06 22:13:19,668] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0280 seconds
INFO [2022-12-06 22:13:20,592] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:13:20,593] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:13:20,600] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:13:20,613] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-06 22:13:21,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357601.2754579, 'message': 'Dec 6 22:13:21 hqnl0246134 sshd[259780]: Failed password for root from 61.177.173.18 port 45553 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 22:13:21,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '80.87.33.100', 'timestamp': 1670357601.2756593, 'message': 'Dec 6 22:13:21 hqnl0246134 sshd[259785]: Failed password for invalid user vagrant from 80.87.33.100 port 37062 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 22:13:23,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '80.87.33.100', 'timestamp': 1670357603.2781234, 'message': 'Dec 6 22:13:21 hqnl0246134 sshd[259785]: Disconnected from invalid user vagrant 80.87.33.100 port 37062 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 22:13:49,234] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:13:49,235] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:13:49,744] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 22:13:49,745] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 22:13:49,746] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 22:14:01,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357641.3445148, 'message': 'Dec 6 22:13:59 hqnl0246134 sshd[259825]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0406 seconds
INFO [2022-12-06 22:14:01,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357641.3454232, 'message': 'Dec 6 22:13:59 hqnl0246134 sshd[259825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 22:14:03,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357643.3447118, 'message': 'Dec 6 22:14:02 hqnl0246134 sshd[259825]: Failed password for root from 61.177.173.18 port 14111 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 22:14:05,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357645.3492408, 'message': 'Dec 6 22:14:04 hqnl0246134 sshd[259825]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 22:14:07,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357647.3527553, 'message': 'Dec 6 22:14:06 hqnl0246134 sshd[259825]: Failed password for root from 61.177.173.18 port 14111 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 22:14:09,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357649.3577456, 'message': 'Dec 6 22:14:08 hqnl0246134 sshd[259825]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
WARNING [2022-12-06 22:14:10,655] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:14:10,681] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0374 seconds
INFO [2022-12-06 22:14:11,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357651.3622236, 'message': 'Dec 6 22:14:10 hqnl0246134 sshd[259825]: Failed password for root from 61.177.173.18 port 14111 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:14:13,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357653.3643003, 'message': 'Dec 6 22:14:12 hqnl0246134 sshd[259837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 22:14:13,543] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:14:13,544] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:14:13,554] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:14:13,584] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0397 seconds
INFO [2022-12-06 22:14:15,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357655.3660722, 'message': 'Dec 6 22:14:14 hqnl0246134 sshd[259837]: Failed password for root from 165.227.166.207 port 33842 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0609 seconds
INFO [2022-12-06 22:14:18,142] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:14:18,142] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:14:18,150] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:14:18,173] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0299 seconds
INFO [2022-12-06 22:14:20,785] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:14:20,785] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:14:20,793] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:14:20,805] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 22:14:47,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357687.462942, 'message': 'Dec 6 22:14:45 hqnl0246134 sshd[259868]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 22:14:47,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357687.463622, 'message': 'Dec 6 22:14:45 hqnl0246134 sshd[259868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 22:14:47,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357687.4637978, 'message': 'Dec 6 22:14:47 hqnl0246134 sshd[259868]: Failed password for root from 61.177.173.18 port 33952 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0246 seconds
WARNING [2022-12-06 22:14:49,242] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:14:49,243] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:14:49,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357689.4651585, 'message': 'Dec 6 22:14:47 hqnl0246134 sshd[259868]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:14:51,502] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357691.4657838, 'message': 'Dec 6 22:14:50 hqnl0246134 sshd[259868]: Failed password for root from 61.177.173.18 port 33952 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 22:14:53,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357693.4763744, 'message': 'Dec 6 22:14:52 hqnl0246134 sshd[259868]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:14:55,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357695.4890506, 'message': 'Dec 6 22:14:54 hqnl0246134 sshd[259868]: Failed password for root from 61.177.173.18 port 33952 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:15:01,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670357701.503732, 'message': 'Dec 6 22:15:00 hqnl0246134 sshd[259885]: Invalid user patrick from 43.157.26.210 port 37538', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1062 seconds
INFO [2022-12-06 22:15:01,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.157.26.210', 'timestamp': 1670357701.5045164, 'message': 'Dec 6 22:15:00 hqnl0246134 sshd[259885]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.157.26.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0539 seconds
INFO [2022-12-06 22:15:01,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.157.26.210', 'timestamp': 1670357701.5047874, 'message': 'Dec 6 22:15:00 hqnl0246134 sshd[259885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0628 seconds
INFO [2022-12-06 22:15:03,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670357703.5051842, 'message': 'Dec 6 22:15:02 hqnl0246134 sshd[259885]: Failed password for invalid user patrick from 43.157.26.210 port 37538 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0706 seconds
INFO [2022-12-06 22:15:03,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670357703.5054457, 'message': 'Dec 6 22:15:03 hqnl0246134 sshd[259885]: Disconnected from invalid user patrick 43.157.26.210 port 37538 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0705 seconds
WARNING [2022-12-06 22:15:10,655] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:15:10,684] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0361 seconds
INFO [2022-12-06 22:15:17,908] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:15:17,908] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:15:17,922] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:15:17,939] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0295 seconds
INFO [2022-12-06 22:15:20,728] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:15:20,729] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:15:20,737] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:15:20,752] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0230 seconds
INFO [2022-12-06 22:15:23,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.80.61', 'timestamp': 1670357723.544185, 'message': 'Dec 6 22:15:22 hqnl0246134 sshd[259929]: Invalid user ts3 from 139.59.80.61 port 50834', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 22:15:23,585] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.80.61', 'timestamp': 1670357723.5444794, 'message': 'Dec 6 22:15:22 hqnl0246134 sshd[259929]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.80.61 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:15:23,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.80.61', 'timestamp': 1670357723.5446155, 'message': 'Dec 6 22:15:22 hqnl0246134 sshd[259929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.61 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 22:15:25,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.80.61', 'timestamp': 1670357725.5491035, 'message': 'Dec 6 22:15:24 hqnl0246134 sshd[259929]: Failed password for invalid user ts3 from 139.59.80.61 port 50834 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 22:15:27,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '139.59.80.61', 'timestamp': 1670357727.5503654, 'message': 'Dec 6 22:15:26 hqnl0246134 sshd[259929]: Disconnected from invalid user ts3 139.59.80.61 port 50834 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0681 seconds
INFO [2022-12-06 22:15:28,781] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:15:28,782] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:15:28,791] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:15:28,802] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 22:15:31,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357731.558421, 'message': 'Dec 6 22:15:30 hqnl0246134 sshd[259944]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 22:15:31,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357731.5587678, 'message': 'Dec 6 22:15:30 hqnl0246134 sshd[259944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:15:33,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357733.5613034, 'message': 'Dec 6 22:15:32 hqnl0246134 sshd[259944]: Failed password for root from 61.177.173.18 port 55507 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:15:33,599] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357733.5616271, 'message': 'Dec 6 22:15:33 hqnl0246134 sshd[259944]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:15:35,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357735.5726566, 'message': 'Dec 6 22:15:35 hqnl0246134 sshd[259944]: Failed password for root from 61.177.173.18 port 55507 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 22:15:37,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357737.579477, 'message': 'Dec 6 22:15:37 hqnl0246134 sshd[259944]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 22:15:39,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357739.585383, 'message': 'Dec 6 22:15:38 hqnl0246134 sshd[259944]: Failed password for root from 61.177.173.18 port 55507 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 22:15:49,246] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:15:49,247] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:15:57,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357757.6809986, 'message': 'Dec 6 22:15:57 hqnl0246134 sshd[259972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0748 seconds
INFO [2022-12-06 22:15:59,693] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357759.6729376, 'message': 'Dec 6 22:15:59 hqnl0246134 sshd[259972]: Failed password for root from 165.227.166.207 port 44108 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 22:16:07,722] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '142.93.145.85', 'timestamp': 1670357767.7024267, 'message': 'Dec 6 22:16:06 hqnl0246134 sshd[259990]: pam_imunify(sshd:auth): [IM360_RBL] The IP 142.93.145.85 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:16:07,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '142.93.145.85', 'timestamp': 1670357767.7027776, 'message': 'Dec 6 22:16:06 hqnl0246134 sshd[259990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.145.85 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:16:09,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '142.93.145.85', 'timestamp': 1670357769.703966, 'message': 'Dec 6 22:16:08 hqnl0246134 sshd[259990]: Failed password for root from 142.93.145.85 port 38510 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0264 seconds
WARNING [2022-12-06 22:16:10,676] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:16:10,699] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0302 seconds
INFO [2022-12-06 22:16:15,783] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357775.7464745, 'message': 'Dec 6 22:16:15 hqnl0246134 sshd[259992]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 22:16:15,819] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357775.746733, 'message': 'Dec 6 22:16:15 hqnl0246134 sshd[259992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 22:16:17,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357777.7480645, 'message': 'Dec 6 22:16:17 hqnl0246134 sshd[259992]: Failed password for root from 61.177.173.18 port 24581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 22:16:17,881] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:16:17,881] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:16:17,891] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:16:17,905] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
INFO [2022-12-06 22:16:19,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357779.749952, 'message': 'Dec 6 22:16:17 hqnl0246134 sshd[259992]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 22:16:19,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357779.7501307, 'message': 'Dec 6 22:16:19 hqnl0246134 sshd[259992]: Failed password for root from 61.177.173.18 port 24581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 22:16:20,588] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:16:20,588] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:16:20,595] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:16:20,606] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 22:16:21,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357781.752764, 'message': 'Dec 6 22:16:20 hqnl0246134 sshd[259992]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:16:23,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357783.75428, 'message': 'Dec 6 22:16:22 hqnl0246134 sshd[259992]: Failed password for root from 61.177.173.18 port 24581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:16:29,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.252.168', 'timestamp': 1670357789.7616072, 'message': 'Dec 6 22:16:28 hqnl0246134 sshd[260013]: Invalid user seedbox from 217.182.252.168 port 60030', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 22:16:29,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.182.252.168', 'timestamp': 1670357789.762152, 'message': 'Dec 6 22:16:29 hqnl0246134 sshd[260013]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.182.252.168 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:16:29,825] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.182.252.168', 'timestamp': 1670357789.7623246, 'message': 'Dec 6 22:16:29 hqnl0246134 sshd[260013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.252.168 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:16:31,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.252.168', 'timestamp': 1670357791.7657075, 'message': 'Dec 6 22:16:30 hqnl0246134 sshd[260013]: Failed password for invalid user seedbox from 217.182.252.168 port 60030 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 22:16:31,819] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.252.168', 'timestamp': 1670357791.7659419, 'message': 'Dec 6 22:16:30 hqnl0246134 sshd[260013]: Disconnected from invalid user seedbox 217.182.252.168 port 60030 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0307 seconds
WARNING [2022-12-06 22:16:49,250] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:16:49,251] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:17:01,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357821.7930272, 'message': 'Dec 6 22:17:00 hqnl0246134 sshd[260038]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 22:17:01,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357821.7937598, 'message': 'Dec 6 22:17:00 hqnl0246134 sshd[260038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 22:17:03,819] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357823.793854, 'message': 'Dec 6 22:17:01 hqnl0246134 sshd[260038]: Failed password for root from 61.177.173.18 port 54640 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 22:17:03,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357823.7940557, 'message': 'Dec 6 22:17:02 hqnl0246134 sshd[260038]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 22:17:05,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357825.796621, 'message': 'Dec 6 22:17:04 hqnl0246134 sshd[260038]: Failed password for root from 61.177.173.18 port 54640 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:17:05,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357825.796832, 'message': 'Dec 6 22:17:05 hqnl0246134 sshd[260038]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:17:07,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357827.7987442, 'message': 'Dec 6 22:17:07 hqnl0246134 sshd[260038]: Failed password for root from 61.177.173.18 port 54640 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 22:17:10,688] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:17:10,711] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0327 seconds
INFO [2022-12-06 22:17:11,810] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:17:11,811] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:17:11,820] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:17:11,831] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 22:17:17,716] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:17:17,716] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:17:17,723] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:17:17,734] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-06 22:17:20,347] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:17:20,347] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:17:20,358] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:17:20,375] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0265 seconds
INFO [2022-12-06 22:17:43,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357863.8370328, 'message': 'Dec 6 22:17:42 hqnl0246134 sshd[260078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 22:17:45,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357865.8398001, 'message': 'Dec 6 22:17:43 hqnl0246134 sshd[260078]: Failed password for root from 165.227.166.207 port 54422 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 22:17:45,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357865.8400378, 'message': 'Dec 6 22:17:45 hqnl0246134 sshd[260080]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 22:17:45,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357865.8402476, 'message': 'Dec 6 22:17:45 hqnl0246134 sshd[260080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:17:47,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357867.8425415, 'message': 'Dec 6 22:17:47 hqnl0246134 sshd[260080]: Failed password for root from 61.177.173.18 port 21600 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-06 22:17:47,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357867.8432775, 'message': 'Dec 6 22:17:47 hqnl0246134 sshd[260080]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
WARNING [2022-12-06 22:17:49,254] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:17:49,255] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:17:51,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357871.8452778, 'message': 'Dec 6 22:17:49 hqnl0246134 sshd[260080]: Failed password for root from 61.177.173.18 port 21600 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:17:53,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357873.847974, 'message': 'Dec 6 22:17:52 hqnl0246134 sshd[260080]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:17:55,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357875.8511593, 'message': 'Dec 6 22:17:54 hqnl0246134 sshd[260080]: Failed password for root from 61.177.173.18 port 21600 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 22:18:10,696] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:18:10,724] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0376 seconds
INFO [2022-12-06 22:18:18,078] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:18:18,078] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:18:18,086] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:18:18,097] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 22:18:20,641] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:18:20,641] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:18:20,649] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:18:20,661] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 22:18:21,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '136.228.161.67', 'timestamp': 1670357901.8857713, 'message': 'Dec 6 22:18:20 hqnl0246134 sshd[260115]: pam_imunify(sshd:auth): [IM360_RBL] The IP 136.228.161.67 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:18:21,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '136.228.161.67', 'timestamp': 1670357901.885995, 'message': 'Dec 6 22:18:20 hqnl0246134 sshd[260115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.161.67 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:18:21,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '136.228.161.67', 'timestamp': 1670357901.8864, 'message': 'Dec 6 22:18:21 hqnl0246134 sshd[260115]: Failed password for root from 136.228.161.67 port 37518 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 22:18:24,695] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:18:24,696] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:18:24,705] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:18:24,717] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-06 22:18:25,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.80.61', 'timestamp': 1670357905.8896205, 'message': 'Dec 6 22:18:23 hqnl0246134 sshd[260123]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.80.61 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 22:18:25,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.80.61', 'timestamp': 1670357905.8897948, 'message': 'Dec 6 22:18:23 hqnl0246134 sshd[260123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.61 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 22:18:27,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.59.80.61', 'timestamp': 1670357907.8904173, 'message': 'Dec 6 22:18:26 hqnl0246134 sshd[260123]: Failed password for root from 139.59.80.61 port 40006 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:18:31,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357911.8980384, 'message': 'Dec 6 22:18:31 hqnl0246134 sshd[260137]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 22:18:31,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357911.8986642, 'message': 'Dec 6 22:18:31 hqnl0246134 sshd[260137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 22:18:33,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357913.899978, 'message': 'Dec 6 22:18:32 hqnl0246134 sshd[260137]: Failed password for root from 61.177.173.18 port 44351 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:18:33,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357913.9002388, 'message': 'Dec 6 22:18:33 hqnl0246134 sshd[260137]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0161 seconds
INFO [2022-12-06 22:18:35,922] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357915.9030035, 'message': 'Dec 6 22:18:35 hqnl0246134 sshd[260137]: Failed password for root from 61.177.173.18 port 44351 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:18:37,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.129.82.220', 'timestamp': 1670357917.9073682, 'message': 'Dec 6 22:18:37 hqnl0246134 sshd[260140]: Invalid user bbs from 125.129.82.220 port 42828', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 22:18:37,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357917.9075787, 'message': 'Dec 6 22:18:37 hqnl0246134 sshd[260137]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 22:18:37,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.129.82.220', 'timestamp': 1670357917.9077532, 'message': 'Dec 6 22:18:37 hqnl0246134 sshd[260140]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.129.82.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:18:37,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.129.82.220', 'timestamp': 1670357917.9078743, 'message': 'Dec 6 22:18:37 hqnl0246134 sshd[260140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.82.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:18:39,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '142.93.145.85', 'timestamp': 1670357919.9104862, 'message': 'Dec 6 22:18:38 hqnl0246134 sshd[260142]: pam_imunify(sshd:auth): [IM360_RBL] The IP 142.93.145.85 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0589 seconds
INFO [2022-12-06 22:18:39,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357919.9111452, 'message': 'Dec 6 22:18:39 hqnl0246134 sshd[260137]: Failed password for root from 61.177.173.18 port 44351 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0587 seconds
INFO [2022-12-06 22:18:39,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.129.82.220', 'timestamp': 1670357919.9113693, 'message': 'Dec 6 22:18:39 hqnl0246134 sshd[260140]: Failed password for invalid user bbs from 125.129.82.220 port 42828 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0582 seconds
INFO [2022-12-06 22:18:39,990] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '142.93.145.85', 'timestamp': 1670357919.9109488, 'message': 'Dec 6 22:18:38 hqnl0246134 sshd[260142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.145.85 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:18:41,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '142.93.145.85', 'timestamp': 1670357921.9137294, 'message': 'Dec 6 22:18:40 hqnl0246134 sshd[260142]: Failed password for root from 142.93.145.85 port 55224 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0488 seconds
INFO [2022-12-06 22:18:41,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.129.82.220', 'timestamp': 1670357921.9141176, 'message': 'Dec 6 22:18:41 hqnl0246134 sshd[260140]: Disconnected from invalid user bbs 125.129.82.220 port 42828 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0493 seconds
WARNING [2022-12-06 22:18:49,257] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:18:49,258] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 22:19:10,707] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:19:10,736] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0431 seconds
INFO [2022-12-06 22:19:17,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357957.9541445, 'message': 'Dec 6 22:19:17 hqnl0246134 sshd[260169]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 22:19:18,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357957.954432, 'message': 'Dec 6 22:19:17 hqnl0246134 sshd[260169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 22:19:19,005] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:19:19,006] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:19:19,014] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:19:19,028] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 22:19:21,545] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:19:21,545] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:19:21,552] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:19:21,564] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 22:19:21,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357961.9610972, 'message': 'Dec 6 22:19:20 hqnl0246134 sshd[260169]: Failed password for root from 61.177.173.18 port 19923 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 22:19:23,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357963.9636414, 'message': 'Dec 6 22:19:22 hqnl0246134 sshd[260169]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:19:25,984] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357965.9658358, 'message': 'Dec 6 22:19:24 hqnl0246134 sshd[260169]: Failed password for root from 61.177.173.18 port 19923 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:19:27,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357967.968676, 'message': 'Dec 6 22:19:26 hqnl0246134 sshd[260169]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 22:19:29,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670357969.9708292, 'message': 'Dec 6 22:19:28 hqnl0246134 sshd[260169]: Failed password for root from 61.177.173.18 port 19923 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 22:19:31,174] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:19:31,174] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:19:31,182] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:19:31,194] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 22:19:32,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357971.9725716, 'message': 'Dec 6 22:19:31 hqnl0246134 sshd[260215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 22:19:33,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670357973.973599, 'message': 'Dec 6 22:19:33 hqnl0246134 sshd[260215]: Failed password for root from 165.227.166.207 port 36484 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:19:48,360] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 22:19:48,426] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 22:19:48,427] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 22:19:48,427] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 22:19:48,427] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 22:19:48,428] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 22:19:48,440] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 22:19:48,457] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0284 seconds
WARNING [2022-12-06 22:19:48,465] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 22:19:48,467] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:19:48,485] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0330 seconds
INFO [2022-12-06 22:19:48,486] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0312 seconds
WARNING [2022-12-06 22:19:49,263] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:19:49,264] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:19:50,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.89.73.6', 'timestamp': 1670357989.9929981, 'message': 'Dec 6 22:19:48 hqnl0246134 sshd[260221]: Invalid user user from 202.89.73.6 port 49516', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 22:19:50,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.89.73.6', 'timestamp': 1670357989.9935102, 'message': 'Dec 6 22:19:48 hqnl0246134 sshd[260221]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.89.73.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 22:19:50,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.89.73.6', 'timestamp': 1670357989.9939277, 'message': 'Dec 6 22:19:48 hqnl0246134 sshd[260221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.89.73.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:19:52,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.89.73.6', 'timestamp': 1670357991.9936204, 'message': 'Dec 6 22:19:50 hqnl0246134 sshd[260221]: Failed password for invalid user user from 202.89.73.6 port 49516 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 22:19:54,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.89.73.6', 'timestamp': 1670357993.9978566, 'message': 'Dec 6 22:19:52 hqnl0246134 sshd[260221]: Disconnected from invalid user user 202.89.73.6 port 49516 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:20:04,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358004.0187602, 'message': 'Dec 6 22:20:03 hqnl0246134 sshd[260251]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 22:20:04,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358004.0194392, 'message': 'Dec 6 22:20:03 hqnl0246134 sshd[260251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 22:20:06,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358006.0215158, 'message': 'Dec 6 22:20:05 hqnl0246134 sshd[260251]: Failed password for root from 61.177.173.18 port 35006 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:20:08,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358008.0228717, 'message': 'Dec 6 22:20:07 hqnl0246134 sshd[260251]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 22:20:10,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358010.02476, 'message': 'Dec 6 22:20:09 hqnl0246134 sshd[260251]: Failed password for root from 61.177.173.18 port 35006 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
WARNING [2022-12-06 22:20:10,706] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:20:10,731] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0344 seconds
INFO [2022-12-06 22:20:12,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358012.0286736, 'message': 'Dec 6 22:20:10 hqnl0246134 sshd[260251]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:20:14,156] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358014.1368585, 'message': 'Dec 6 22:20:12 hqnl0246134 sshd[260251]: Failed password for root from 61.177.173.18 port 35006 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 22:20:18,069] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:20:18,070] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:20:18,077] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:20:18,089] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 22:20:18,553] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 22:20:18,553] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 22:20:18,554] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 22:20:20,630] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:20:20,631] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:20:20,637] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:20:20,649] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-06 22:20:46,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358046.070747, 'message': 'Dec 6 22:20:45 hqnl0246134 sshd[260287]: Invalid user anish from 43.157.26.210 port 33078', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 22:20:46,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358046.0712616, 'message': 'Dec 6 22:20:45 hqnl0246134 sshd[260287]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.157.26.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:20:46,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358046.0715044, 'message': 'Dec 6 22:20:45 hqnl0246134 sshd[260287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:20:48,090] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358048.0731695, 'message': 'Dec 6 22:20:47 hqnl0246134 sshd[260287]: Failed password for invalid user anish from 43.157.26.210 port 33078 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 22:20:49,268] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:20:49,268] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:20:50,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358050.0745394, 'message': 'Dec 6 22:20:48 hqnl0246134 sshd[260287]: Disconnected from invalid user anish 43.157.26.210 port 33078 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 22:20:50,694] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:20:50,695] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:20:50,702] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:20:50,714] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 22:20:52,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358052.0870066, 'message': 'Dec 6 22:20:50 hqnl0246134 sshd[260291]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 22:20:52,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358052.087321, 'message': 'Dec 6 22:20:50 hqnl0246134 sshd[260291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 22:20:54,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358054.0913594, 'message': 'Dec 6 22:20:52 hqnl0246134 sshd[260291]: Failed password for root from 61.177.173.18 port 10232 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:20:54,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358054.0915458, 'message': 'Dec 6 22:20:52 hqnl0246134 sshd[260291]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:20:56,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358056.0943897, 'message': 'Dec 6 22:20:55 hqnl0246134 sshd[260291]: Failed password for root from 61.177.173.18 port 10232 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:20:58,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358058.0980914, 'message': 'Dec 6 22:20:57 hqnl0246134 sshd[260291]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:21:00,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358060.1034925, 'message': 'Dec 6 22:20:58 hqnl0246134 sshd[260291]: Failed password for root from 61.177.173.18 port 10232 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0230 seconds
WARNING [2022-12-06 22:21:10,709] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:21:10,731] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0311 seconds
INFO [2022-12-06 22:21:16,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358076.1403751, 'message': 'Dec 6 22:21:16 hqnl0246134 sshd[260314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 22:21:18,460] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:21:18,460] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:21:18,467] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:21:18,478] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 22:21:20,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358080.1500957, 'message': 'Dec 6 22:21:18 hqnl0246134 sshd[260314]: Failed password for root from 165.227.166.207 port 46744 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 22:21:20,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '142.93.145.85', 'timestamp': 1670358080.1503856, 'message': 'Dec 6 22:21:19 hqnl0246134 sshd[260322]: Invalid user feng from 142.93.145.85 port 43700', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-06 22:21:20,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.93.201.82', 'timestamp': 1670358080.1516516, 'message': 'Dec 6 22:21:20 hqnl0246134 sshd[260324]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.93.201.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-06 22:21:20,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '142.93.145.85', 'timestamp': 1670358080.1514332, 'message': 'Dec 6 22:21:19 hqnl0246134 sshd[260322]: pam_imunify(sshd:auth): [IM360_RBL] The IP 142.93.145.85 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 22:21:20,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.93.201.82', 'timestamp': 1670358080.1517537, 'message': 'Dec 6 22:21:20 hqnl0246134 sshd[260324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.82 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 22:21:20,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '142.93.145.85', 'timestamp': 1670358080.1515405, 'message': 'Dec 6 22:21:19 hqnl0246134 sshd[260322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.145.85 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 22:21:21,026] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:21:21,027] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:21:21,034] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:21:21,044] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-06 22:21:22,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358082.1600761, 'message': 'Dec 6 22:21:21 hqnl0246134 sshd[260329]: Invalid user formation from 217.182.252.168 port 37426', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0419 seconds
INFO [2022-12-06 22:21:22,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '142.93.145.85', 'timestamp': 1670358082.1606994, 'message': 'Dec 6 22:21:21 hqnl0246134 sshd[260322]: Failed password for invalid user feng from 142.93.145.85 port 43700 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-06 22:21:22,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.93.201.82', 'timestamp': 1670358082.1608245, 'message': 'Dec 6 22:21:21 hqnl0246134 sshd[260324]: Failed password for root from 45.93.201.82 port 45416 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-06 22:21:22,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358082.1604085, 'message': 'Dec 6 22:21:21 hqnl0246134 sshd[260329]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.182.252.168 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 22:21:22,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '142.93.145.85', 'timestamp': 1670358082.1609266, 'message': 'Dec 6 22:21:21 hqnl0246134 sshd[260322]: Disconnected from invalid user feng 142.93.145.85 port 43700 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 22:21:22,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358082.160562, 'message': 'Dec 6 22:21:21 hqnl0246134 sshd[260329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.252.168 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:21:24,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358084.1639879, 'message': 'Dec 6 22:21:22 hqnl0246134 sshd[260329]: Failed password for invalid user formation from 217.182.252.168 port 37426 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:21:24,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358084.164289, 'message': 'Dec 6 22:21:23 hqnl0246134 sshd[260329]: Disconnected from invalid user formation 217.182.252.168 port 37426 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 22:21:26,202] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.93.201.82', 'timestamp': 1670358086.169003, 'message': 'Dec 6 22:21:25 hqnl0246134 sshd[260324]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.93.201.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 22:21:28,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.129.82.220', 'timestamp': 1670358088.1750038, 'message': 'Dec 6 22:21:26 hqnl0246134 sshd[260331]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.129.82.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 22:21:28,208] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.93.201.82', 'timestamp': 1670358088.1754386, 'message': 'Dec 6 22:21:27 hqnl0246134 sshd[260324]: Failed password for root from 45.93.201.82 port 45416 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 22:21:28,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.129.82.220', 'timestamp': 1670358088.1752872, 'message': 'Dec 6 22:21:26 hqnl0246134 sshd[260331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.82.220 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:21:30,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '125.129.82.220', 'timestamp': 1670358090.1794004, 'message': 'Dec 6 22:21:28 hqnl0246134 sshd[260331]: Failed password for root from 125.129.82.220 port 54192 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 22:21:34,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.93.201.82', 'timestamp': 1670358094.1883447, 'message': 'Dec 6 22:21:32 hqnl0246134 sshd[260324]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.93.201.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 22:21:34,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.59.80.61', 'timestamp': 1670358094.188756, 'message': 'Dec 6 22:21:33 hqnl0246134 sshd[260341]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.59.80.61 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 22:21:34,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.93.201.82', 'timestamp': 1670358094.1885371, 'message': 'Dec 6 22:21:33 hqnl0246134 sshd[260324]: Failed password for root from 45.93.201.82 port 45416 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 22:21:34,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.59.80.61', 'timestamp': 1670358094.1889093, 'message': 'Dec 6 22:21:33 hqnl0246134 sshd[260341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.61 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 22:21:36,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.59.80.61', 'timestamp': 1670358096.1914446, 'message': 'Dec 6 22:21:35 hqnl0246134 sshd[260341]: Failed password for root from 139.59.80.61 port 57412 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 22:21:38,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358098.193844, 'message': 'Dec 6 22:21:36 hqnl0246134 sshd[260343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:21:38,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358098.1941113, 'message': 'Dec 6 22:21:36 hqnl0246134 sshd[260343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:21:40,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358100.2048838, 'message': 'Dec 6 22:21:39 hqnl0246134 sshd[260343]: Failed password for root from 61.177.173.18 port 35077 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:21:42,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358102.215588, 'message': 'Dec 6 22:21:41 hqnl0246134 sshd[260343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:21:44,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358104.2287693, 'message': 'Dec 6 22:21:43 hqnl0246134 sshd[260343]: Failed password for root from 61.177.173.18 port 35077 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 22:21:46,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358106.2408314, 'message': 'Dec 6 22:21:45 hqnl0246134 sshd[260343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 22:21:48,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358108.2423043, 'message': 'Dec 6 22:21:47 hqnl0246134 sshd[260343]: Failed password for root from 61.177.173.18 port 35077 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
WARNING [2022-12-06 22:21:49,271] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:21:49,272] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 22:21:54,026] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 22:22:10,822] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:22:10,851] defence360agent.internals.the_sink: SensorIncidentList(<20 item(s)>) processed in 0.1456 seconds
INFO [2022-12-06 22:22:17,863] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:22:17,863] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:22:17,870] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:22:17,882] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 22:22:20,378] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:22:20,379] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:22:20,385] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:22:20,396] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 22:22:22,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358142.3100843, 'message': 'Dec 6 22:22:21 hqnl0246134 sshd[260385]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 22:22:22,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358142.31037, 'message': 'Dec 6 22:22:21 hqnl0246134 sshd[260385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:22:24,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358144.311904, 'message': 'Dec 6 22:22:23 hqnl0246134 sshd[260385]: Failed password for root from 61.177.173.18 port 54630 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 22:22:24,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358144.3122506, 'message': 'Dec 6 22:22:23 hqnl0246134 sshd[260385]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 22:22:26,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358146.3141766, 'message': 'Dec 6 22:22:26 hqnl0246134 sshd[260385]: Failed password for root from 61.177.173.18 port 54630 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 22:22:28,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358148.318142, 'message': 'Dec 6 22:22:28 hqnl0246134 sshd[260385]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 22:22:30,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358150.3214922, 'message': 'Dec 6 22:22:30 hqnl0246134 sshd[260385]: Failed password for root from 61.177.173.18 port 54630 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 22:22:33,043] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:22:33,044] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:22:33,056] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:22:33,074] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0284 seconds
INFO [2022-12-06 22:22:36,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '80.87.33.100', 'timestamp': 1670358156.3285675, 'message': 'Dec 6 22:22:34 hqnl0246134 sshd[260419]: pam_imunify(sshd:auth): [IM360_RBL] The IP 80.87.33.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 22:22:36,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '80.87.33.100', 'timestamp': 1670358156.3289, 'message': 'Dec 6 22:22:34 hqnl0246134 sshd[260419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.87.33.100 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:22:36,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '80.87.33.100', 'timestamp': 1670358156.3290706, 'message': 'Dec 6 22:22:36 hqnl0246134 sshd[260419]: Failed password for root from 80.87.33.100 port 36142 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
WARNING [2022-12-06 22:22:49,277] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:22:49,279] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:23:06,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358186.3605676, 'message': 'Dec 6 22:23:04 hqnl0246134 sshd[260448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 22:23:06,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358186.3610246, 'message': 'Dec 6 22:23:06 hqnl0246134 sshd[260448]: Failed password for root from 165.227.166.207 port 57044 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 22:23:08,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358188.3626623, 'message': 'Dec 6 22:23:07 hqnl0246134 sshd[260450]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 22:23:08,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358188.3628457, 'message': 'Dec 6 22:23:07 hqnl0246134 sshd[260450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 22:23:10,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358190.3645613, 'message': 'Dec 6 22:23:09 hqnl0246134 sshd[260450]: Failed password for root from 61.177.173.18 port 31482 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 22:23:10,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358190.3647382, 'message': 'Dec 6 22:23:09 hqnl0246134 sshd[260450]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
WARNING [2022-12-06 22:23:10,716] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:23:10,752] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0446 seconds
INFO [2022-12-06 22:23:12,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358192.366616, 'message': 'Dec 6 22:23:12 hqnl0246134 sshd[260450]: Failed password for root from 61.177.173.18 port 31482 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:23:14,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.89.73.6', 'timestamp': 1670358194.3711615, 'message': 'Dec 6 22:23:13 hqnl0246134 sshd[260455]: Invalid user tams from 202.89.73.6 port 35676', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 22:23:14,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358194.3713706, 'message': 'Dec 6 22:23:14 hqnl0246134 sshd[260450]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 22:23:14,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.89.73.6', 'timestamp': 1670358194.3715098, 'message': 'Dec 6 22:23:14 hqnl0246134 sshd[260455]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.89.73.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:23:14,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.89.73.6', 'timestamp': 1670358194.3716178, 'message': 'Dec 6 22:23:14 hqnl0246134 sshd[260455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.89.73.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 22:23:16,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358196.373589, 'message': 'Dec 6 22:23:15 hqnl0246134 sshd[260450]: Failed password for root from 61.177.173.18 port 31482 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 22:23:16,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.89.73.6', 'timestamp': 1670358196.3737853, 'message': 'Dec 6 22:23:16 hqnl0246134 sshd[260455]: Failed password for invalid user tams from 202.89.73.6 port 35676 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 22:23:17,866] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:23:17,867] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:23:17,875] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:23:17,886] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 22:23:18,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.89.73.6', 'timestamp': 1670358198.3765755, 'message': 'Dec 6 22:23:16 hqnl0246134 sshd[260455]: Disconnected from invalid user tams 202.89.73.6 port 35676 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:23:20,502] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:23:20,502] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:23:20,519] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:23:20,531] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0279 seconds
INFO [2022-12-06 22:23:22,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358202.3848493, 'message': 'Dec 6 22:23:21 hqnl0246134 sshd[260467]: Invalid user wkiconsole from 43.157.26.210 port 50788', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:23:22,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358202.385121, 'message': 'Dec 6 22:23:21 hqnl0246134 sshd[260467]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.157.26.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:23:22,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358202.3852599, 'message': 'Dec 6 22:23:21 hqnl0246134 sshd[260467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:23:24,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358204.3919103, 'message': 'Dec 6 22:23:24 hqnl0246134 sshd[260467]: Failed password for invalid user wkiconsole from 43.157.26.210 port 50788 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 22:23:26,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358206.3979883, 'message': 'Dec 6 22:23:24 hqnl0246134 sshd[260467]: Disconnected from invalid user wkiconsole 43.157.26.210 port 50788 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0350 seconds
WARNING [2022-12-06 22:23:49,282] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:23:49,284] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:23:54,511] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358234.4823124, 'message': 'Dec 6 22:23:53 hqnl0246134 sshd[260479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 22:23:54,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358234.4830844, 'message': 'Dec 6 22:23:53 hqnl0246134 sshd[260479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:23:56,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358236.4853108, 'message': 'Dec 6 22:23:55 hqnl0246134 sshd[260479]: Failed password for root from 61.177.173.18 port 51677 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:23:58,511] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358238.4926627, 'message': 'Dec 6 22:23:57 hqnl0246134 sshd[260479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:24:00,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358240.498453, 'message': 'Dec 6 22:23:59 hqnl0246134 sshd[260479]: Failed password for root from 61.177.173.18 port 51677 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 22:24:00,537] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358240.4987652, 'message': 'Dec 6 22:23:59 hqnl0246134 sshd[260479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:24:02,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358242.5011199, 'message': 'Dec 6 22:24:01 hqnl0246134 sshd[260479]: Failed password for root from 61.177.173.18 port 51677 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0360 seconds
INFO [2022-12-06 22:24:02,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358242.501398, 'message': 'Dec 6 22:24:02 hqnl0246134 sshd[260502]: Invalid user admin from 217.182.252.168 port 59760', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0360 seconds
INFO [2022-12-06 22:24:02,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358242.5015683, 'message': 'Dec 6 22:24:02 hqnl0246134 sshd[260502]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.182.252.168 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:24:02,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358242.501724, 'message': 'Dec 6 22:24:02 hqnl0246134 sshd[260502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.252.168 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:24:04,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.129.82.220', 'timestamp': 1670358244.502499, 'message': 'Dec 6 22:24:03 hqnl0246134 sshd[260498]: Invalid user user from 125.129.82.220 port 37286', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 22:24:04,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358244.5029197, 'message': 'Dec 6 22:24:04 hqnl0246134 sshd[260502]: Failed password for invalid user admin from 217.182.252.168 port 59760 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0489 seconds
INFO [2022-12-06 22:24:04,607] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '125.129.82.220', 'timestamp': 1670358244.502692, 'message': 'Dec 6 22:24:03 hqnl0246134 sshd[260498]: pam_imunify(sshd:auth): [IM360_RBL] The IP 125.129.82.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0551 seconds
INFO [2022-12-06 22:24:04,608] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358244.5030525, 'message': 'Dec 6 22:24:04 hqnl0246134 sshd[260502]: Disconnected from invalid user admin 217.182.252.168 port 59760 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0542 seconds
INFO [2022-12-06 22:24:04,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '125.129.82.220', 'timestamp': 1670358244.5028136, 'message': 'Dec 6 22:24:03 hqnl0246134 sshd[260498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.82.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-06 22:24:04,955] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:24:04,956] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:24:04,964] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:24:04,983] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0256 seconds
INFO [2022-12-06 22:24:06,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.129.82.220', 'timestamp': 1670358246.505954, 'message': 'Dec 6 22:24:05 hqnl0246134 sshd[260498]: Failed password for invalid user user from 125.129.82.220 port 37286 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:24:08,537] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '125.129.82.220', 'timestamp': 1670358248.5184562, 'message': 'Dec 6 22:24:07 hqnl0246134 sshd[260498]: Disconnected from invalid user user 125.129.82.220 port 37286 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-06 22:24:10,724] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:24:10,760] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0489 seconds
INFO [2022-12-06 22:24:17,872] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:24:17,873] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:24:17,883] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:24:17,896] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
INFO [2022-12-06 22:24:20,439] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:24:20,439] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:24:20,447] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:24:20,458] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 22:24:32,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358272.5961926, 'message': 'Dec 6 22:24:32 hqnl0246134 sshd[260538]: Invalid user master from 136.228.161.67 port 41064', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 22:24:32,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358272.5966837, 'message': 'Dec 6 22:24:32 hqnl0246134 sshd[260538]: pam_imunify(sshd:auth): [IM360_RBL] The IP 136.228.161.67 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:24:32,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358272.596861, 'message': 'Dec 6 22:24:32 hqnl0246134 sshd[260538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.161.67 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 22:24:34,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358274.5982196, 'message': 'Dec 6 22:24:33 hqnl0246134 sshd[260538]: Failed password for invalid user master from 136.228.161.67 port 41064 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 22:24:34,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358274.5986092, 'message': 'Dec 6 22:24:34 hqnl0246134 sshd[260538]: Disconnected from invalid user master 136.228.161.67 port 41064 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 22:24:40,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358280.6085443, 'message': 'Dec 6 22:24:39 hqnl0246134 sshd[260542]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 22:24:40,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358280.60897, 'message': 'Dec 6 22:24:39 hqnl0246134 sshd[260542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:24:42,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358282.613819, 'message': 'Dec 6 22:24:41 hqnl0246134 sshd[260542]: Failed password for root from 61.177.173.18 port 18903 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 22:24:42,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358282.6141937, 'message': 'Dec 6 22:24:42 hqnl0246134 sshd[260542]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:24:44,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358284.623174, 'message': 'Dec 6 22:24:44 hqnl0246134 sshd[260542]: Failed password for root from 61.177.173.18 port 18903 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 22:24:46,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358286.6308432, 'message': 'Dec 6 22:24:46 hqnl0246134 sshd[260542]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 22:24:48,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358288.6411483, 'message': 'Dec 6 22:24:48 hqnl0246134 sshd[260542]: Failed password for root from 61.177.173.18 port 18903 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-06 22:24:49,288] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:24:49,289] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:24:54,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358294.6621997, 'message': 'Dec 6 22:24:53 hqnl0246134 sshd[260545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 22:24:56,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358296.6655488, 'message': 'Dec 6 22:24:55 hqnl0246134 sshd[260545]: Failed password for root from 165.227.166.207 port 39110 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0257 seconds
WARNING [2022-12-06 22:25:10,727] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:25:10,750] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0334 seconds
INFO [2022-12-06 22:25:18,003] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:25:18,004] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:25:18,011] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:25:18,022] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 22:25:20,818] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:25:20,818] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:25:20,830] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:25:20,847] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0274 seconds
INFO [2022-12-06 22:25:26,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358326.7104604, 'message': 'Dec 6 22:25:26 hqnl0246134 sshd[260602]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 22:25:26,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358326.7107787, 'message': 'Dec 6 22:25:26 hqnl0246134 sshd[260602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:25:28,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358328.7132063, 'message': 'Dec 6 22:25:28 hqnl0246134 sshd[260602]: Failed password for root from 61.177.173.18 port 39704 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 22:25:30,740] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358330.7194638, 'message': 'Dec 6 22:25:28 hqnl0246134 sshd[260602]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 22:25:32,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358332.7231295, 'message': 'Dec 6 22:25:31 hqnl0246134 sshd[260602]: Failed password for root from 61.177.173.18 port 39704 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 22:25:34,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358334.7280517, 'message': 'Dec 6 22:25:33 hqnl0246134 sshd[260602]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 22:25:36,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358336.7298179, 'message': 'Dec 6 22:25:35 hqnl0246134 sshd[260602]: Failed password for root from 61.177.173.18 port 39704 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 22:25:38,087] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:25:38,088] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:25:38,096] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:25:38,108] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 22:25:40,628] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 22:25:41,344] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 22:25:41,345] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 22:25:41,345] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 22:25:41,345] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 22:25:41,346] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 22:25:41,356] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 22:25:41,371] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0246 seconds
WARNING [2022-12-06 22:25:41,378] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 22:25:41,380] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:25:41,397] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0317 seconds
INFO [2022-12-06 22:25:41,399] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0302 seconds
WARNING [2022-12-06 22:25:49,293] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:25:49,294] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:26:00,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358360.756216, 'message': 'Dec 6 22:25:59 hqnl0246134 sshd[260629]: Invalid user gary from 43.157.26.210 port 40280', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 22:26:00,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358360.7567847, 'message': 'Dec 6 22:26:00 hqnl0246134 sshd[260629]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.157.26.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 22:26:00,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358360.7570348, 'message': 'Dec 6 22:26:00 hqnl0246134 sshd[260629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:26:04,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358364.7619135, 'message': 'Dec 6 22:26:02 hqnl0246134 sshd[260629]: Failed password for invalid user gary from 43.157.26.210 port 40280 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:26:04,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670358364.7621112, 'message': 'Dec 6 22:26:03 hqnl0246134 sshd[260629]: Disconnected from invalid user gary 43.157.26.210 port 40280 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 22:26:10,736] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:26:10,777] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0572 seconds
INFO [2022-12-06 22:26:12,224] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 22:26:12,224] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 22:26:12,225] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 22:26:14,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358374.771234, 'message': 'Dec 6 22:26:12 hqnl0246134 sshd[260649]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:26:14,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358374.7714524, 'message': 'Dec 6 22:26:12 hqnl0246134 sshd[260649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:26:16,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358376.7730381, 'message': 'Dec 6 22:26:15 hqnl0246134 sshd[260649]: Failed password for root from 61.177.173.18 port 55037 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:26:18,189] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:26:18,190] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:26:18,200] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:26:18,211] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 22:26:18,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358378.7757826, 'message': 'Dec 6 22:26:17 hqnl0246134 sshd[260649]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:26:20,861] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:26:20,862] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:26:20,879] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:26:20,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358380.7806766, 'message': 'Dec 6 22:26:19 hqnl0246134 sshd[260649]: Failed password for root from 61.177.173.18 port 55037 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.1112 seconds
INFO [2022-12-06 22:26:20,898] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0292 seconds
INFO [2022-12-06 22:26:22,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358382.7808454, 'message': 'Dec 6 22:26:21 hqnl0246134 sshd[260649]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 22:26:24,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358384.7844849, 'message': 'Dec 6 22:26:23 hqnl0246134 sshd[260649]: Failed password for root from 61.177.173.18 port 55037 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 22:26:34,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.89.73.6', 'timestamp': 1670358394.7970808, 'message': 'Dec 6 22:26:34 hqnl0246134 sshd[260699]: Invalid user oscar from 202.89.73.6 port 50022', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 22:26:34,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.89.73.6', 'timestamp': 1670358394.7976441, 'message': 'Dec 6 22:26:34 hqnl0246134 sshd[260699]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.89.73.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0607 seconds
INFO [2022-12-06 22:26:34,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.89.73.6', 'timestamp': 1670358394.7978039, 'message': 'Dec 6 22:26:34 hqnl0246134 sshd[260699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.89.73.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0651 seconds
INFO [2022-12-06 22:26:36,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.89.73.6', 'timestamp': 1670358396.7975473, 'message': 'Dec 6 22:26:36 hqnl0246134 sshd[260699]: Failed password for invalid user oscar from 202.89.73.6 port 50022 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 22:26:38,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358398.8004358, 'message': 'Dec 6 22:26:37 hqnl0246134 sshd[260703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 22:26:38,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.89.73.6', 'timestamp': 1670358398.800754, 'message': 'Dec 6 22:26:38 hqnl0246134 sshd[260699]: Disconnected from invalid user oscar 202.89.73.6 port 50022 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 22:26:40,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358400.8019688, 'message': 'Dec 6 22:26:39 hqnl0246134 sshd[260703]: Failed password for root from 165.227.166.207 port 49406 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:26:40,990] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:26:40,990] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:26:41,000] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:26:41,013] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 22:26:46,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358406.8168323, 'message': 'Dec 6 22:26:45 hqnl0246134 sshd[260711]: Invalid user test from 217.182.252.168 port 52408', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:26:46,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358406.817103, 'message': 'Dec 6 22:26:45 hqnl0246134 sshd[260711]: pam_imunify(sshd:auth): [IM360_RBL] The IP 217.182.252.168 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:26:46,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358406.8172734, 'message': 'Dec 6 22:26:45 hqnl0246134 sshd[260711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.252.168 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0160 seconds
INFO [2022-12-06 22:26:48,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358408.826485, 'message': 'Dec 6 22:26:48 hqnl0246134 sshd[260711]: Failed password for invalid user test from 217.182.252.168 port 52408 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
WARNING [2022-12-06 22:26:49,297] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:26:49,298] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:26:50,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '217.182.252.168', 'timestamp': 1670358410.82923, 'message': 'Dec 6 22:26:50 hqnl0246134 sshd[260711]: Disconnected from invalid user test 217.182.252.168 port 52408 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:27:00,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358420.8443863, 'message': 'Dec 6 22:26:59 hqnl0246134 sshd[260719]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-06 22:27:00,888] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358420.8447726, 'message': 'Dec 6 22:26:59 hqnl0246134 sshd[260719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:27:02,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358422.8489316, 'message': 'Dec 6 22:27:01 hqnl0246134 sshd[260719]: Failed password for root from 61.177.173.18 port 23593 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:27:04,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358424.8530006, 'message': 'Dec 6 22:27:04 hqnl0246134 sshd[260719]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 22:27:06,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358426.8554392, 'message': 'Dec 6 22:27:06 hqnl0246134 sshd[260719]: Failed password for root from 61.177.173.18 port 23593 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 22:27:08,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358428.8583653, 'message': 'Dec 6 22:27:08 hqnl0246134 sshd[260719]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 22:27:10,731] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:27:10,755] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0317 seconds
INFO [2022-12-06 22:27:10,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358430.863755, 'message': 'Dec 6 22:27:10 hqnl0246134 sshd[260719]: Failed password for root from 61.177.173.18 port 23593 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:27:18,076] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:27:18,077] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:27:18,084] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:27:18,095] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 22:27:20,761] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:27:20,762] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:27:20,770] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:27:20,782] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 22:27:46,967] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358466.9427688, 'message': 'Dec 6 22:27:45 hqnl0246134 sshd[260769]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 22:27:46,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358466.9434485, 'message': 'Dec 6 22:27:45 hqnl0246134 sshd[260769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:27:47,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358466.943654, 'message': 'Dec 6 22:27:46 hqnl0246134 sshd[260769]: Failed password for root from 61.177.173.18 port 44878 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 22:27:48,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358468.9430254, 'message': 'Dec 6 22:27:47 hqnl0246134 sshd[260769]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
WARNING [2022-12-06 22:27:49,303] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:27:49,304] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:27:50,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358470.947112, 'message': 'Dec 6 22:27:49 hqnl0246134 sshd[260769]: Failed password for root from 61.177.173.18 port 44878 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:27:52,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358472.9523568, 'message': 'Dec 6 22:27:51 hqnl0246134 sshd[260769]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 22:27:54,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358474.9596996, 'message': 'Dec 6 22:27:54 hqnl0246134 sshd[260769]: Failed password for root from 61.177.173.18 port 44878 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 22:27:58,821] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:27:58,822] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:27:58,832] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:27:58,846] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0234 seconds
WARNING [2022-12-06 22:28:10,743] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:28:10,774] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0472 seconds
INFO [2022-12-06 22:28:13,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '176.31.46.230', 'timestamp': 1670358492.9871964, 'message': 'Dec 6 22:28:12 hqnl0246134 sshd[260797]: Invalid user admin from 176.31.46.230 port 49944', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:28:13,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '176.31.46.230', 'timestamp': 1670358492.987461, 'message': 'Dec 6 22:28:12 hqnl0246134 sshd[260797]: pam_imunify(sshd:auth): [IM360_RBL] The IP 176.31.46.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:28:13,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '176.31.46.230', 'timestamp': 1670358492.9875948, 'message': 'Dec 6 22:28:12 hqnl0246134 sshd[260797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.46.230 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:28:15,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358494.9881027, 'message': 'Dec 6 22:28:14 hqnl0246134 sshd[260795]: Invalid user postgres from 136.228.161.67 port 50290', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 22:28:15,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '176.31.46.230', 'timestamp': 1670358494.9886975, 'message': 'Dec 6 22:28:14 hqnl0246134 sshd[260797]: Failed password for invalid user admin from 176.31.46.230 port 49944 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 22:28:15,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358494.988391, 'message': 'Dec 6 22:28:14 hqnl0246134 sshd[260795]: pam_imunify(sshd:auth): [IM360_RBL] The IP 136.228.161.67 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 22:28:15,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358494.9885547, 'message': 'Dec 6 22:28:14 hqnl0246134 sshd[260795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.161.67 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 22:28:17,037] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '176.31.46.230', 'timestamp': 1670358496.9899359, 'message': 'Dec 6 22:28:16 hqnl0246134 sshd[260797]: Disconnected from invalid user admin 176.31.46.230 port 49944 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0472 seconds
INFO [2022-12-06 22:28:17,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358496.9902382, 'message': 'Dec 6 22:28:16 hqnl0246134 sshd[260795]: Failed password for invalid user postgres from 136.228.161.67 port 50290 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 22:28:17,907] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:28:17,907] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:28:17,914] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:28:17,925] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-06 22:28:19,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358498.992683, 'message': 'Dec 6 22:28:18 hqnl0246134 sshd[260795]: Disconnected from invalid user postgres 136.228.161.67 port 50290 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 22:28:20,521] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:28:20,521] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:28:20,528] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:28:20,539] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 22:28:21,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358500.995584, 'message': 'Dec 6 22:28:19 hqnl0246134 sshd[260808]: Invalid user zhangjie from 37.232.43.250 port 63643', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 22:28:21,035] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358500.9958653, 'message': 'Dec 6 22:28:19 hqnl0246134 sshd[260808]: pam_imunify(sshd:auth): [IM360_RBL] The IP 37.232.43.250 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:28:21,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358500.9960501, 'message': 'Dec 6 22:28:19 hqnl0246134 sshd[260808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.232.43.250 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:28:23,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358502.9979136, 'message': 'Dec 6 22:28:21 hqnl0246134 sshd[260808]: Failed password for invalid user zhangjie from 37.232.43.250 port 63643 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:28:23,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358502.9980936, 'message': 'Dec 6 22:28:22 hqnl0246134 sshd[260808]: Disconnected from invalid user zhangjie 37.232.43.250 port 63643 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 22:28:25,019] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358505.0001066, 'message': 'Dec 6 22:28:24 hqnl0246134 sshd[260813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:28:27,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358507.0019035, 'message': 'Dec 6 22:28:26 hqnl0246134 sshd[260813]: Failed password for root from 165.227.166.207 port 59686 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 22:28:31,027] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358511.0053127, 'message': 'Dec 6 22:28:29 hqnl0246134 sshd[260819]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 22:28:31,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358511.0056715, 'message': 'Dec 6 22:28:29 hqnl0246134 sshd[260819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:28:33,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358513.0143979, 'message': 'Dec 6 22:28:31 hqnl0246134 sshd[260819]: Failed password for root from 61.177.173.18 port 60735 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:28:35,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358515.0240755, 'message': 'Dec 6 22:28:33 hqnl0246134 sshd[260819]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 22:28:37,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358517.025164, 'message': 'Dec 6 22:28:35 hqnl0246134 sshd[260819]: Failed password for root from 61.177.173.18 port 60735 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:28:37,064] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358517.0253897, 'message': 'Dec 6 22:28:36 hqnl0246134 sshd[260819]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 22:28:39,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358519.0358465, 'message': 'Dec 6 22:28:38 hqnl0246134 sshd[260819]: Failed password for root from 61.177.173.18 port 60735 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
WARNING [2022-12-06 22:28:49,312] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:28:49,314] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 22:29:10,745] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:29:10,783] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0509 seconds
INFO [2022-12-06 22:29:11,704] defence360agent.files: Updating all files
INFO [2022-12-06 22:29:12,048] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 22:29:12,049] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 22:29:12,392] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 22:29:12,393] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 22:29:12,712] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 22:29:12,713] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 22:29:13,058] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 22:29:13,058] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 22:29:13,059] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 22:29:13,376] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 20:29:13 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4E411B9C0CBB'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 22:29:13,377] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 22:29:13,378] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 22:29:14,339] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 22:29:14,339] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 22:29:14,657] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 22:29:14,658] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 22:29:14,984] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 22:29:14,985] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 22:29:15,153] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358555.1340487, 'message': 'Dec 6 22:29:13 hqnl0246134 sshd[260853]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:29:15,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358555.1343126, 'message': 'Dec 6 22:29:13 hqnl0246134 sshd[260853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 22:29:15,377] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 22:29:15,378] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 22:29:15,841] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 22:29:15,843] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 22:29:17,153] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358557.1340797, 'message': 'Dec 6 22:29:15 hqnl0246134 sshd[260853]: Failed password for root from 61.177.173.18 port 28113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:29:17,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358557.1343088, 'message': 'Dec 6 22:29:16 hqnl0246134 sshd[260853]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:29:18,041] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:29:18,042] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:29:18,049] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:29:18,061] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 22:29:19,158] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358559.1368887, 'message': 'Dec 6 22:29:18 hqnl0246134 sshd[260853]: Failed password for root from 61.177.173.18 port 28113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 22:29:19,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358559.14489, 'message': 'Dec 6 22:29:18 hqnl0246134 sshd[260853]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:29:20,679] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:29:20,680] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:29:20,687] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:29:20,698] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 22:29:21,161] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358561.1434386, 'message': 'Dec 6 22:29:20 hqnl0246134 sshd[260853]: Failed password for root from 61.177.173.18 port 28113 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:29:25,360] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:29:25,361] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:29:25,372] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:29:25,389] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0275 seconds
WARNING [2022-12-06 22:29:49,322] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:29:49,324] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:30:01,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358601.19862, 'message': 'Dec 6 22:30:00 hqnl0246134 sshd[260886]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 22:30:01,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358601.1993878, 'message': 'Dec 6 22:30:00 hqnl0246134 sshd[260886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:30:03,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358603.2030113, 'message': 'Dec 6 22:30:02 hqnl0246134 sshd[260886]: Failed password for root from 61.177.173.18 port 62094 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0389 seconds
INFO [2022-12-06 22:30:05,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358605.2010257, 'message': 'Dec 6 22:30:04 hqnl0246134 sshd[260886]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:30:07,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358607.202079, 'message': 'Dec 6 22:30:06 hqnl0246134 sshd[260886]: Failed password for root from 61.177.173.18 port 62094 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0597 seconds
INFO [2022-12-06 22:30:07,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358607.2160354, 'message': 'Dec 6 22:30:06 hqnl0246134 sshd[260886]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0487 seconds
INFO [2022-12-06 22:30:09,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358609.2039406, 'message': 'Dec 6 22:30:09 hqnl0246134 sshd[260886]: Failed password for root from 61.177.173.18 port 62094 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 22:30:10,745] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:30:10,765] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0302 seconds
INFO [2022-12-06 22:30:17,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358617.2156215, 'message': 'Dec 6 22:30:15 hqnl0246134 sshd[260948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 22:30:17,946] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:30:17,946] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:30:17,953] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:30:17,965] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 22:30:19,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358619.223182, 'message': 'Dec 6 22:30:17 hqnl0246134 sshd[260948]: Failed password for root from 165.227.166.207 port 41744 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:30:20,661] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:30:20,661] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:30:20,672] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:30:20,694] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0316 seconds
INFO [2022-12-06 22:30:41,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.68.27', 'timestamp': 1670358641.258418, 'message': 'Dec 6 22:30:39 hqnl0246134 sshd[260972]: Invalid user john from 43.153.68.27 port 37766', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 22:30:41,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.68.27', 'timestamp': 1670358641.2587852, 'message': 'Dec 6 22:30:39 hqnl0246134 sshd[260972]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.68.27 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:30:41,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.68.27', 'timestamp': 1670358641.2589467, 'message': 'Dec 6 22:30:39 hqnl0246134 sshd[260972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.68.27 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 22:30:43,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.68.27', 'timestamp': 1670358643.2607734, 'message': 'Dec 6 22:30:41 hqnl0246134 sshd[260972]: Failed password for invalid user john from 43.153.68.27 port 37766 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 22:30:45,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.68.27', 'timestamp': 1670358645.2631423, 'message': 'Dec 6 22:30:43 hqnl0246134 sshd[260972]: Disconnected from invalid user john 43.153.68.27 port 37766 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 22:30:45,891] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:30:45,891] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:30:45,898] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:30:45,909] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-06 22:30:47,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358647.2653704, 'message': 'Dec 6 22:30:45 hqnl0246134 sshd[260976]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:30:47,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358647.2656326, 'message': 'Dec 6 22:30:45 hqnl0246134 sshd[260976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:30:47,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358647.2657762, 'message': 'Dec 6 22:30:47 hqnl0246134 sshd[260976]: Failed password for root from 61.177.173.18 port 27740 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 22:30:49,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358649.270663, 'message': 'Dec 6 22:30:47 hqnl0246134 sshd[260976]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0306 seconds
WARNING [2022-12-06 22:30:49,327] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:30:49,327] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:30:51,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358651.272701, 'message': 'Dec 6 22:30:49 hqnl0246134 sshd[260976]: Failed password for root from 61.177.173.18 port 27740 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 22:30:53,295] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358653.275599, 'message': 'Dec 6 22:30:51 hqnl0246134 sshd[260976]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:30:55,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358655.2783606, 'message': 'Dec 6 22:30:54 hqnl0246134 sshd[260976]: Failed password for root from 61.177.173.18 port 27740 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0340 seconds
WARNING [2022-12-06 22:31:10,753] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:31:10,779] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0390 seconds
INFO [2022-12-06 22:31:18,042] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:31:18,042] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:31:18,052] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:31:18,065] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-06 22:31:20,638] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:31:20,639] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:31:20,645] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:31:20,658] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 22:31:33,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358693.3421235, 'message': 'Dec 6 22:31:32 hqnl0246134 sshd[261023]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 22:31:33,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358693.3425133, 'message': 'Dec 6 22:31:32 hqnl0246134 sshd[261023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:31:35,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358695.3447413, 'message': 'Dec 6 22:31:34 hqnl0246134 sshd[261023]: Failed password for root from 61.177.173.18 port 11570 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 22:31:35,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358695.3450148, 'message': 'Dec 6 22:31:34 hqnl0246134 sshd[261023]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 22:31:37,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358697.3470938, 'message': 'Dec 6 22:31:36 hqnl0246134 sshd[261023]: Failed password for root from 61.177.173.18 port 11570 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:31:37,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358697.3473632, 'message': 'Dec 6 22:31:36 hqnl0246134 sshd[261023]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 22:31:39,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358699.3498328, 'message': 'Dec 6 22:31:39 hqnl0246134 sshd[261023]: Failed password for root from 61.177.173.18 port 11570 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:31:41,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358701.350386, 'message': 'Dec 6 22:31:39 hqnl0246134 sshd[261028]: Invalid user ian from 136.228.161.67 port 59410', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 22:31:41,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358701.3506472, 'message': 'Dec 6 22:31:39 hqnl0246134 sshd[261028]: pam_imunify(sshd:auth): [IM360_RBL] The IP 136.228.161.67 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-06 22:31:41,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358701.350803, 'message': 'Dec 6 22:31:39 hqnl0246134 sshd[261028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.161.67 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 22:31:43,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358703.3537586, 'message': 'Dec 6 22:31:41 hqnl0246134 sshd[261028]: Failed password for invalid user ian from 136.228.161.67 port 59410 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:31:43,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '136.228.161.67', 'timestamp': 1670358703.3539474, 'message': 'Dec 6 22:31:42 hqnl0246134 sshd[261028]: Disconnected from invalid user ian 136.228.161.67 port 59410 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 22:31:49,331] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:31:49,333] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:31:51,400] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 22:31:51,468] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 22:31:51,469] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 22:31:51,469] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 22:31:51,469] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 22:31:51,470] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 22:31:51,480] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 22:31:51,496] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0252 seconds
WARNING [2022-12-06 22:31:51,504] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 22:31:51,506] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:31:51,522] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0322 seconds
INFO [2022-12-06 22:31:51,524] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0302 seconds
WARNING [2022-12-06 22:31:54,030] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 22:32:09,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358729.395142, 'message': 'Dec 6 22:32:08 hqnl0246134 sshd[261057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0261 seconds
WARNING [2022-12-06 22:32:10,751] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:32:10,773] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0294 seconds
INFO [2022-12-06 22:32:11,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358731.3937142, 'message': 'Dec 6 22:32:10 hqnl0246134 sshd[261057]: Failed password for root from 165.227.166.207 port 52054 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:32:15,185] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:32:15,185] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:32:15,195] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:32:15,214] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0284 seconds
INFO [2022-12-06 22:32:17,903] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:32:17,903] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:32:17,912] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:32:17,923] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 22:32:19,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358739.4033537, 'message': 'Dec 6 22:32:17 hqnl0246134 sshd[261070]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0573 seconds
INFO [2022-12-06 22:32:19,530] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358739.4036307, 'message': 'Dec 6 22:32:17 hqnl0246134 sshd[261070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0679 seconds
INFO [2022-12-06 22:32:21,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358741.4053571, 'message': 'Dec 6 22:32:20 hqnl0246134 sshd[261070]: Failed password for root from 61.177.173.18 port 21933 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 22:32:21,595] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 22:32:21,595] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 22:32:21,596] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 22:32:23,202] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:32:23,203] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:32:23,211] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:32:23,223] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 22:32:23,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358743.407392, 'message': 'Dec 6 22:32:22 hqnl0246134 sshd[261070]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 22:32:25,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358745.4134011, 'message': 'Dec 6 22:32:24 hqnl0246134 sshd[261070]: Failed password for root from 61.177.173.18 port 21933 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:32:27,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358747.4181376, 'message': 'Dec 6 22:32:26 hqnl0246134 sshd[261070]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 22:32:29,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358749.421671, 'message': 'Dec 6 22:32:28 hqnl0246134 sshd[261070]: Failed password for root from 61.177.173.18 port 21933 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0256 seconds
WARNING [2022-12-06 22:32:49,335] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:32:49,336] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:33:07,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358787.5032077, 'message': 'Dec 6 22:33:05 hqnl0246134 sshd[261110]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 22:33:07,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358787.5035865, 'message': 'Dec 6 22:33:05 hqnl0246134 sshd[261110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:33:09,530] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358789.5118365, 'message': 'Dec 6 22:33:07 hqnl0246134 sshd[261110]: Failed password for root from 61.177.173.18 port 50538 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 22:33:10,752] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:33:10,770] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0241 seconds
INFO [2022-12-06 22:33:11,533] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358791.5145779, 'message': 'Dec 6 22:33:10 hqnl0246134 sshd[261110]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:33:13,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358793.5241606, 'message': 'Dec 6 22:33:12 hqnl0246134 sshd[261110]: Failed password for root from 61.177.173.18 port 50538 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:33:15,546] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358795.5261297, 'message': 'Dec 6 22:33:14 hqnl0246134 sshd[261110]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 22:33:17,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358797.5293815, 'message': 'Dec 6 22:33:16 hqnl0246134 sshd[261110]: Failed password for root from 61.177.173.18 port 50538 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-06 22:33:18,281] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:33:18,281] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:33:18,290] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:33:18,302] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 22:33:20,974] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:33:20,975] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:33:20,982] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:33:20,993] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
WARNING [2022-12-06 22:33:49,340] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:33:49,341] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:33:53,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358833.5946743, 'message': 'Dec 6 22:33:51 hqnl0246134 sshd[261159]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 22:33:53,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358833.595265, 'message': 'Dec 6 22:33:51 hqnl0246134 sshd[261159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 22:33:53,653] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358833.5954487, 'message': 'Dec 6 22:33:53 hqnl0246134 sshd[261159]: Failed password for root from 61.177.173.18 port 16936 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 22:33:55,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358835.6008255, 'message': 'Dec 6 22:33:54 hqnl0246134 sshd[261159]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 22:33:57,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358837.6016958, 'message': 'Dec 6 22:33:56 hqnl0246134 sshd[261159]: Failed password for root from 61.177.173.18 port 16936 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:33:59,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358839.6077082, 'message': 'Dec 6 22:33:58 hqnl0246134 sshd[261159]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 22:34:01,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358841.6116505, 'message': 'Dec 6 22:34:00 hqnl0246134 sshd[261159]: Failed password for root from 61.177.173.18 port 16936 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0527 seconds
INFO [2022-12-06 22:34:01,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358841.6119094, 'message': 'Dec 6 22:34:01 hqnl0246134 sshd[261165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0531 seconds
INFO [2022-12-06 22:34:03,450] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:34:03,451] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:34:03,460] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:34:03,471] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 22:34:03,632] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358843.6129012, 'message': 'Dec 6 22:34:03 hqnl0246134 sshd[261165]: Failed password for root from 165.227.166.207 port 34092 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:34:05,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358845.6157794, 'message': 'Dec 6 22:34:04 hqnl0246134 sshd[261187]: pam_imunify(sshd:auth): [IM360_RBL] The IP 37.232.43.250 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 22:34:05,660] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358845.6171937, 'message': 'Dec 6 22:34:04 hqnl0246134 sshd[261187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.232.43.250 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:34:07,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358847.618117, 'message': 'Dec 6 22:34:06 hqnl0246134 sshd[261187]: Failed password for root from 37.232.43.250 port 19182 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:34:09,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '98.248.92.175', 'timestamp': 1670358849.6211438, 'message': 'Dec 6 22:34:08 hqnl0246134 sshd[261189]: Invalid user krishna from 98.248.92.175 port 48663', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:34:09,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '98.248.92.175', 'timestamp': 1670358849.6213658, 'message': 'Dec 6 22:34:08 hqnl0246134 sshd[261189]: pam_imunify(sshd:auth): [IM360_RBL] The IP 98.248.92.175 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 22:34:09,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '98.248.92.175', 'timestamp': 1670358849.6215408, 'message': 'Dec 6 22:34:08 hqnl0246134 sshd[261189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.248.92.175 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
WARNING [2022-12-06 22:34:10,758] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:34:10,785] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0355 seconds
INFO [2022-12-06 22:34:11,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '98.248.92.175', 'timestamp': 1670358851.6232445, 'message': 'Dec 6 22:34:10 hqnl0246134 sshd[261189]: Failed password for invalid user krishna from 98.248.92.175 port 48663 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 22:34:13,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '98.248.92.175', 'timestamp': 1670358853.6267865, 'message': 'Dec 6 22:34:12 hqnl0246134 sshd[261189]: Disconnected from invalid user krishna 98.248.92.175 port 48663 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:34:19,202] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:34:19,203] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:34:19,230] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:34:19,256] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0428 seconds
INFO [2022-12-06 22:34:22,539] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:34:22,539] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:34:22,547] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:34:22,559] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 22:34:37,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358877.654545, 'message': 'Dec 6 22:34:37 hqnl0246134 sshd[261224]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 22:34:37,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358877.655218, 'message': 'Dec 6 22:34:37 hqnl0246134 sshd[261224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 22:34:39,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358879.6534305, 'message': 'Dec 6 22:34:38 hqnl0246134 sshd[261224]: Failed password for root from 61.177.173.18 port 39483 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0411 seconds
INFO [2022-12-06 22:34:39,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358879.6536512, 'message': 'Dec 6 22:34:39 hqnl0246134 sshd[261224]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:34:41,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358881.6612208, 'message': 'Dec 6 22:34:41 hqnl0246134 sshd[261224]: Failed password for root from 61.177.173.18 port 39483 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:34:43,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358883.661736, 'message': 'Dec 6 22:34:41 hqnl0246134 sshd[261224]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:34:45,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358885.6620812, 'message': 'Dec 6 22:34:44 hqnl0246134 sshd[261224]: Failed password for root from 61.177.173.18 port 39483 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 22:34:49,343] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:34:49,344] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:34:51,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.11.85', 'timestamp': 1670358891.6693454, 'message': 'Dec 6 22:34:51 hqnl0246134 sshd[261229]: Invalid user tsbot from 43.153.11.85 port 39782', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 22:34:53,702] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.11.85', 'timestamp': 1670358893.671723, 'message': 'Dec 6 22:34:51 hqnl0246134 sshd[261229]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.11.85 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 22:34:53,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.11.85', 'timestamp': 1670358893.6719997, 'message': 'Dec 6 22:34:51 hqnl0246134 sshd[261229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.11.85 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 22:34:55,698] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.11.85', 'timestamp': 1670358895.6777513, 'message': 'Dec 6 22:34:53 hqnl0246134 sshd[261229]: Failed password for invalid user tsbot from 43.153.11.85 port 39782 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 22:34:57,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.11.85', 'timestamp': 1670358897.681707, 'message': 'Dec 6 22:34:55 hqnl0246134 sshd[261229]: Disconnected from invalid user tsbot 43.153.11.85 port 39782 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:35:03,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.55.198', 'timestamp': 1670358903.689995, 'message': 'Dec 6 22:35:01 hqnl0246134 sshd[261232]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.55.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 22:35:03,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.55.198', 'timestamp': 1670358903.6904085, 'message': 'Dec 6 22:35:01 hqnl0246134 sshd[261232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.198 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 22:35:05,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.55.198', 'timestamp': 1670358905.6919043, 'message': 'Dec 6 22:35:03 hqnl0246134 sshd[261232]: Failed password for root from 178.128.55.198 port 32922 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 22:35:08,429] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:35:08,429] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:35:08,436] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:35:08,448] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
WARNING [2022-12-06 22:35:10,762] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:35:10,787] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0329 seconds
INFO [2022-12-06 22:35:17,884] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:35:17,885] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:35:17,892] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:35:17,904] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 22:35:20,608] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:35:20,609] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:35:20,615] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:35:20,627] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-06 22:35:25,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358925.7172198, 'message': 'Dec 6 22:35:24 hqnl0246134 sshd[261289]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 22:35:25,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358925.7178438, 'message': 'Dec 6 22:35:24 hqnl0246134 sshd[261289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:35:27,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358927.7223654, 'message': 'Dec 6 22:35:26 hqnl0246134 sshd[261289]: Failed password for root from 61.177.173.18 port 19149 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 22:35:29,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358929.7264075, 'message': 'Dec 6 22:35:28 hqnl0246134 sshd[261289]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 22:35:31,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358931.7289822, 'message': 'Dec 6 22:35:30 hqnl0246134 sshd[261289]: Failed password for root from 61.177.173.18 port 19149 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:35:31,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358931.7291574, 'message': 'Dec 6 22:35:30 hqnl0246134 sshd[261289]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 22:35:33,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358933.730526, 'message': 'Dec 6 22:35:32 hqnl0246134 sshd[261289]: Failed password for root from 61.177.173.18 port 19149 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 22:35:45,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358945.747424, 'message': 'Dec 6 22:35:44 hqnl0246134 sshd[261301]: Invalid user ernesto from 37.232.43.250 port 53451', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 22:35:45,785] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358945.7476423, 'message': 'Dec 6 22:35:44 hqnl0246134 sshd[261301]: pam_imunify(sshd:auth): [IM360_RBL] The IP 37.232.43.250 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 22:35:45,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358945.7478018, 'message': 'Dec 6 22:35:44 hqnl0246134 sshd[261301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.232.43.250 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:35:45,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358945.7479496, 'message': 'Dec 6 22:35:45 hqnl0246134 sshd[261301]: Failed password for invalid user ernesto from 37.232.43.250 port 53451 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:35:47,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '37.232.43.250', 'timestamp': 1670358947.7501428, 'message': 'Dec 6 22:35:45 hqnl0246134 sshd[261301]: Disconnected from invalid user ernesto 37.232.43.250 port 53451 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 22:35:49,346] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:35:49,347] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:35:51,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358951.7547271, 'message': 'Dec 6 22:35:50 hqnl0246134 sshd[261305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:35:51,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670358951.7549493, 'message': 'Dec 6 22:35:51 hqnl0246134 sshd[261305]: Failed password for root from 165.227.166.207 port 44384 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:36:07,814] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358967.7888675, 'message': 'Dec 6 22:36:07 hqnl0246134 sshd[261323]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 22:36:07,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358967.7894516, 'message': 'Dec 6 22:36:07 hqnl0246134 sshd[261323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:36:09,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.165.246.58', 'timestamp': 1670358969.7915156, 'message': 'Dec 6 22:36:09 hqnl0246134 sshd[261325]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.165.246.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 22:36:09,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.165.246.58', 'timestamp': 1670358969.7917168, 'message': 'Dec 6 22:36:09 hqnl0246134 sshd[261325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.165.246.58 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 22:36:10,766] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:36:10,786] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0266 seconds
INFO [2022-12-06 22:36:11,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358971.7942257, 'message': 'Dec 6 22:36:09 hqnl0246134 sshd[261323]: Failed password for root from 61.177.173.18 port 28238 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 22:36:11,825] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '202.165.246.58', 'timestamp': 1670358971.7944279, 'message': 'Dec 6 22:36:10 hqnl0246134 sshd[261325]: Failed password for root from 202.165.246.58 port 60410 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 22:36:13,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358973.7982976, 'message': 'Dec 6 22:36:12 hqnl0246134 sshd[261323]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:36:15,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358975.8006496, 'message': 'Dec 6 22:36:14 hqnl0246134 sshd[261323]: Failed password for root from 61.177.173.18 port 28238 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 22:36:17,791] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:36:17,792] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:36:17,799] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:36:17,820] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0271 seconds
INFO [2022-12-06 22:36:17,827] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358977.80156, 'message': 'Dec 6 22:36:16 hqnl0246134 sshd[261323]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 22:36:19,825] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670358979.805282, 'message': 'Dec 6 22:36:18 hqnl0246134 sshd[261323]: Failed password for root from 61.177.173.18 port 28238 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:36:20,506] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:36:20,506] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:36:20,513] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:36:20,524] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 22:36:41,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.255.116.74', 'timestamp': 1670359001.8525307, 'message': 'Dec 6 22:36:40 hqnl0246134 sshd[261347]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.255.116.74 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 22:36:41,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.255.116.74', 'timestamp': 1670359001.8538945, 'message': 'Dec 6 22:36:40 hqnl0246134 sshd[261347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.255.116.74 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 22:36:43,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.255.116.74', 'timestamp': 1670359003.852716, 'message': 'Dec 6 22:36:42 hqnl0246134 sshd[261347]: Failed password for root from 139.255.116.74 port 60742 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 22:36:45,742] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:36:45,742] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:36:45,753] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:36:45,766] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0232 seconds
WARNING [2022-12-06 22:36:49,351] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:36:49,351] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:36:53,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359013.8680031, 'message': 'Dec 6 22:36:53 hqnl0246134 sshd[261364]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 22:36:53,924] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359013.8683546, 'message': 'Dec 6 22:36:53 hqnl0246134 sshd[261364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 22:36:55,888] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359015.8692777, 'message': 'Dec 6 22:36:54 hqnl0246134 sshd[261366]: pam_imunify(sshd:auth): [IM360_RBL] The IP 85.233.142.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:36:55,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359015.8695545, 'message': 'Dec 6 22:36:54 hqnl0246134 sshd[261366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.233.142.6 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:36:57,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359017.8735006, 'message': 'Dec 6 22:36:55 hqnl0246134 sshd[261364]: Failed password for root from 61.177.173.18 port 47849 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 22:36:57,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359017.873995, 'message': 'Dec 6 22:36:57 hqnl0246134 sshd[261366]: Failed password for root from 85.233.142.6 port 54998 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 22:36:57,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359017.873797, 'message': 'Dec 6 22:36:56 hqnl0246134 sshd[261364]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:36:59,919] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359019.874012, 'message': 'Dec 6 22:36:58 hqnl0246134 sshd[261364]: Failed password for root from 61.177.173.18 port 47849 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-06 22:36:59,920] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359019.8758502, 'message': 'Dec 6 22:36:59 hqnl0246134 sshd[261369]: Invalid user xujie from 177.55.100.134 port 53484', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0394 seconds
INFO [2022-12-06 22:36:59,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359019.8762336, 'message': 'Dec 6 22:36:59 hqnl0246134 sshd[261369]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.55.100.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 22:36:59,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359019.8807294, 'message': 'Dec 6 22:36:59 hqnl0246134 sshd[261369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.55.100.134 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:37:01,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359021.877352, 'message': 'Dec 6 22:37:00 hqnl0246134 sshd[261364]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 22:37:01,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359021.8775728, 'message': 'Dec 6 22:37:01 hqnl0246134 sshd[261369]: Failed password for invalid user xujie from 177.55.100.134 port 53484 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 22:37:03,919] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359023.881298, 'message': 'Dec 6 22:37:02 hqnl0246134 sshd[261364]: Failed password for root from 61.177.173.18 port 47849 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 22:37:03,920] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359023.881879, 'message': 'Dec 6 22:37:02 hqnl0246134 sshd[261369]: Disconnected from invalid user xujie 177.55.100.134 port 53484 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0373 seconds
WARNING [2022-12-06 22:37:10,772] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:37:10,796] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0316 seconds
INFO [2022-12-06 22:37:15,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359035.8913012, 'message': 'Dec 6 22:37:15 hqnl0246134 sshd[261419]: Invalid user test_user from 43.153.11.85 port 52980', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 22:37:15,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359035.8915277, 'message': 'Dec 6 22:37:15 hqnl0246134 sshd[261419]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.11.85 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 22:37:15,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359035.891704, 'message': 'Dec 6 22:37:15 hqnl0246134 sshd[261419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.11.85 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:37:17,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359037.8927622, 'message': 'Dec 6 22:37:17 hqnl0246134 sshd[261419]: Failed password for invalid user test_user from 43.153.11.85 port 52980 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:37:17,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359037.8929503, 'message': 'Dec 6 22:37:17 hqnl0246134 sshd[261419]: Disconnected from invalid user test_user 43.153.11.85 port 52980 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 22:37:18,263] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:37:18,264] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:37:18,271] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:37:18,282] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 22:37:22,013] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:37:22,013] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:37:22,021] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:37:22,033] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 22:37:23,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '37.232.43.250', 'timestamp': 1670359043.9061441, 'message': 'Dec 6 22:37:23 hqnl0246134 sshd[261436]: Invalid user kevin from 37.232.43.250 port 13204', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 22:37:23,945] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '37.232.43.250', 'timestamp': 1670359043.9064493, 'message': 'Dec 6 22:37:23 hqnl0246134 sshd[261436]: pam_imunify(sshd:auth): [IM360_RBL] The IP 37.232.43.250 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 22:37:23,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '37.232.43.250', 'timestamp': 1670359043.9065657, 'message': 'Dec 6 22:37:23 hqnl0246134 sshd[261436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.232.43.250 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:37:25,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '37.232.43.250', 'timestamp': 1670359045.9131212, 'message': 'Dec 6 22:37:25 hqnl0246134 sshd[261436]: Failed password for invalid user kevin from 37.232.43.250 port 13204 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 22:37:27,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '37.232.43.250', 'timestamp': 1670359047.9202123, 'message': 'Dec 6 22:37:27 hqnl0246134 sshd[261436]: Disconnected from invalid user kevin 37.232.43.250 port 13204 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:37:35,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359055.934499, 'message': 'Dec 6 22:37:35 hqnl0246134 sshd[261446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 22:37:37,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359057.9372804, 'message': 'Dec 6 22:37:36 hqnl0246134 sshd[261446]: Failed password for root from 165.227.166.207 port 54642 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:37:41,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359061.9431741, 'message': 'Dec 6 22:37:40 hqnl0246134 sshd[261449]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 22:37:41,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359061.9434187, 'message': 'Dec 6 22:37:40 hqnl0246134 sshd[261449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:37:43,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359063.9452069, 'message': 'Dec 6 22:37:43 hqnl0246134 sshd[261449]: Failed password for root from 61.177.173.18 port 19477 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:37:45,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359065.9481385, 'message': 'Dec 6 22:37:45 hqnl0246134 sshd[261449]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 22:37:47,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359067.9507918, 'message': 'Dec 6 22:37:47 hqnl0246134 sshd[261449]: Failed password for root from 61.177.173.18 port 19477 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 22:37:47,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359067.9510493, 'message': 'Dec 6 22:37:47 hqnl0246134 sshd[261452]: Invalid user test from 43.153.11.85 port 52540', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 22:37:48,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359067.9511893, 'message': 'Dec 6 22:37:47 hqnl0246134 sshd[261452]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.11.85 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 22:37:48,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359067.9513257, 'message': 'Dec 6 22:37:47 hqnl0246134 sshd[261452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.11.85 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-06 22:37:49,357] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:37:49,357] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:37:50,001] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359069.9516873, 'message': 'Dec 6 22:37:49 hqnl0246134 sshd[261449]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0492 seconds
INFO [2022-12-06 22:37:50,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359069.9519985, 'message': 'Dec 6 22:37:49 hqnl0246134 sshd[261452]: Failed password for invalid user test from 43.153.11.85 port 52540 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0494 seconds
INFO [2022-12-06 22:37:51,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359071.9546556, 'message': 'Dec 6 22:37:49 hqnl0246134 sshd[261452]: Disconnected from invalid user test 43.153.11.85 port 52540 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 22:37:53,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359073.9577441, 'message': 'Dec 6 22:37:52 hqnl0246134 sshd[261449]: Failed password for root from 61.177.173.18 port 19477 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:38:00,568] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 22:38:00,637] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 22:38:00,638] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 22:38:00,638] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 22:38:00,639] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 22:38:00,639] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 22:38:00,651] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 22:38:00,667] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0272 seconds
WARNING [2022-12-06 22:38:00,674] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 22:38:00,676] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:38:00,693] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0318 seconds
INFO [2022-12-06 22:38:00,694] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0297 seconds
INFO [2022-12-06 22:38:01,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359081.970039, 'message': 'Dec 6 22:38:01 hqnl0246134 sshd[261455]: Invalid user print from 220.247.10.215 port 62896', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 22:38:02,011] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359081.970242, 'message': 'Dec 6 22:38:01 hqnl0246134 sshd[261455]: pam_imunify(sshd:auth): [IM360_RBL] The IP 220.247.10.215 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:38:02,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359081.9703693, 'message': 'Dec 6 22:38:01 hqnl0246134 sshd[261455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.10.215 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 22:38:05,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359085.9744449, 'message': 'Dec 6 22:38:04 hqnl0246134 sshd[261455]: Failed password for invalid user print from 220.247.10.215 port 62896 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 22:38:06,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359085.9747825, 'message': 'Dec 6 22:38:05 hqnl0246134 sshd[261455]: Disconnected from invalid user print 220.247.10.215 port 62896 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 22:38:08,119] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:38:08,120] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:38:08,134] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:38:08,166] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0449 seconds
WARNING [2022-12-06 22:38:10,775] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:38:10,800] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0321 seconds
INFO [2022-12-06 22:38:16,024] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359095.986141, 'message': 'Dec 6 22:38:14 hqnl0246134 sshd[261480]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.11.85 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 22:38:16,047] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359095.9863636, 'message': 'Dec 6 22:38:14 hqnl0246134 sshd[261480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.11.85 user=mysql', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 22:38:17,827] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:38:17,828] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:38:17,835] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:38:17,850] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-06 22:38:18,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.11.85', 'timestamp': 1670359097.9900553, 'message': 'Dec 6 22:38:16 hqnl0246134 sshd[261480]: Failed password for mysql from 43.153.11.85 port 35768 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:38:20,556] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:38:20,556] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:38:20,566] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:38:20,577] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 22:38:28,037] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359107.9998162, 'message': 'Dec 6 22:38:27 hqnl0246134 sshd[261493]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 22:38:28,068] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359108.000207, 'message': 'Dec 6 22:38:27 hqnl0246134 sshd[261493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 22:38:30,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359110.0007493, 'message': 'Dec 6 22:38:29 hqnl0246134 sshd[261493]: Failed password for root from 61.177.173.18 port 37756 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 22:38:30,776] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 22:38:30,777] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 22:38:30,778] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 22:38:32,035] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359112.0020452, 'message': 'Dec 6 22:38:31 hqnl0246134 sshd[261493]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 22:38:34,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670359114.002434, 'message': 'Dec 6 22:38:32 hqnl0246134 sshd[261495]: Invalid user vpn from 152.89.196.220 port 30350', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 22:38:34,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359114.0030303, 'message': 'Dec 6 22:38:33 hqnl0246134 sshd[261493]: Failed password for root from 61.177.173.18 port 37756 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 22:38:34,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670359114.0027702, 'message': 'Dec 6 22:38:32 hqnl0246134 sshd[261495]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:38:34,084] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670359114.002909, 'message': 'Dec 6 22:38:32 hqnl0246134 sshd[261495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 22:38:36,024] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670359116.005125, 'message': 'Dec 6 22:38:34 hqnl0246134 sshd[261495]: Failed password for invalid user vpn from 152.89.196.220 port 30350 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:38:36,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670359116.005446, 'message': 'Dec 6 22:38:35 hqnl0246134 sshd[261495]: Disconnected from invalid user vpn 152.89.196.220 port 30350 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:38:38,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359118.0141807, 'message': 'Dec 6 22:38:36 hqnl0246134 sshd[261493]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 22:38:38,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '98.248.92.175', 'timestamp': 1670359118.014581, 'message': 'Dec 6 22:38:37 hqnl0246134 sshd[261505]: pam_imunify(sshd:auth): [IM360_RBL] The IP 98.248.92.175 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 22:38:38,076] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '98.248.92.175', 'timestamp': 1670359118.0148463, 'message': 'Dec 6 22:38:37 hqnl0246134 sshd[261505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.248.92.175 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 22:38:40,051] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359120.016261, 'message': 'Dec 6 22:38:38 hqnl0246134 sshd[261493]: Failed password for root from 61.177.173.18 port 37756 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 22:38:40,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '98.248.92.175', 'timestamp': 1670359120.0165255, 'message': 'Dec 6 22:38:39 hqnl0246134 sshd[261505]: Failed password for root from 98.248.92.175 port 5241 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0346 seconds
WARNING [2022-12-06 22:38:49,362] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:38:49,363] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:39:08,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359148.076171, 'message': 'Dec 6 22:39:07 hqnl0246134 sshd[261647]: pam_imunify(sshd:auth): [IM360_RBL] The IP 170.245.12.26 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 22:39:08,143] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359148.0767877, 'message': 'Dec 6 22:39:07 hqnl0246134 sshd[261647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.245.12.26 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 22:39:10,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359150.07979, 'message': 'Dec 6 22:39:09 hqnl0246134 sshd[261647]: Failed password for root from 170.245.12.26 port 47694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
WARNING [2022-12-06 22:39:10,782] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:39:10,816] defence360agent.internals.the_sink: SensorIncidentList(<15 item(s)>) processed in 0.0436 seconds
INFO [2022-12-06 22:39:16,125] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359156.0920894, 'message': 'Dec 6 22:39:14 hqnl0246134 sshd[261649]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 22:39:16,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359156.0924487, 'message': 'Dec 6 22:39:14 hqnl0246134 sshd[261649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 22:39:18,019] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:39:18,020] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:39:18,032] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:39:18,045] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0240 seconds
INFO [2022-12-06 22:39:18,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359158.093421, 'message': 'Dec 6 22:39:16 hqnl0246134 sshd[261649]: Failed password for root from 61.177.173.18 port 63905 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 22:39:20,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359160.0948148, 'message': 'Dec 6 22:39:18 hqnl0246134 sshd[261649]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 22:39:20,641] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:39:20,641] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:39:20,648] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:39:20,659] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-06 22:39:22,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359162.0971453, 'message': 'Dec 6 22:39:20 hqnl0246134 sshd[261649]: Failed password for root from 61.177.173.18 port 63905 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 22:39:22,128] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359162.0973315, 'message': 'Dec 6 22:39:20 hqnl0246134 sshd[261663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 22:39:22,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359162.097473, 'message': 'Dec 6 22:39:21 hqnl0246134 sshd[261649]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:39:24,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359164.098988, 'message': 'Dec 6 22:39:22 hqnl0246134 sshd[261663]: Failed password for root from 165.227.166.207 port 36730 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0452 seconds
INFO [2022-12-06 22:39:24,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359164.0998907, 'message': 'Dec 6 22:39:23 hqnl0246134 sshd[261649]: Failed password for root from 61.177.173.18 port 63905 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0452 seconds
INFO [2022-12-06 22:39:25,188] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:39:25,188] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:39:25,195] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:39:25,206] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 22:39:30,129] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359170.1071098, 'message': 'Dec 6 22:39:28 hqnl0246134 sshd[261671]: Invalid user atom from 43.153.68.27 port 46494', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 22:39:30,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359170.1073854, 'message': 'Dec 6 22:39:28 hqnl0246134 sshd[261671]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.68.27 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 22:39:30,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359170.107507, 'message': 'Dec 6 22:39:28 hqnl0246134 sshd[261671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.68.27 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:39:32,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359172.1095302, 'message': 'Dec 6 22:39:30 hqnl0246134 sshd[261671]: Failed password for invalid user atom from 43.153.68.27 port 46494 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 22:39:32,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359172.1097507, 'message': 'Dec 6 22:39:31 hqnl0246134 sshd[261671]: Disconnected from invalid user atom 43.153.68.27 port 46494 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:39:44,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359184.1351707, 'message': 'Dec 6 22:39:43 hqnl0246134 sshd[261682]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.0.15.234 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 22:39:44,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359184.1359582, 'message': 'Dec 6 22:39:43 hqnl0246134 sshd[261682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.0.15.234 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 22:39:46,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359186.1441944, 'message': 'Dec 6 22:39:45 hqnl0246134 sshd[261682]: Failed password for root from 95.0.15.234 port 25504 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 22:39:49,367] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:39:49,368] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:40:00,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359200.1897736, 'message': 'Dec 6 22:40:00 hqnl0246134 sshd[261687]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 22:40:00,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359200.1904318, 'message': 'Dec 6 22:40:00 hqnl0246134 sshd[261687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:40:02,458] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359202.2115753, 'message': 'Dec 6 22:40:02 hqnl0246134 sshd[261687]: Failed password for root from 61.177.173.18 port 22451 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.2458 seconds
INFO [2022-12-06 22:40:02,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359202.2118635, 'message': 'Dec 6 22:40:02 hqnl0246134 sshd[261695]: Invalid user demo from 43.153.30.100 port 54822', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.2463 seconds
INFO [2022-12-06 22:40:04,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359204.2029862, 'message': 'Dec 6 22:40:02 hqnl0246134 sshd[261695]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.30.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 22:40:04,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359204.2035148, 'message': 'Dec 6 22:40:02 hqnl0246134 sshd[261695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.30.100 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 22:40:04,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359204.2037184, 'message': 'Dec 6 22:40:03 hqnl0246134 sshd[261695]: Failed password for invalid user demo from 43.153.30.100 port 54822 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 22:40:06,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359206.2007556, 'message': 'Dec 6 22:40:04 hqnl0246134 sshd[261695]: Disconnected from invalid user demo 43.153.30.100 port 54822 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0461 seconds
INFO [2022-12-06 22:40:06,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359206.2009413, 'message': 'Dec 6 22:40:04 hqnl0246134 sshd[261687]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0468 seconds
INFO [2022-12-06 22:40:08,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359208.2037356, 'message': 'Dec 6 22:40:06 hqnl0246134 sshd[261687]: Failed password for root from 61.177.173.18 port 22451 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:40:08,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359208.2040083, 'message': 'Dec 6 22:40:06 hqnl0246134 sshd[261687]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 22:40:10,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359210.2055194, 'message': 'Dec 6 22:40:08 hqnl0246134 sshd[261687]: Failed password for root from 61.177.173.18 port 22451 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 22:40:10,788] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:40:10,814] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0369 seconds
INFO [2022-12-06 22:40:17,889] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:40:17,889] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:40:17,897] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:40:17,912] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 22:40:20,539] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:40:20,539] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:40:20,547] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:40:20,560] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 22:40:46,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359246.2468078, 'message': 'Dec 6 22:40:45 hqnl0246134 sshd[261756]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 22:40:46,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359246.2477558, 'message': 'Dec 6 22:40:45 hqnl0246134 sshd[261756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 22:40:48,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359248.2670555, 'message': 'Dec 6 22:40:47 hqnl0246134 sshd[261756]: Failed password for root from 61.177.173.18 port 48094 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 22:40:49,370] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:40:49,371] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:40:50,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359250.2491605, 'message': 'Dec 6 22:40:50 hqnl0246134 sshd[261756]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 22:40:52,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359252.2505121, 'message': 'Dec 6 22:40:52 hqnl0246134 sshd[261756]: Failed password for root from 61.177.173.18 port 48094 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 22:40:54,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359254.2527828, 'message': 'Dec 6 22:40:52 hqnl0246134 sshd[261756]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0464 seconds
INFO [2022-12-06 22:40:54,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359254.2530458, 'message': 'Dec 6 22:40:54 hqnl0246134 sshd[261756]: Failed password for root from 61.177.173.18 port 48094 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-06 22:40:57,239] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:40:57,240] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:40:57,247] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:40:57,258] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 22:41:06,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359266.2631414, 'message': 'Dec 6 22:41:04 hqnl0246134 sshd[261802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 22:41:06,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359266.264708, 'message': 'Dec 6 22:41:06 hqnl0246134 sshd[261802]: Failed password for root from 165.227.166.207 port 46980 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 22:41:10,792] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:41:10,814] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0296 seconds
INFO [2022-12-06 22:41:17,961] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:41:17,962] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:41:17,974] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:41:17,997] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0329 seconds
INFO [2022-12-06 22:41:18,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359278.3644807, 'message': 'Dec 6 22:41:17 hqnl0246134 sshd[261815]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.62.24.222 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:41:18,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359278.3646498, 'message': 'Dec 6 22:41:17 hqnl0246134 sshd[261815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.24.222 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:41:20,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359280.2822013, 'message': 'Dec 6 22:41:20 hqnl0246134 sshd[261815]: Failed password for root from 178.62.24.222 port 43208 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:41:20,710] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:41:20,711] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:41:20,721] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:41:20,732] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 22:41:22,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '98.248.92.175', 'timestamp': 1670359282.288784, 'message': 'Dec 6 22:41:20 hqnl0246134 sshd[261818]: Invalid user myuser from 98.248.92.175 port 33314', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:41:22,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '98.248.92.175', 'timestamp': 1670359282.2890315, 'message': 'Dec 6 22:41:20 hqnl0246134 sshd[261818]: pam_imunify(sshd:auth): [IM360_RBL] The IP 98.248.92.175 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 22:41:22,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '98.248.92.175', 'timestamp': 1670359282.289159, 'message': 'Dec 6 22:41:20 hqnl0246134 sshd[261818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.248.92.175 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:41:24,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '98.248.92.175', 'timestamp': 1670359284.2907681, 'message': 'Dec 6 22:41:22 hqnl0246134 sshd[261818]: Failed password for invalid user myuser from 98.248.92.175 port 33314 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 22:41:24,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '98.248.92.175', 'timestamp': 1670359284.2910452, 'message': 'Dec 6 22:41:23 hqnl0246134 sshd[261818]: Disconnected from invalid user myuser 98.248.92.175 port 33314 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:41:26,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359286.292992, 'message': 'Dec 6 22:41:24 hqnl0246134 sshd[261824]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.135.20.5 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:41:26,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359286.2931945, 'message': 'Dec 6 22:41:24 hqnl0246134 sshd[261824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.135.20.5 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:41:28,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359288.29416, 'message': 'Dec 6 22:41:26 hqnl0246134 sshd[261824]: Failed password for root from 194.135.20.5 port 43916 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 22:41:32,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359292.301713, 'message': 'Dec 6 22:41:30 hqnl0246134 sshd[261826]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 22:41:32,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359292.30197, 'message': 'Dec 6 22:41:30 hqnl0246134 sshd[261826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:41:34,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359294.3079226, 'message': 'Dec 6 22:41:32 hqnl0246134 sshd[261826]: Failed password for root from 61.177.173.18 port 18050 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 22:41:34,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359294.3086975, 'message': 'Dec 6 22:41:33 hqnl0246134 sshd[261826]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 22:41:36,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359296.309578, 'message': 'Dec 6 22:41:35 hqnl0246134 sshd[261826]: Failed password for root from 61.177.173.18 port 18050 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0432 seconds
INFO [2022-12-06 22:41:38,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359298.3119605, 'message': 'Dec 6 22:41:37 hqnl0246134 sshd[261826]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:41:40,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359300.3153865, 'message': 'Dec 6 22:41:39 hqnl0246134 sshd[261826]: Failed password for root from 61.177.173.18 port 18050 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0256 seconds
WARNING [2022-12-06 22:41:49,373] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:41:49,374] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 22:41:54,037] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 22:42:08,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359328.372908, 'message': 'Dec 6 22:42:07 hqnl0246134 sshd[261867]: Invalid user bitnami from 194.204.194.11 port 47286', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 22:42:08,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359328.3743732, 'message': 'Dec 6 22:42:08 hqnl0246134 sshd[261867]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.204.194.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 22:42:08,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359328.3748357, 'message': 'Dec 6 22:42:08 hqnl0246134 sshd[261867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 22:42:10,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359330.3746395, 'message': 'Dec 6 22:42:09 hqnl0246134 sshd[261867]: Failed password for invalid user bitnami from 194.204.194.11 port 47286 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 22:42:10,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359330.3750794, 'message': 'Dec 6 22:42:10 hqnl0246134 sshd[261869]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.68.27 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 22:42:10,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359330.3749008, 'message': 'Dec 6 22:42:09 hqnl0246134 sshd[261867]: Disconnected from invalid user bitnami 194.204.194.11 port 47286 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 22:42:10,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359330.3752782, 'message': 'Dec 6 22:42:10 hqnl0246134 sshd[261869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.68.27 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0308 seconds
WARNING [2022-12-06 22:42:10,798] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:42:10,827] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0390 seconds
INFO [2022-12-06 22:42:12,206] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:42:12,207] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:42:12,220] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:42:12,238] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0300 seconds
INFO [2022-12-06 22:42:12,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359332.3766773, 'message': 'Dec 6 22:42:11 hqnl0246134 sshd[261869]: Failed password for root from 43.153.68.27 port 39354 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:42:17,841] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:42:17,842] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:42:17,850] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:42:17,863] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 22:42:18,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359338.3852851, 'message': 'Dec 6 22:42:16 hqnl0246134 sshd[261877]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 22:42:18,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359338.3854945, 'message': 'Dec 6 22:42:16 hqnl0246134 sshd[261877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:42:20,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359340.3897018, 'message': 'Dec 6 22:42:19 hqnl0246134 sshd[261877]: Failed password for root from 61.177.173.18 port 46129 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 22:42:20,582] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:42:20,582] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:42:20,590] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:42:20,601] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-06 22:42:22,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359342.3920271, 'message': 'Dec 6 22:42:21 hqnl0246134 sshd[261877]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 22:42:22,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359342.3922346, 'message': 'Dec 6 22:42:22 hqnl0246134 sshd[261889]: Invalid user nfs from 220.247.10.215 port 62145', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 22:42:22,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359342.3923943, 'message': 'Dec 6 22:42:22 hqnl0246134 sshd[261889]: pam_imunify(sshd:auth): [IM360_RBL] The IP 220.247.10.215 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:42:22,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359342.392624, 'message': 'Dec 6 22:42:22 hqnl0246134 sshd[261889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.10.215 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 22:42:24,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359344.39401, 'message': 'Dec 6 22:42:22 hqnl0246134 sshd[261877]: Failed password for root from 61.177.173.18 port 46129 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 22:42:24,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359344.3943229, 'message': 'Dec 6 22:42:23 hqnl0246134 sshd[261877]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:42:26,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359346.396818, 'message': 'Dec 6 22:42:24 hqnl0246134 sshd[261889]: Failed password for invalid user nfs from 220.247.10.215 port 62145 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0667 seconds
INFO [2022-12-06 22:42:26,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359346.3969984, 'message': 'Dec 6 22:42:25 hqnl0246134 sshd[261877]: Failed password for root from 61.177.173.18 port 46129 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0672 seconds
INFO [2022-12-06 22:42:26,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359346.397745, 'message': 'Dec 6 22:42:25 hqnl0246134 sshd[261891]: Invalid user admin from 193.179.226.199 port 38354', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0673 seconds
INFO [2022-12-06 22:42:26,496] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359346.3978512, 'message': 'Dec 6 22:42:25 hqnl0246134 sshd[261891]: pam_imunify(sshd:auth): [IM360_RBL] The IP 193.179.226.199 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 22:42:26,521] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359346.3979533, 'message': 'Dec 6 22:42:25 hqnl0246134 sshd[261891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.179.226.199 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 22:42:28,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359348.398705, 'message': 'Dec 6 22:42:26 hqnl0246134 sshd[261889]: Disconnected from invalid user nfs 220.247.10.215 port 62145 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0611 seconds
INFO [2022-12-06 22:42:28,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359348.399011, 'message': 'Dec 6 22:42:27 hqnl0246134 sshd[261891]: Failed password for invalid user admin from 193.179.226.199 port 38354 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0610 seconds
INFO [2022-12-06 22:42:28,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359348.399202, 'message': 'Dec 6 22:42:27 hqnl0246134 sshd[261891]: Disconnected from invalid user admin 193.179.226.199 port 38354 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
WARNING [2022-12-06 22:42:49,378] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:42:49,379] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:42:50,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359370.4237263, 'message': 'Dec 6 22:42:48 hqnl0246134 sshd[261910]: Invalid user gerrit from 202.165.246.58 port 56084', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 22:42:50,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359370.4246268, 'message': 'Dec 6 22:42:50 hqnl0246134 sshd[261913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 22:42:50,493] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359370.4242742, 'message': 'Dec 6 22:42:48 hqnl0246134 sshd[261910]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.165.246.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:42:50,511] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359370.4244633, 'message': 'Dec 6 22:42:48 hqnl0246134 sshd[261910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.165.246.58 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:42:52,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359372.4226184, 'message': 'Dec 6 22:42:50 hqnl0246134 sshd[261910]: Failed password for invalid user gerrit from 202.165.246.58 port 56084 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0543 seconds
INFO [2022-12-06 22:42:52,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.55.198', 'timestamp': 1670359372.4229252, 'message': 'Dec 6 22:42:51 hqnl0246134 sshd[261912]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.55.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0545 seconds
INFO [2022-12-06 22:42:52,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359372.4232402, 'message': 'Dec 6 22:42:52 hqnl0246134 sshd[261913]: Failed password for root from 165.227.166.207 port 57310 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0538 seconds
INFO [2022-12-06 22:42:52,520] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359372.4227962, 'message': 'Dec 6 22:42:50 hqnl0246134 sshd[261910]: Disconnected from invalid user gerrit 202.165.246.58 port 56084 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0413 seconds
INFO [2022-12-06 22:42:52,520] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.55.198', 'timestamp': 1670359372.4230368, 'message': 'Dec 6 22:42:51 hqnl0246134 sshd[261912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.198 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-06 22:42:54,490] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.55.198', 'timestamp': 1670359374.4254699, 'message': 'Dec 6 22:42:53 hqnl0246134 sshd[261912]: Failed password for root from 178.128.55.198 port 37458 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0640 seconds
INFO [2022-12-06 22:43:02,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359382.4431, 'message': 'Dec 6 22:43:01 hqnl0246134 sshd[261922]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 22:43:02,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359382.4435773, 'message': 'Dec 6 22:43:01 hqnl0246134 sshd[261922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 22:43:04,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359384.444385, 'message': 'Dec 6 22:43:03 hqnl0246134 sshd[261922]: Failed password for root from 61.177.173.18 port 61750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 22:43:06,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359386.4459708, 'message': 'Dec 6 22:43:05 hqnl0246134 sshd[261922]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:43:08,468] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359388.449933, 'message': 'Dec 6 22:43:07 hqnl0246134 sshd[261922]: Failed password for root from 61.177.173.18 port 61750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:43:08,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359388.4501333, 'message': 'Dec 6 22:43:07 hqnl0246134 sshd[261922]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:43:10,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359390.4502223, 'message': 'Dec 6 22:43:09 hqnl0246134 sshd[261922]: Failed password for root from 61.177.173.18 port 61750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 22:43:10,799] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:43:10,825] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0339 seconds
INFO [2022-12-06 22:43:17,779] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:43:17,780] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:43:17,786] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:43:17,799] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 22:43:20,554] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:43:20,555] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:43:20,567] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:43:20,611] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0553 seconds
INFO [2022-12-06 22:43:22,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359402.4668334, 'message': 'Dec 6 22:43:21 hqnl0246134 sshd[261955]: pam_imunify(sshd:auth): [IM360_RBL] The IP 170.245.12.26 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:43:22,504] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359402.4670267, 'message': 'Dec 6 22:43:21 hqnl0246134 sshd[261955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.245.12.26 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:43:24,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359404.4719172, 'message': 'Dec 6 22:43:24 hqnl0246134 sshd[261955]: Failed password for root from 170.245.12.26 port 40484 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:43:28,784] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:43:28,784] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:43:28,792] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:43:28,803] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 22:43:44,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '98.248.92.175', 'timestamp': 1670359424.5000768, 'message': 'Dec 6 22:43:42 hqnl0246134 sshd[261974]: pam_imunify(sshd:auth): [IM360_RBL] The IP 98.248.92.175 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 22:43:44,546] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '98.248.92.175', 'timestamp': 1670359424.500862, 'message': 'Dec 6 22:43:42 hqnl0246134 sshd[261974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.248.92.175 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:43:46,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '98.248.92.175', 'timestamp': 1670359426.4982252, 'message': 'Dec 6 22:43:44 hqnl0246134 sshd[261974]: Failed password for root from 98.248.92.175 port 3918 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:43:48,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359428.5008323, 'message': 'Dec 6 22:43:47 hqnl0246134 sshd[261977]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:43:48,542] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359428.501076, 'message': 'Dec 6 22:43:47 hqnl0246134 sshd[261977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0220 seconds
WARNING [2022-12-06 22:43:49,383] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:43:49,384] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:43:50,532] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359430.5035112, 'message': 'Dec 6 22:43:49 hqnl0246134 sshd[261977]: Failed password for root from 61.177.173.18 port 31686 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 22:43:52,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359432.5060594, 'message': 'Dec 6 22:43:51 hqnl0246134 sshd[261977]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 22:43:52,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359432.5063536, 'message': 'Dec 6 22:43:52 hqnl0246134 sshd[261980]: Invalid user admin from 95.0.15.234 port 13184', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 22:43:52,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359432.506553, 'message': 'Dec 6 22:43:52 hqnl0246134 sshd[261980]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.0.15.234 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 22:43:52,571] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359432.5066972, 'message': 'Dec 6 22:43:52 hqnl0246134 sshd[261980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.0.15.234 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:43:54,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359434.5096323, 'message': 'Dec 6 22:43:53 hqnl0246134 sshd[261977]: Failed password for root from 61.177.173.18 port 31686 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:43:56,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359436.512333, 'message': 'Dec 6 22:43:54 hqnl0246134 sshd[261980]: Failed password for invalid user admin from 95.0.15.234 port 13184 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 22:43:56,542] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359436.512539, 'message': 'Dec 6 22:43:56 hqnl0246134 sshd[261977]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 22:43:56,559] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359436.5126479, 'message': 'Dec 6 22:43:56 hqnl0246134 sshd[261980]: Disconnected from invalid user admin 95.0.15.234 port 13184 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:43:58,554] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359438.518567, 'message': 'Dec 6 22:43:58 hqnl0246134 sshd[261977]: Failed password for root from 61.177.173.18 port 31686 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0355 seconds
WARNING [2022-12-06 22:44:10,807] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:44:10,834] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0370 seconds
INFO [2022-12-06 22:44:17,762] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:44:17,762] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:44:17,770] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:44:17,782] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 22:44:20,402] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:44:20,402] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:44:20,411] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:44:20,423] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 22:44:34,615] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359474.589575, 'message': 'Dec 6 22:44:34 hqnl0246134 sshd[262043]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 22:44:34,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359474.5899947, 'message': 'Dec 6 22:44:34 hqnl0246134 sshd[262043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:44:38,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359478.598881, 'message': 'Dec 6 22:44:36 hqnl0246134 sshd[262043]: Failed password for root from 61.177.173.18 port 55913 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 22:44:40,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359480.5982237, 'message': 'Dec 6 22:44:38 hqnl0246134 sshd[262043]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0472 seconds
INFO [2022-12-06 22:44:42,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359482.6016803, 'message': 'Dec 6 22:44:40 hqnl0246134 sshd[262043]: Failed password for root from 61.177.173.18 port 55913 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 22:44:44,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359484.6037035, 'message': 'Dec 6 22:44:43 hqnl0246134 sshd[262043]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 22:44:44,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359484.6039994, 'message': 'Dec 6 22:44:43 hqnl0246134 sshd[262054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 22:44:46,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359486.6058524, 'message': 'Dec 6 22:44:45 hqnl0246134 sshd[262043]: Failed password for root from 61.177.173.18 port 55913 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 22:44:46,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359486.609043, 'message': 'Dec 6 22:44:45 hqnl0246134 sshd[262054]: Failed password for root from 165.227.166.207 port 39364 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 22:44:48,077] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:44:48,078] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:44:48,093] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:44:48,119] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0406 seconds
WARNING [2022-12-06 22:44:49,386] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:44:49,387] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:44:50,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359490.6144593, 'message': 'Dec 6 22:44:50 hqnl0246134 sshd[262062]: Invalid user anna from 43.153.68.27 port 33854', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 22:44:50,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359490.6147783, 'message': 'Dec 6 22:44:50 hqnl0246134 sshd[262062]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.68.27 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 22:44:50,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359490.6161118, 'message': 'Dec 6 22:44:50 hqnl0246134 sshd[262062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.68.27 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:44:52,639] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359492.616707, 'message': 'Dec 6 22:44:52 hqnl0246134 sshd[262062]: Failed password for invalid user anna from 43.153.68.27 port 33854 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 22:44:52,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.68.27', 'timestamp': 1670359492.6169362, 'message': 'Dec 6 22:44:52 hqnl0246134 sshd[262062]: Disconnected from invalid user anna 43.153.68.27 port 33854 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:45:02,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359502.6313078, 'message': 'Dec 6 22:45:02 hqnl0246134 sshd[262066]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.71.74.3 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0539 seconds
INFO [2022-12-06 22:45:02,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359502.6316853, 'message': 'Dec 6 22:45:02 hqnl0246134 sshd[262066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.74.3 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 22:45:04,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359504.6326253, 'message': 'Dec 6 22:45:04 hqnl0246134 sshd[262066]: Failed password for root from 167.71.74.3 port 40346 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
WARNING [2022-12-06 22:45:10,812] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:45:10,840] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0383 seconds
INFO [2022-12-06 22:45:17,721] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:45:17,722] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:45:17,731] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:45:17,743] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 22:45:20,323] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:45:20,323] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:45:20,330] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:45:20,342] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 22:45:20,470] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 22:45:20,539] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 22:45:20,540] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 22:45:20,540] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 22:45:20,540] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 22:45:20,541] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 22:45:20,550] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 22:45:20,567] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0254 seconds
WARNING [2022-12-06 22:45:20,573] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 22:45:20,576] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:45:20,594] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0336 seconds
INFO [2022-12-06 22:45:20,596] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0315 seconds
INFO [2022-12-06 22:45:22,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359522.661438, 'message': 'Dec 6 22:45:21 hqnl0246134 sshd[262115]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:45:22,702] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359522.6617324, 'message': 'Dec 6 22:45:21 hqnl0246134 sshd[262115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:45:24,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359524.6641254, 'message': 'Dec 6 22:45:22 hqnl0246134 sshd[262115]: Failed password for root from 61.177.173.18 port 19613 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0525 seconds
INFO [2022-12-06 22:45:24,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359524.6647854, 'message': 'Dec 6 22:45:24 hqnl0246134 sshd[262120]: pam_imunify(sshd:auth): [IM360_RBL] The IP 170.245.12.26 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0527 seconds
INFO [2022-12-06 22:45:24,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359524.6646059, 'message': 'Dec 6 22:45:23 hqnl0246134 sshd[262115]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 22:45:24,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359524.664988, 'message': 'Dec 6 22:45:24 hqnl0246134 sshd[262120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.245.12.26 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 22:45:26,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359526.668104, 'message': 'Dec 6 22:45:24 hqnl0246134 sshd[262121]: Invalid user user from 220.247.10.215 port 62002', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 22:45:26,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359526.6688948, 'message': 'Dec 6 22:45:25 hqnl0246134 sshd[262115]: Failed password for root from 61.177.173.18 port 19613 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 22:45:26,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359526.6686172, 'message': 'Dec 6 22:45:24 hqnl0246134 sshd[262121]: pam_imunify(sshd:auth): [IM360_RBL] The IP 220.247.10.215 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 22:45:26,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359526.6687586, 'message': 'Dec 6 22:45:24 hqnl0246134 sshd[262121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.10.215 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 22:45:28,724] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359528.6697917, 'message': 'Dec 6 22:45:26 hqnl0246134 sshd[262120]: Failed password for root from 170.245.12.26 port 38442 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0543 seconds
INFO [2022-12-06 22:45:28,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359528.670049, 'message': 'Dec 6 22:45:27 hqnl0246134 sshd[262121]: Failed password for invalid user user from 220.247.10.215 port 62002 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0551 seconds
INFO [2022-12-06 22:45:28,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359528.6701741, 'message': 'Dec 6 22:45:27 hqnl0246134 sshd[262115]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0553 seconds
INFO [2022-12-06 22:45:30,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359530.6713357, 'message': 'Dec 6 22:45:29 hqnl0246134 sshd[262121]: Disconnected from invalid user user 220.247.10.215 port 62002 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 22:45:30,702] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359530.671656, 'message': 'Dec 6 22:45:30 hqnl0246134 sshd[262115]: Failed password for root from 61.177.173.18 port 19613 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
WARNING [2022-12-06 22:45:49,391] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:45:49,393] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:45:50,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.89.85.14', 'timestamp': 1670359550.7125082, 'message': 'Dec 6 22:45:49 hqnl0246134 sshd[262139]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.89.85.14 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 22:45:50,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.89.85.14', 'timestamp': 1670359550.7135775, 'message': 'Dec 6 22:45:49 hqnl0246134 sshd[262139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.85.14 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 22:45:52,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.89.85.14', 'timestamp': 1670359552.7148483, 'message': 'Dec 6 22:45:51 hqnl0246134 sshd[262139]: Failed password for root from 103.89.85.14 port 48848 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 22:45:56,626] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:45:56,626] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:45:56,635] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:45:56,646] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 22:45:58,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.55.198', 'timestamp': 1670359558.7204876, 'message': 'Dec 6 22:45:58 hqnl0246134 sshd[262147]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.55.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:45:58,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.55.198', 'timestamp': 1670359558.720697, 'message': 'Dec 6 22:45:58 hqnl0246134 sshd[262147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.198 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:46:01,193] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 22:46:01,193] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 22:46:01,194] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 22:46:02,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.55.198', 'timestamp': 1670359562.7257605, 'message': 'Dec 6 22:46:00 hqnl0246134 sshd[262147]: Failed password for root from 178.128.55.198 port 54404 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 22:46:08,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359568.733564, 'message': 'Dec 6 22:46:07 hqnl0246134 sshd[262165]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0597 seconds
INFO [2022-12-06 22:46:08,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359568.734418, 'message': 'Dec 6 22:46:08 hqnl0246134 sshd[262167]: Invalid user mcserver from 95.0.15.234 port 54212', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0609 seconds
INFO [2022-12-06 22:46:08,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359568.734175, 'message': 'Dec 6 22:46:07 hqnl0246134 sshd[262165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 22:46:08,833] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359568.7345448, 'message': 'Dec 6 22:46:08 hqnl0246134 sshd[262167]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.0.15.234 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 22:46:08,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359568.734663, 'message': 'Dec 6 22:46:08 hqnl0246134 sshd[262167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.0.15.234 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:46:10,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359570.7354717, 'message': 'Dec 6 22:46:09 hqnl0246134 sshd[262165]: Failed password for root from 61.177.173.18 port 42900 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 22:46:10,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359570.735729, 'message': 'Dec 6 22:46:10 hqnl0246134 sshd[262167]: Failed password for invalid user mcserver from 95.0.15.234 port 54212 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 22:46:10,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359570.7358723, 'message': 'Dec 6 22:46:10 hqnl0246134 sshd[262165]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0232 seconds
WARNING [2022-12-06 22:46:10,815] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:46:10,852] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0467 seconds
INFO [2022-12-06 22:46:12,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359572.7373772, 'message': 'Dec 6 22:46:10 hqnl0246134 sshd[262167]: Disconnected from invalid user mcserver 95.0.15.234 port 54212 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:46:14,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359574.7411666, 'message': 'Dec 6 22:46:12 hqnl0246134 sshd[262165]: Failed password for root from 61.177.173.18 port 42900 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 22:46:14,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359574.7414796, 'message': 'Dec 6 22:46:14 hqnl0246134 sshd[262165]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 22:46:17,941] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:46:17,941] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:46:17,950] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:46:17,963] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 22:46:18,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359578.744965, 'message': 'Dec 6 22:46:17 hqnl0246134 sshd[262165]: Failed password for root from 61.177.173.18 port 42900 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 22:46:20,648] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:46:20,648] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:46:20,655] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:46:20,667] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 22:46:20,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359580.7469702, 'message': 'Dec 6 22:46:18 hqnl0246134 sshd[262175]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.165.246.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0461 seconds
INFO [2022-12-06 22:46:20,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '203.76.121.230', 'timestamp': 1670359580.7472808, 'message': 'Dec 6 22:46:20 hqnl0246134 sshd[262179]: Invalid user wordpress from 203.76.121.230 port 55774', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 22:46:20,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359580.747145, 'message': 'Dec 6 22:46:18 hqnl0246134 sshd[262175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.165.246.58 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0455 seconds
INFO [2022-12-06 22:46:20,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '203.76.121.230', 'timestamp': 1670359580.7474048, 'message': 'Dec 6 22:46:20 hqnl0246134 sshd[262179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 203.76.121.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0444 seconds
INFO [2022-12-06 22:46:20,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359580.74763, 'message': 'Dec 6 22:46:20 hqnl0246134 sshd[262175]: Failed password for root from 202.165.246.58 port 55826 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0410 seconds
INFO [2022-12-06 22:46:20,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '203.76.121.230', 'timestamp': 1670359580.7475095, 'message': 'Dec 6 22:46:20 hqnl0246134 sshd[262179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.121.230 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-06 22:46:22,786] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '203.76.121.230', 'timestamp': 1670359582.7524586, 'message': 'Dec 6 22:46:22 hqnl0246134 sshd[262179]: Failed password for invalid user wordpress from 203.76.121.230 port 55774 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 22:46:24,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '203.76.121.230', 'timestamp': 1670359584.754433, 'message': 'Dec 6 22:46:23 hqnl0246134 sshd[262179]: Disconnected from invalid user wordpress 203.76.121.230 port 55774 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:46:46,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359606.7935157, 'message': 'Dec 6 22:46:44 hqnl0246134 sshd[262194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 22:46:48,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359608.7995732, 'message': 'Dec 6 22:46:46 hqnl0246134 sshd[262194]: Failed password for root from 165.227.166.207 port 49652 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 22:46:49,398] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:46:49,398] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:46:54,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359614.80995, 'message': 'Dec 6 22:46:54 hqnl0246134 sshd[262198]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 22:46:54,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359614.81046, 'message': 'Dec 6 22:46:54 hqnl0246134 sshd[262198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:46:56,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359616.810038, 'message': 'Dec 6 22:46:55 hqnl0246134 sshd[262198]: Failed password for root from 61.177.173.18 port 63575 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 22:46:56,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359616.810295, 'message': 'Dec 6 22:46:56 hqnl0246134 sshd[262198]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0527 seconds
INFO [2022-12-06 22:46:58,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359618.812892, 'message': 'Dec 6 22:46:58 hqnl0246134 sshd[262198]: Failed password for root from 61.177.173.18 port 63575 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0463 seconds
INFO [2022-12-06 22:46:58,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359618.813268, 'message': 'Dec 6 22:46:58 hqnl0246134 sshd[262198]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:47:02,863] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359622.8234386, 'message': 'Dec 6 22:47:01 hqnl0246134 sshd[262198]: Failed password for root from 61.177.173.18 port 63575 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-06 22:47:05,696] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:47:05,697] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:47:05,706] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:47:05,719] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
WARNING [2022-12-06 22:47:10,818] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:47:10,852] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0437 seconds
INFO [2022-12-06 22:47:17,907] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:47:17,907] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:47:17,914] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:47:17,926] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 22:47:18,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359638.8455563, 'message': 'Dec 6 22:47:18 hqnl0246134 sshd[262245]: Invalid user vijay from 178.62.24.222 port 59754', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 22:47:18,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359638.8458784, 'message': 'Dec 6 22:47:18 hqnl0246134 sshd[262245]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.62.24.222 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:47:18,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359638.8461125, 'message': 'Dec 6 22:47:18 hqnl0246134 sshd[262245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.24.222 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 22:47:20,715] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:47:20,715] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:47:20,726] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:47:20,745] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0291 seconds
INFO [2022-12-06 22:47:20,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359640.8456173, 'message': 'Dec 6 22:47:19 hqnl0246134 sshd[262245]: Failed password for invalid user vijay from 178.62.24.222 port 59754 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 22:47:20,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359640.8457897, 'message': 'Dec 6 22:47:19 hqnl0246134 sshd[262245]: Disconnected from invalid user vijay 178.62.24.222 port 59754 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:47:32,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359652.8748527, 'message': 'Dec 6 22:47:31 hqnl0246134 sshd[262255]: Invalid user jack from 170.245.12.26 port 36428', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 22:47:32,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359652.8771129, 'message': 'Dec 6 22:47:31 hqnl0246134 sshd[262255]: pam_imunify(sshd:auth): [IM360_RBL] The IP 170.245.12.26 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 22:47:32,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359652.8773057, 'message': 'Dec 6 22:47:31 hqnl0246134 sshd[262255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.245.12.26 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 22:47:34,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359654.8767626, 'message': 'Dec 6 22:47:33 hqnl0246134 sshd[262255]: Failed password for invalid user jack from 170.245.12.26 port 36428 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 22:47:34,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '170.245.12.26', 'timestamp': 1670359654.8769546, 'message': 'Dec 6 22:47:33 hqnl0246134 sshd[262255]: Disconnected from invalid user jack 170.245.12.26 port 36428 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0678 seconds
INFO [2022-12-06 22:47:40,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359660.8910124, 'message': 'Dec 6 22:47:39 hqnl0246134 sshd[262268]: pam_imunify(sshd:auth): [IM360_RBL] The IP 85.233.142.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 22:47:40,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359660.8922143, 'message': 'Dec 6 22:47:40 hqnl0246134 sshd[262270]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-06 22:47:40,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359660.8914924, 'message': 'Dec 6 22:47:39 hqnl0246134 sshd[262268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.233.142.6 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 22:47:40,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359660.8924096, 'message': 'Dec 6 22:47:40 hqnl0246134 sshd[262270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 22:47:42,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359662.8931663, 'message': 'Dec 6 22:47:41 hqnl0246134 sshd[262268]: Failed password for root from 85.233.142.6 port 33468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 22:47:42,927] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359662.900843, 'message': 'Dec 6 22:47:42 hqnl0246134 sshd[262270]: Failed password for root from 61.177.173.18 port 30227 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 22:47:42,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359662.900982, 'message': 'Dec 6 22:47:42 hqnl0246134 sshd[262270]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 22:47:44,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359664.8957543, 'message': 'Dec 6 22:47:44 hqnl0246134 sshd[262270]: Failed password for root from 61.177.173.18 port 30227 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 22:47:46,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359666.898894, 'message': 'Dec 6 22:47:44 hqnl0246134 sshd[262274]: Invalid user kevin from 167.71.74.3 port 57922', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 22:47:46,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359666.8994322, 'message': 'Dec 6 22:47:45 hqnl0246134 sshd[262270]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 22:47:46,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359666.8991673, 'message': 'Dec 6 22:47:44 hqnl0246134 sshd[262274]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.71.74.3 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:47:46,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359666.8992825, 'message': 'Dec 6 22:47:44 hqnl0246134 sshd[262274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.74.3 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:47:48,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359668.9015117, 'message': 'Dec 6 22:47:47 hqnl0246134 sshd[262274]: Failed password for invalid user kevin from 167.71.74.3 port 57922 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 22:47:48,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359668.901755, 'message': 'Dec 6 22:47:47 hqnl0246134 sshd[262270]: Failed password for root from 61.177.173.18 port 30227 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 22:47:48,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359668.901871, 'message': 'Dec 6 22:47:48 hqnl0246134 sshd[262274]: Disconnected from invalid user kevin 167.71.74.3 port 57922 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 22:47:49,401] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:47:49,402] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:48:02,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359682.932757, 'message': 'Dec 6 22:48:02 hqnl0246134 sshd[262285]: Invalid user mcserver from 193.179.226.199 port 57242', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 22:48:02,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359682.9331965, 'message': 'Dec 6 22:48:02 hqnl0246134 sshd[262285]: pam_imunify(sshd:auth): [IM360_RBL] The IP 193.179.226.199 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 22:48:02,993] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359682.9333708, 'message': 'Dec 6 22:48:02 hqnl0246134 sshd[262285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.179.226.199 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:48:04,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359684.9345405, 'message': 'Dec 6 22:48:04 hqnl0246134 sshd[262285]: Failed password for invalid user mcserver from 193.179.226.199 port 57242 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:48:04,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359684.9347475, 'message': 'Dec 6 22:48:04 hqnl0246134 sshd[262285]: Disconnected from invalid user mcserver 193.179.226.199 port 57242 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:48:07,046] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:48:07,047] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:48:07,059] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:48:07,071] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0235 seconds
WARNING [2022-12-06 22:48:10,820] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:48:10,850] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0397 seconds
INFO [2022-12-06 22:48:19,037] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:48:19,038] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:48:19,073] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:48:19,189] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1440 seconds
INFO [2022-12-06 22:48:19,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359699.0463002, 'message': 'Dec 6 22:48:17 hqnl0246134 sshd[262304]: Invalid user system from 43.153.30.100 port 37020', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1437 seconds
INFO [2022-12-06 22:48:19,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359699.0464706, 'message': 'Dec 6 22:48:17 hqnl0246134 sshd[262304]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.30.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 22:48:19,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359699.0465949, 'message': 'Dec 6 22:48:17 hqnl0246134 sshd[262304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.30.100 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0516 seconds
INFO [2022-12-06 22:48:20,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359700.9669192, 'message': 'Dec 6 22:48:19 hqnl0246134 sshd[262304]: Failed password for invalid user system from 43.153.30.100 port 37020 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 22:48:20,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359700.9670997, 'message': 'Dec 6 22:48:19 hqnl0246134 sshd[262312]: Invalid user ubuntu from 220.247.10.215 port 62497', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 22:48:21,026] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359700.967488, 'message': 'Dec 6 22:48:20 hqnl0246134 sshd[262304]: Disconnected from invalid user system 43.153.30.100 port 37020 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 22:48:21,026] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359700.9672623, 'message': 'Dec 6 22:48:19 hqnl0246134 sshd[262312]: pam_imunify(sshd:auth): [IM360_RBL] The IP 220.247.10.215 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 22:48:21,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359700.9673696, 'message': 'Dec 6 22:48:19 hqnl0246134 sshd[262312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.10.215 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:48:22,571] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:48:22,571] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:48:22,578] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:48:22,589] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 22:48:23,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359702.970238, 'message': 'Dec 6 22:48:21 hqnl0246134 sshd[262312]: Failed password for invalid user ubuntu from 220.247.10.215 port 62497 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 22:48:23,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359702.9705184, 'message': 'Dec 6 22:48:21 hqnl0246134 sshd[262317]: Invalid user serveur from 177.55.100.134 port 55108', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 22:48:23,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '220.247.10.215', 'timestamp': 1670359702.9706995, 'message': 'Dec 6 22:48:21 hqnl0246134 sshd[262312]: Disconnected from invalid user ubuntu 220.247.10.215 port 62497 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 22:48:23,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359702.970878, 'message': 'Dec 6 22:48:21 hqnl0246134 sshd[262317]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.55.100.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 22:48:23,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359702.9710608, 'message': 'Dec 6 22:48:21 hqnl0246134 sshd[262317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.55.100.134 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:48:24,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359704.9706361, 'message': 'Dec 6 22:48:24 hqnl0246134 sshd[262317]: Failed password for invalid user serveur from 177.55.100.134 port 55108 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 22:48:25,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359704.970897, 'message': 'Dec 6 22:48:24 hqnl0246134 sshd[262317]: Disconnected from invalid user serveur 177.55.100.134 port 55108 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 22:48:27,012] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359706.9736118, 'message': 'Dec 6 22:48:25 hqnl0246134 sshd[262325]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 22:48:27,013] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359706.9740305, 'message': 'Dec 6 22:48:26 hqnl0246134 sshd[262329]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.204.194.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 22:48:27,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359706.9739017, 'message': 'Dec 6 22:48:25 hqnl0246134 sshd[262325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 22:48:27,047] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359706.9741824, 'message': 'Dec 6 22:48:26 hqnl0246134 sshd[262329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 22:48:29,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359708.987069, 'message': 'Dec 6 22:48:27 hqnl0246134 sshd[262331]: Invalid user bitnami from 95.0.15.234 port 40191', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 22:48:29,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359708.9877715, 'message': 'Dec 6 22:48:27 hqnl0246134 sshd[262325]: Failed password for root from 61.177.173.18 port 47400 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 22:48:29,076] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359708.9873648, 'message': 'Dec 6 22:48:27 hqnl0246134 sshd[262331]: pam_imunify(sshd:auth): [IM360_RBL] The IP 95.0.15.234 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0520 seconds
INFO [2022-12-06 22:48:29,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359708.9881454, 'message': 'Dec 6 22:48:28 hqnl0246134 sshd[262329]: Failed password for root from 194.204.194.11 port 41002 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0525 seconds
INFO [2022-12-06 22:48:29,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359708.9879584, 'message': 'Dec 6 22:48:27 hqnl0246134 sshd[262325]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0521 seconds
INFO [2022-12-06 22:48:29,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359708.98758, 'message': 'Dec 6 22:48:27 hqnl0246134 sshd[262331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.0.15.234 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:48:29,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359708.9883795, 'message': 'Dec 6 22:48:28 hqnl0246134 sshd[262331]: Failed password for invalid user bitnami from 95.0.15.234 port 40191 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:48:31,027] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '95.0.15.234', 'timestamp': 1670359710.9861653, 'message': 'Dec 6 22:48:29 hqnl0246134 sshd[262331]: Disconnected from invalid user bitnami 95.0.15.234 port 40191 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-06 22:48:31,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359710.9865735, 'message': 'Dec 6 22:48:29 hqnl0246134 sshd[262325]: Failed password for root from 61.177.173.18 port 47400 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0410 seconds
INFO [2022-12-06 22:48:31,047] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359710.9867597, 'message': 'Dec 6 22:48:30 hqnl0246134 sshd[262325]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:48:33,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359712.9896326, 'message': 'Dec 6 22:48:31 hqnl0246134 sshd[262325]: Failed password for root from 61.177.173.18 port 47400 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 22:48:49,058] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.149.77.178', 'timestamp': 1670359729.0279574, 'message': 'Dec 6 22:48:47 hqnl0246134 sshd[262342]: Invalid user oracle from 41.149.77.178 port 39182', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 22:48:49,076] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.149.77.178', 'timestamp': 1670359729.0285976, 'message': 'Dec 6 22:48:48 hqnl0246134 sshd[262342]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.149.77.178 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:48:49,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.149.77.178', 'timestamp': 1670359729.028752, 'message': 'Dec 6 22:48:48 hqnl0246134 sshd[262342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.149.77.178 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 22:48:49,406] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:48:49,407] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:48:51,071] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359731.0358646, 'message': 'Dec 6 22:48:49 hqnl0246134 sshd[262344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 22:48:51,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.149.77.178', 'timestamp': 1670359731.0363257, 'message': 'Dec 6 22:48:50 hqnl0246134 sshd[262342]: Failed password for invalid user oracle from 41.149.77.178 port 39182 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 22:48:51,090] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359731.0364645, 'message': 'Dec 6 22:48:50 hqnl0246134 sshd[262344]: Failed password for root from 165.227.166.207 port 59948 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:48:53,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.149.77.178', 'timestamp': 1670359733.0378594, 'message': 'Dec 6 22:48:51 hqnl0246134 sshd[262342]: Disconnected from invalid user oracle 41.149.77.178 port 39182 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 22:49:05,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.128.55.198', 'timestamp': 1670359745.0631895, 'message': 'Dec 6 22:49:04 hqnl0246134 sshd[262357]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.128.55.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:49:05,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.128.55.198', 'timestamp': 1670359745.0634809, 'message': 'Dec 6 22:49:04 hqnl0246134 sshd[262357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.198 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 22:49:07,090] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '178.128.55.198', 'timestamp': 1670359747.0653186, 'message': 'Dec 6 22:49:07 hqnl0246134 sshd[262357]: Failed password for root from 178.128.55.198 port 43130 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-06 22:49:09,088] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359749.0660548, 'message': 'Dec 6 22:49:08 hqnl0246134 sshd[262368]: Invalid user copy from 194.135.20.5 port 39434', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 22:49:09,110] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359749.066492, 'message': 'Dec 6 22:49:08 hqnl0246134 sshd[262368]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.135.20.5 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 22:49:09,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359749.066646, 'message': 'Dec 6 22:49:08 hqnl0246134 sshd[262368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.135.20.5 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-06 22:49:10,831] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:49:10,887] defence360agent.internals.the_sink: SensorIncidentList(<29 item(s)>) processed in 0.0713 seconds
INFO [2022-12-06 22:49:11,113] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359751.0697749, 'message': 'Dec 6 22:49:09 hqnl0246134 sshd[262371]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0431 seconds
INFO [2022-12-06 22:49:11,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '34.171.187.57', 'timestamp': 1670359751.0699692, 'message': 'Dec 6 22:49:09 hqnl0246134 sshd[262373]: pam_imunify(sshd:auth): [IM360_RBL] The IP 34.171.187.57 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0437 seconds
INFO [2022-12-06 22:49:11,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359751.070314, 'message': 'Dec 6 22:49:10 hqnl0246134 sshd[262368]: Failed password for invalid user copy from 194.135.20.5 port 39434 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0438 seconds
INFO [2022-12-06 22:49:11,157] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359751.070098, 'message': 'Dec 6 22:49:09 hqnl0246134 sshd[262371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-06 22:49:11,158] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '34.171.187.57', 'timestamp': 1670359751.0702057, 'message': 'Dec 6 22:49:09 hqnl0246134 sshd[262373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.171.187.57 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-06 22:49:11,159] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359751.070431, 'message': 'Dec 6 22:49:10 hqnl0246134 sshd[262368]: Disconnected from invalid user copy 194.135.20.5 port 39434 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0418 seconds
INFO [2022-12-06 22:49:13,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '34.171.187.57', 'timestamp': 1670359753.0707936, 'message': 'Dec 6 22:49:11 hqnl0246134 sshd[262373]: Failed password for root from 34.171.187.57 port 53584 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0497 seconds
INFO [2022-12-06 22:49:13,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359753.0711682, 'message': 'Dec 6 22:49:11 hqnl0246134 sshd[262371]: Failed password for root from 61.177.173.18 port 59301 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0489 seconds
INFO [2022-12-06 22:49:13,140] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359753.0714924, 'message': 'Dec 6 22:49:12 hqnl0246134 sshd[262371]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:49:15,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359755.072397, 'message': 'Dec 6 22:49:14 hqnl0246134 sshd[262371]: Failed password for root from 61.177.173.18 port 59301 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:49:15,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359755.0726933, 'message': 'Dec 6 22:49:14 hqnl0246134 sshd[262371]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 22:49:17,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359757.0737333, 'message': 'Dec 6 22:49:16 hqnl0246134 sshd[262371]: Failed password for root from 61.177.173.18 port 59301 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:49:17,947] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:49:17,947] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:49:17,968] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:49:17,981] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0224 seconds
INFO [2022-12-06 22:49:20,757] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:49:20,757] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:49:20,766] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:49:20,778] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 22:49:43,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359783.1293168, 'message': 'Dec 6 22:49:42 hqnl0246134 sshd[262399]: Invalid user jenkins from 202.165.246.58 port 42506', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0433 seconds
INFO [2022-12-06 22:49:43,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359783.1302195, 'message': 'Dec 6 22:49:42 hqnl0246134 sshd[262399]: pam_imunify(sshd:auth): [IM360_RBL] The IP 202.165.246.58 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 22:49:43,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359783.1304884, 'message': 'Dec 6 22:49:42 hqnl0246134 sshd[262399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.165.246.58 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:49:45,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359785.129966, 'message': 'Dec 6 22:49:43 hqnl0246134 sshd[262399]: Failed password for invalid user jenkins from 202.165.246.58 port 42506 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0523 seconds
INFO [2022-12-06 22:49:45,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.89.85.14', 'timestamp': 1670359785.1303692, 'message': 'Dec 6 22:49:44 hqnl0246134 sshd[262401]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.89.85.14 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0528 seconds
INFO [2022-12-06 22:49:45,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '202.165.246.58', 'timestamp': 1670359785.130254, 'message': 'Dec 6 22:49:44 hqnl0246134 sshd[262399]: Disconnected from invalid user jenkins 202.165.246.58 port 42506 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-06 22:49:45,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.89.85.14', 'timestamp': 1670359785.1305714, 'message': 'Dec 6 22:49:44 hqnl0246134 sshd[262401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.85.14 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0423 seconds
INFO [2022-12-06 22:49:47,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.89.85.14', 'timestamp': 1670359787.1328828, 'message': 'Dec 6 22:49:46 hqnl0246134 sshd[262401]: Failed password for root from 103.89.85.14 port 45364 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0665 seconds
INFO [2022-12-06 22:49:48,286] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:49:48,287] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:49:48,296] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:49:48,309] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
WARNING [2022-12-06 22:49:49,410] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:49:49,410] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:49:57,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359797.1508465, 'message': 'Dec 6 22:49:56 hqnl0246134 sshd[262410]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 22:49:57,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359797.1511326, 'message': 'Dec 6 22:49:56 hqnl0246134 sshd[262410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 22:49:59,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359799.1563873, 'message': 'Dec 6 22:49:57 hqnl0246134 sshd[262410]: Failed password for root from 61.177.173.18 port 31093 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:49:59,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359799.1565874, 'message': 'Dec 6 22:49:58 hqnl0246134 sshd[262410]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:50:01,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359801.1611881, 'message': 'Dec 6 22:50:00 hqnl0246134 sshd[262410]: Failed password for root from 61.177.173.18 port 31093 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 22:50:03,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359803.1676736, 'message': 'Dec 6 22:50:02 hqnl0246134 sshd[262410]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 22:50:05,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359805.1728013, 'message': 'Dec 6 22:50:04 hqnl0246134 sshd[262410]: Failed password for root from 61.177.173.18 port 31093 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 22:50:07,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.255.116.74', 'timestamp': 1670359807.1743364, 'message': 'Dec 6 22:50:05 hqnl0246134 sshd[262435]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.255.116.74 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 22:50:07,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.255.116.74', 'timestamp': 1670359807.1746967, 'message': 'Dec 6 22:50:05 hqnl0246134 sshd[262435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.255.116.74 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:50:09,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.255.116.74', 'timestamp': 1670359809.1760762, 'message': 'Dec 6 22:50:07 hqnl0246134 sshd[262435]: Failed password for root from 139.255.116.74 port 51224 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 22:50:10,829] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:50:10,859] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0384 seconds
INFO [2022-12-06 22:50:17,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359817.1969492, 'message': 'Dec 6 22:50:16 hqnl0246134 sshd[262481]: Invalid user fileshare from 167.71.74.3 port 47206', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0614 seconds
INFO [2022-12-06 22:50:17,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359817.197215, 'message': 'Dec 6 22:50:16 hqnl0246134 sshd[262481]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.71.74.3 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0594 seconds
INFO [2022-12-06 22:50:17,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359817.1974287, 'message': 'Dec 6 22:50:16 hqnl0246134 sshd[262481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.74.3 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 22:50:18,928] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:50:18,929] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:50:18,937] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:50:18,950] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 22:50:21,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359821.2017503, 'message': 'Dec 6 22:50:19 hqnl0246134 sshd[262481]: Failed password for invalid user fileshare from 167.71.74.3 port 47206 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 22:50:21,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359821.2019618, 'message': 'Dec 6 22:50:19 hqnl0246134 sshd[262481]: Disconnected from invalid user fileshare 167.71.74.3 port 47206 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:50:21,672] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:50:21,672] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:50:21,679] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:50:21,690] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 22:50:27,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359827.2102292, 'message': 'Dec 6 22:50:25 hqnl0246134 sshd[262496]: Invalid user mysqler from 85.233.142.6 port 50480', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 22:50:27,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359827.210537, 'message': 'Dec 6 22:50:25 hqnl0246134 sshd[262496]: pam_imunify(sshd:auth): [IM360_RBL] The IP 85.233.142.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 22:50:27,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359827.210706, 'message': 'Dec 6 22:50:25 hqnl0246134 sshd[262496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.233.142.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 22:50:29,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359829.2147396, 'message': 'Dec 6 22:50:27 hqnl0246134 sshd[262496]: Failed password for invalid user mysqler from 85.233.142.6 port 50480 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 22:50:29,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359829.214946, 'message': 'Dec 6 22:50:27 hqnl0246134 sshd[262496]: Disconnected from invalid user mysqler 85.233.142.6 port 50480 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 22:50:41,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '203.76.121.230', 'timestamp': 1670359841.227442, 'message': 'Dec 6 22:50:41 hqnl0246134 sshd[262508]: pam_imunify(sshd:auth): [IM360_RBL] The IP 203.76.121.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-06 22:50:41,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '203.76.121.230', 'timestamp': 1670359841.2284775, 'message': 'Dec 6 22:50:41 hqnl0246134 sshd[262508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.121.230 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 22:50:43,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359843.2281122, 'message': 'Dec 6 22:50:42 hqnl0246134 sshd[262510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0441 seconds
INFO [2022-12-06 22:50:43,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '203.76.121.230', 'timestamp': 1670359843.228584, 'message': 'Dec 6 22:50:42 hqnl0246134 sshd[262508]: Failed password for root from 203.76.121.230 port 50970 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0435 seconds
INFO [2022-12-06 22:50:43,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359843.2284255, 'message': 'Dec 6 22:50:42 hqnl0246134 sshd[262510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:50:45,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359845.234395, 'message': 'Dec 6 22:50:44 hqnl0246134 sshd[262510]: Failed password for root from 61.177.173.18 port 51574 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 22:50:47,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359847.2371938, 'message': 'Dec 6 22:50:46 hqnl0246134 sshd[262510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 22:50:49,260] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359849.239842, 'message': 'Dec 6 22:50:47 hqnl0246134 sshd[262512]: pam_imunify(sshd:auth): [IM360_RBL] The IP 193.179.226.199 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 22:50:49,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359849.2401779, 'message': 'Dec 6 22:50:47 hqnl0246134 sshd[262512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.179.226.199 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 22:50:49,412] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:50:49,413] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:50:51,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359851.2424872, 'message': 'Dec 6 22:50:49 hqnl0246134 sshd[262510]: Failed password for root from 61.177.173.18 port 51574 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 22:50:51,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '193.179.226.199', 'timestamp': 1670359851.2427754, 'message': 'Dec 6 22:50:50 hqnl0246134 sshd[262512]: Failed password for root from 193.179.226.199 port 45886 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 22:50:53,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359853.2447271, 'message': 'Dec 6 22:50:51 hqnl0246134 sshd[262510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:50:54,711] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:50:54,712] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:50:54,741] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:50:54,786] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0643 seconds
INFO [2022-12-06 22:50:55,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359855.2466888, 'message': 'Dec 6 22:50:53 hqnl0246134 sshd[262510]: Failed password for root from 61.177.173.18 port 51574 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 22:50:55,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359855.2470949, 'message': 'Dec 6 22:50:54 hqnl0246134 sshd[262518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 22:50:57,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359857.2509575, 'message': 'Dec 6 22:50:56 hqnl0246134 sshd[262518]: Failed password for root from 165.227.166.207 port 42012 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:50:59,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359859.2534304, 'message': 'Dec 6 22:50:59 hqnl0246134 sshd[262524]: Invalid user ubuntu from 43.153.30.100 port 44496', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0579 seconds
INFO [2022-12-06 22:51:01,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359861.2594612, 'message': 'Dec 6 22:50:59 hqnl0246134 sshd[262524]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.30.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 22:51:01,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359861.2597415, 'message': 'Dec 6 22:50:59 hqnl0246134 sshd[262524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.30.100 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 22:51:03,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359863.2577274, 'message': 'Dec 6 22:51:01 hqnl0246134 sshd[262524]: Failed password for invalid user ubuntu from 43.153.30.100 port 44496 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 22:51:05,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.100', 'timestamp': 1670359865.2630794, 'message': 'Dec 6 22:51:03 hqnl0246134 sshd[262524]: Disconnected from invalid user ubuntu 43.153.30.100 port 44496 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 22:51:10,835] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:51:10,865] defence360agent.internals.the_sink: SensorIncidentList(<20 item(s)>) processed in 0.0397 seconds
INFO [2022-12-06 22:51:13,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359873.2774966, 'message': 'Dec 6 22:51:11 hqnl0246134 sshd[262547]: Invalid user oraprod from 178.62.24.222 port 49410', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 22:51:13,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359873.277777, 'message': 'Dec 6 22:51:11 hqnl0246134 sshd[262547]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.62.24.222 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:51:13,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359873.277912, 'message': 'Dec 6 22:51:11 hqnl0246134 sshd[262547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.24.222 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1194 seconds
INFO [2022-12-06 22:51:15,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359875.2785726, 'message': 'Dec 6 22:51:14 hqnl0246134 sshd[262547]: Failed password for invalid user oraprod from 178.62.24.222 port 49410 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 22:51:15,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359875.2788994, 'message': 'Dec 6 22:51:14 hqnl0246134 sshd[262549]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 22:51:15,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.62.24.222', 'timestamp': 1670359875.2787638, 'message': 'Dec 6 22:51:14 hqnl0246134 sshd[262547]: Disconnected from invalid user oraprod 178.62.24.222 port 49410 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 22:51:15,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359875.2790437, 'message': 'Dec 6 22:51:14 hqnl0246134 sshd[262549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0378 seconds
INFO [2022-12-06 22:51:17,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359877.280244, 'message': 'Dec 6 22:51:17 hqnl0246134 sshd[262549]: Failed password for root from 36.110.228.254 port 48002 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:51:17,982] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:51:17,982] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:51:17,989] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:51:18,001] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 22:51:19,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359879.284546, 'message': 'Dec 6 22:51:18 hqnl0246134 sshd[262549]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:51:20,734] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:51:20,734] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:51:20,744] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:51:20,757] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-06 22:51:21,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359881.2894247, 'message': 'Dec 6 22:51:20 hqnl0246134 sshd[262549]: Failed password for root from 36.110.228.254 port 48002 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:51:21,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359881.2896569, 'message': 'Dec 6 22:51:21 hqnl0246134 sshd[262549]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:51:25,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359885.294621, 'message': 'Dec 6 22:51:23 hqnl0246134 sshd[262549]: Failed password for root from 36.110.228.254 port 48002 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 22:51:27,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359887.298469, 'message': 'Dec 6 22:51:25 hqnl0246134 sshd[262549]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:51:27,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359887.2987247, 'message': 'Dec 6 22:51:27 hqnl0246134 sshd[262549]: Failed password for root from 36.110.228.254 port 48002 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 22:51:29,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359889.3000257, 'message': 'Dec 6 22:51:27 hqnl0246134 sshd[262549]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 22:51:31,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359891.303143, 'message': 'Dec 6 22:51:29 hqnl0246134 sshd[262549]: Failed password for root from 36.110.228.254 port 48002 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 22:51:31,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359891.3036363, 'message': 'Dec 6 22:51:30 hqnl0246134 sshd[262563]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 22:51:31,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359891.3035088, 'message': 'Dec 6 22:51:29 hqnl0246134 sshd[262549]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 22:51:31,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359891.3038292, 'message': 'Dec 6 22:51:30 hqnl0246134 sshd[262563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 22:51:33,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359893.3068473, 'message': 'Dec 6 22:51:32 hqnl0246134 sshd[262563]: Failed password for root from 61.177.173.18 port 22618 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 22:51:33,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359893.307255, 'message': 'Dec 6 22:51:32 hqnl0246134 sshd[262549]: Failed password for root from 36.110.228.254 port 48002 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 22:51:33,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359893.307126, 'message': 'Dec 6 22:51:32 hqnl0246134 sshd[262563]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:51:35,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5758, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359895.3098245, 'message': 'Dec 6 22:51:34 hqnl0246134 sshd[262549]: error: maximum authentication attempts exceeded for root from 36.110.228.254 port 48002 ssh2 [preauth]', 'severity': 3, 'name': 'Maximum authentication attempts exceeded.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 22:51:35,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359895.3100452, 'message': 'Dec 6 22:51:34 hqnl0246134 sshd[262563]: Failed password for root from 61.177.173.18 port 22618 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 22:51:37,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359897.3172984, 'message': 'Dec 6 22:51:36 hqnl0246134 sshd[262566]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 22:51:37,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359897.3183334, 'message': 'Dec 6 22:51:36 hqnl0246134 sshd[262563]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 22:51:37,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359897.3182013, 'message': 'Dec 6 22:51:36 hqnl0246134 sshd[262566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 22:51:39,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359899.3200798, 'message': 'Dec 6 22:51:37 hqnl0246134 sshd[262566]: Failed password for root from 36.110.228.254 port 22470 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 22:51:39,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359899.3211277, 'message': 'Dec 6 22:51:38 hqnl0246134 sshd[262563]: Failed password for root from 61.177.173.18 port 22618 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 22:51:39,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359899.3202825, 'message': 'Dec 6 22:51:38 hqnl0246134 sshd[262566]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:51:40,117] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 22:51:40,119] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 22:51:40,956] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-06 22:51:41,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359901.322407, 'message': 'Dec 6 22:51:39 hqnl0246134 sshd[262576]: Invalid user oracle from 177.55.100.134 port 57854', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-06 22:51:41,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359901.3230827, 'message': 'Dec 6 22:51:40 hqnl0246134 sshd[262566]: Failed password for root from 36.110.228.254 port 22470 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-06 22:51:41,382] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359901.3228025, 'message': 'Dec 6 22:51:39 hqnl0246134 sshd[262576]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.55.100.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:51:41,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359901.322953, 'message': 'Dec 6 22:51:39 hqnl0246134 sshd[262576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.55.100.134 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 22:51:43,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359903.3224545, 'message': 'Dec 6 22:51:41 hqnl0246134 sshd[262576]: Failed password for invalid user oracle from 177.55.100.134 port 57854 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0477 seconds
INFO [2022-12-06 22:51:43,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359903.3226492, 'message': 'Dec 6 22:51:42 hqnl0246134 sshd[262590]: Invalid user admin from 194.204.194.11 port 57866', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0481 seconds
INFO [2022-12-06 22:51:43,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359903.3230188, 'message': 'Dec 6 22:51:42 hqnl0246134 sshd[262566]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 22:51:43,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359903.322781, 'message': 'Dec 6 22:51:42 hqnl0246134 sshd[262590]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.204.194.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:51:43,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359903.3228865, 'message': 'Dec 6 22:51:42 hqnl0246134 sshd[262590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:51:45,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.55.100.134', 'timestamp': 1670359905.3257794, 'message': 'Dec 6 22:51:43 hqnl0246134 sshd[262576]: Disconnected from invalid user oracle 177.55.100.134 port 57854 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0585 seconds
INFO [2022-12-06 22:51:45,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359905.3259995, 'message': 'Dec 6 22:51:44 hqnl0246134 sshd[262590]: Failed password for invalid user admin from 194.204.194.11 port 57866 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0585 seconds
INFO [2022-12-06 22:51:45,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359905.3261123, 'message': 'Dec 6 22:51:44 hqnl0246134 sshd[262566]: Failed password for root from 36.110.228.254 port 22470 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0587 seconds
INFO [2022-12-06 22:51:45,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670359905.3266518, 'message': 'Dec 6 22:51:44 hqnl0246134 sshd[262590]: Disconnected from invalid user admin 194.204.194.11 port 57866 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-06 22:51:45,425] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359905.326823, 'message': 'Dec 6 22:51:44 hqnl0246134 sshd[262566]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-06 22:51:49,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359909.3287745, 'message': 'Dec 6 22:51:47 hqnl0246134 sshd[262566]: Failed password for root from 36.110.228.254 port 22470 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
WARNING [2022-12-06 22:51:49,416] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:51:49,417] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:51:51,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359911.330128, 'message': 'Dec 6 22:51:49 hqnl0246134 sshd[262566]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 22:51:53,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359913.3311243, 'message': 'Dec 6 22:51:51 hqnl0246134 sshd[262566]: Failed password for root from 36.110.228.254 port 22470 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
WARNING [2022-12-06 22:51:54,040] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 22:51:55,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359915.3318784, 'message': 'Dec 6 22:51:53 hqnl0246134 sshd[262566]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:51:57,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359917.3336592, 'message': 'Dec 6 22:51:55 hqnl0246134 sshd[262566]: Failed password for root from 36.110.228.254 port 22470 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:51:59,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5758, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359919.3354383, 'message': 'Dec 6 22:51:57 hqnl0246134 sshd[262566]: error: maximum authentication attempts exceeded for root from 36.110.228.254 port 22470 ssh2 [preauth]', 'severity': 3, 'name': 'Maximum authentication attempts exceeded.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:51:59,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359919.3356178, 'message': 'Dec 6 22:51:59 hqnl0246134 sshd[262601]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:51:59,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359919.3357646, 'message': 'Dec 6 22:51:59 hqnl0246134 sshd[262601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0161 seconds
INFO [2022-12-06 22:52:00,306] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:52:00,307] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:52:00,315] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:52:00,328] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 22:52:01,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359921.3377883, 'message': 'Dec 6 22:52:01 hqnl0246134 sshd[262601]: Failed password for root from 36.110.228.254 port 51614 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 22:52:05,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359925.3435109, 'message': 'Dec 6 22:52:03 hqnl0246134 sshd[262601]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 22:52:05,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359925.3437462, 'message': 'Dec 6 22:52:04 hqnl0246134 sshd[262621]: Invalid user ks from 194.135.20.5 port 43868', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 22:52:05,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359925.3439872, 'message': 'Dec 6 22:52:04 hqnl0246134 sshd[262621]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.135.20.5 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:52:05,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359925.3441098, 'message': 'Dec 6 22:52:04 hqnl0246134 sshd[262621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.135.20.5 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:52:07,406] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359927.3484287, 'message': 'Dec 6 22:52:05 hqnl0246134 sshd[262601]: Failed password for root from 36.110.228.254 port 51614 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0566 seconds
INFO [2022-12-06 22:52:07,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359927.3495018, 'message': 'Dec 6 22:52:07 hqnl0246134 sshd[262621]: Failed password for invalid user ks from 194.135.20.5 port 43868 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0574 seconds
INFO [2022-12-06 22:52:07,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359927.349067, 'message': 'Dec 6 22:52:05 hqnl0246134 sshd[262601]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 22:52:09,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359929.3495796, 'message': 'Dec 6 22:52:08 hqnl0246134 sshd[262601]: Failed password for root from 36.110.228.254 port 51614 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 22:52:09,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.135.20.5', 'timestamp': 1670359929.3498373, 'message': 'Dec 6 22:52:08 hqnl0246134 sshd[262621]: Disconnected from invalid user ks 194.135.20.5 port 43868 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
WARNING [2022-12-06 22:52:10,838] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:52:10,865] defence360agent.internals.the_sink: SensorIncidentList(<20 item(s)>) processed in 0.0355 seconds
INFO [2022-12-06 22:52:11,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359931.3525758, 'message': 'Dec 6 22:52:11 hqnl0246134 sshd[262653]: Invalid user admin from 36.110.228.254 port 36168', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 22:52:11,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359931.3528266, 'message': 'Dec 6 22:52:11 hqnl0246134 sshd[262653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 22:52:11,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359931.3530107, 'message': 'Dec 6 22:52:11 hqnl0246134 sshd[262653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:52:13,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359933.3536751, 'message': 'Dec 6 22:52:13 hqnl0246134 sshd[262653]: Failed password for invalid user admin from 36.110.228.254 port 36168 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:52:15,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359935.3560746, 'message': 'Dec 6 22:52:14 hqnl0246134 sshd[262653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 22:52:17,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359937.357802, 'message': 'Dec 6 22:52:16 hqnl0246134 sshd[262657]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:52:17,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359937.3579905, 'message': 'Dec 6 22:52:16 hqnl0246134 sshd[262657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:52:17,821] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:52:17,822] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:52:17,831] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:52:17,843] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 22:52:19,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359939.359014, 'message': 'Dec 6 22:52:17 hqnl0246134 sshd[262653]: Failed password for invalid user admin from 36.110.228.254 port 36168 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 22:52:19,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359939.3591847, 'message': 'Dec 6 22:52:18 hqnl0246134 sshd[262653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:52:20,376] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:52:20,376] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:52:20,387] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:52:20,404] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0267 seconds
INFO [2022-12-06 22:52:21,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359941.3616226, 'message': 'Dec 6 22:52:19 hqnl0246134 sshd[262657]: Failed password for root from 61.177.173.18 port 43535 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0472 seconds
INFO [2022-12-06 22:52:21,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359941.3620167, 'message': 'Dec 6 22:52:20 hqnl0246134 sshd[262653]: Failed password for invalid user admin from 36.110.228.254 port 36168 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0477 seconds
INFO [2022-12-06 22:52:21,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359941.3704915, 'message': 'Dec 6 22:52:21 hqnl0246134 sshd[262657]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 22:52:23,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359943.3653193, 'message': 'Dec 6 22:52:22 hqnl0246134 sshd[262653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 22:52:25,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359945.3685336, 'message': 'Dec 6 22:52:23 hqnl0246134 sshd[262657]: Failed password for root from 61.177.173.18 port 43535 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 22:52:25,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359945.3688564, 'message': 'Dec 6 22:52:24 hqnl0246134 sshd[262653]: Failed password for invalid user admin from 36.110.228.254 port 36168 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0479 seconds
INFO [2022-12-06 22:52:25,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359945.3690743, 'message': 'Dec 6 22:52:24 hqnl0246134 sshd[262653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 22:52:27,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359947.3715017, 'message': 'Dec 6 22:52:25 hqnl0246134 sshd[262657]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0564 seconds
INFO [2022-12-06 22:52:27,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.149.77.178', 'timestamp': 1670359947.3718631, 'message': 'Dec 6 22:52:25 hqnl0246134 sshd[262671]: Invalid user serveur from 41.149.77.178 port 55154', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0567 seconds
INFO [2022-12-06 22:52:27,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359947.3724983, 'message': 'Dec 6 22:52:26 hqnl0246134 sshd[262653]: Failed password for invalid user admin from 36.110.228.254 port 36168 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0560 seconds
INFO [2022-12-06 22:52:27,462] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.149.77.178', 'timestamp': 1670359947.3720567, 'message': 'Dec 6 22:52:25 hqnl0246134 sshd[262671]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.149.77.178 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 22:52:27,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359947.3726547, 'message': 'Dec 6 22:52:26 hqnl0246134 sshd[262653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 22:52:27,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.149.77.178', 'timestamp': 1670359947.3722596, 'message': 'Dec 6 22:52:25 hqnl0246134 sshd[262671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.149.77.178 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 22:52:29,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359949.3740654, 'message': 'Dec 6 22:52:27 hqnl0246134 sshd[262657]: Failed password for root from 61.177.173.18 port 43535 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 22:52:29,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.149.77.178', 'timestamp': 1670359949.3743265, 'message': 'Dec 6 22:52:27 hqnl0246134 sshd[262671]: Failed password for invalid user serveur from 41.149.77.178 port 55154 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 22:52:29,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.149.77.178', 'timestamp': 1670359949.3744993, 'message': 'Dec 6 22:52:28 hqnl0246134 sshd[262671]: Disconnected from invalid user serveur 41.149.77.178 port 55154 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:52:31,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359951.3772047, 'message': 'Dec 6 22:52:29 hqnl0246134 sshd[262653]: Failed password for invalid user admin from 36.110.228.254 port 36168 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 22:52:31,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359951.3774536, 'message': 'Dec 6 22:52:30 hqnl0246134 sshd[262653]: error: maximum authentication attempts exceeded for invalid user admin from 36.110.228.254 port 36168 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 22:52:31,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359951.377571, 'message': 'Dec 6 22:52:30 hqnl0246134 sshd[262653]: Disconnecting invalid user admin 36.110.228.254 port 36168: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:52:33,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359953.379219, 'message': 'Dec 6 22:52:31 hqnl0246134 sshd[262675]: Invalid user admin from 36.110.228.254 port 50945', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 22:52:33,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359953.380401, 'message': 'Dec 6 22:52:31 hqnl0246134 sshd[262675]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 22:52:33,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359953.3806398, 'message': 'Dec 6 22:52:31 hqnl0246134 sshd[262675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 22:52:35,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359955.3808343, 'message': 'Dec 6 22:52:33 hqnl0246134 sshd[262675]: Failed password for invalid user admin from 36.110.228.254 port 50945 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 22:52:35,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359955.3810713, 'message': 'Dec 6 22:52:33 hqnl0246134 sshd[262675]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:52:35,752] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 22:52:35,825] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 22:52:35,825] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 22:52:35,826] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 22:52:35,826] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 22:52:35,826] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 22:52:35,836] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 22:52:35,854] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0275 seconds
WARNING [2022-12-06 22:52:35,863] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 22:52:35,868] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:52:35,891] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0423 seconds
INFO [2022-12-06 22:52:35,893] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0407 seconds
INFO [2022-12-06 22:52:37,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359957.3823054, 'message': 'Dec 6 22:52:36 hqnl0246134 sshd[262675]: Failed password for invalid user admin from 36.110.228.254 port 50945 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 22:52:39,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359959.386035, 'message': 'Dec 6 22:52:37 hqnl0246134 sshd[262675]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 22:52:41,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359961.3896627, 'message': 'Dec 6 22:52:40 hqnl0246134 sshd[262675]: Failed password for invalid user admin from 36.110.228.254 port 50945 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 22:52:43,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359963.3935745, 'message': 'Dec 6 22:52:41 hqnl0246134 sshd[262675]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:52:45,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359965.3984072, 'message': 'Dec 6 22:52:44 hqnl0246134 sshd[262675]: Failed password for invalid user admin from 36.110.228.254 port 50945 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:52:47,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359967.4028502, 'message': 'Dec 6 22:52:45 hqnl0246134 sshd[262675]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 22:52:49,419] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:52:49,420] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:52:49,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359969.405765, 'message': 'Dec 6 22:52:47 hqnl0246134 sshd[262675]: Failed password for invalid user admin from 36.110.228.254 port 50945 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 22:52:51,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359971.4085839, 'message': 'Dec 6 22:52:49 hqnl0246134 sshd[262675]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 22:52:53,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359973.4098592, 'message': 'Dec 6 22:52:52 hqnl0246134 sshd[262675]: Failed password for invalid user admin from 36.110.228.254 port 50945 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 22:52:53,444] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359973.4100456, 'message': 'Dec 6 22:52:52 hqnl0246134 sshd[262687]: Invalid user orajsd from 167.71.74.3 port 36480', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 22:52:53,463] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359973.4106145, 'message': 'Dec 6 22:52:52 hqnl0246134 sshd[262687]: pam_imunify(sshd:auth): [IM360_RBL] The IP 167.71.74.3 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:52:53,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359973.4108036, 'message': 'Dec 6 22:52:52 hqnl0246134 sshd[262687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.74.3 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:52:55,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359975.4127991, 'message': 'Dec 6 22:52:53 hqnl0246134 sshd[262675]: error: maximum authentication attempts exceeded for invalid user admin from 36.110.228.254 port 50945 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0391 seconds
INFO [2022-12-06 22:52:55,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359975.413152, 'message': 'Dec 6 22:52:54 hqnl0246134 sshd[262687]: Failed password for invalid user orajsd from 167.71.74.3 port 36480 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0399 seconds
INFO [2022-12-06 22:52:55,474] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359975.4129777, 'message': 'Dec 6 22:52:53 hqnl0246134 sshd[262675]: Disconnecting invalid user admin 36.110.228.254 port 50945: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:52:55,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359975.4132786, 'message': 'Dec 6 22:52:55 hqnl0246134 sshd[262689]: Invalid user admin from 36.110.228.254 port 15100', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 22:52:55,514] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359975.413385, 'message': 'Dec 6 22:52:55 hqnl0246134 sshd[262689]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:52:55,532] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359975.4135385, 'message': 'Dec 6 22:52:55 hqnl0246134 sshd[262689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:52:57,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '167.71.74.3', 'timestamp': 1670359977.414644, 'message': 'Dec 6 22:52:55 hqnl0246134 sshd[262687]: Disconnected from invalid user orajsd 167.71.74.3 port 36480 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0503 seconds
INFO [2022-12-06 22:52:57,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.89.85.14', 'timestamp': 1670359977.414896, 'message': 'Dec 6 22:52:56 hqnl0246134 sshd[262691]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.89.85.14 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0504 seconds
INFO [2022-12-06 22:52:57,468] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359977.4153323, 'message': 'Dec 6 22:52:56 hqnl0246134 sshd[262689]: Failed password for invalid user admin from 36.110.228.254 port 15100 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0498 seconds
INFO [2022-12-06 22:52:57,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.89.85.14', 'timestamp': 1670359977.415115, 'message': 'Dec 6 22:52:56 hqnl0246134 sshd[262691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.85.14 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:52:59,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359979.417218, 'message': 'Dec 6 22:52:57 hqnl0246134 sshd[262696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0684 seconds
INFO [2022-12-06 22:52:59,487] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359979.4175353, 'message': 'Dec 6 22:52:57 hqnl0246134 sshd[262689]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0684 seconds
INFO [2022-12-06 22:52:59,487] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.89.85.14', 'timestamp': 1670359979.4177094, 'message': 'Dec 6 22:52:58 hqnl0246134 sshd[262691]: Failed password for root from 103.89.85.14 port 34802 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0678 seconds
INFO [2022-12-06 22:53:01,057] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:53:01,057] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:53:01,067] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:53:01,084] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0264 seconds
INFO [2022-12-06 22:53:01,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670359981.4180756, 'message': 'Dec 6 22:52:59 hqnl0246134 sshd[262696]: Failed password for root from 165.227.166.207 port 52298 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 22:53:01,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359981.418264, 'message': 'Dec 6 22:52:59 hqnl0246134 sshd[262689]: Failed password for invalid user admin from 36.110.228.254 port 15100 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-06 22:53:03,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359983.4221423, 'message': 'Dec 6 22:53:01 hqnl0246134 sshd[262689]: Disconnected from invalid user admin 36.110.228.254 port 15100 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 22:53:03,454] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359983.4223442, 'message': 'Dec 6 22:53:02 hqnl0246134 sshd[262711]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 22:53:03,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359983.422594, 'message': 'Dec 6 22:53:03 hqnl0246134 sshd[262713]: Invalid user oracle from 36.110.228.254 port 41548', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 22:53:03,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359983.4224837, 'message': 'Dec 6 22:53:02 hqnl0246134 sshd[262711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 22:53:03,506] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359983.4229436, 'message': 'Dec 6 22:53:03 hqnl0246134 sshd[262713]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 22:53:03,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359983.423049, 'message': 'Dec 6 22:53:03 hqnl0246134 sshd[262713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 22:53:05,468] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359985.4257534, 'message': 'Dec 6 22:53:04 hqnl0246134 sshd[262711]: Failed password for root from 61.177.173.18 port 10987 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0416 seconds
INFO [2022-12-06 22:53:05,468] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359985.4260495, 'message': 'Dec 6 22:53:05 hqnl0246134 sshd[262713]: Failed password for invalid user oracle from 36.110.228.254 port 41548 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0414 seconds
INFO [2022-12-06 22:53:05,952] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 22:53:05,952] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 22:53:05,953] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 22:53:07,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359987.4290097, 'message': 'Dec 6 22:53:06 hqnl0246134 sshd[262713]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 22:53:07,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359987.4293673, 'message': 'Dec 6 22:53:07 hqnl0246134 sshd[262711]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 22:53:09,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359989.4298944, 'message': 'Dec 6 22:53:08 hqnl0246134 sshd[262713]: Failed password for invalid user oracle from 36.110.228.254 port 41548 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 22:53:09,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359989.4309258, 'message': 'Dec 6 22:53:08 hqnl0246134 sshd[262711]: Failed password for root from 61.177.173.18 port 10987 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 22:53:09,493] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359989.4310367, 'message': 'Dec 6 22:53:08 hqnl0246134 sshd[262713]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 22:53:09,493] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359989.43117, 'message': 'Dec 6 22:53:09 hqnl0246134 sshd[262711]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
WARNING [2022-12-06 22:53:10,842] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:53:10,869] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0354 seconds
INFO [2022-12-06 22:53:11,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359991.4320412, 'message': 'Dec 6 22:53:10 hqnl0246134 sshd[262713]: Failed password for invalid user oracle from 36.110.228.254 port 41548 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-06 22:53:11,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670359991.432311, 'message': 'Dec 6 22:53:11 hqnl0246134 sshd[262711]: Failed password for root from 61.177.173.18 port 10987 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 22:53:13,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359993.4338202, 'message': 'Dec 6 22:53:12 hqnl0246134 sshd[262713]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 22:53:15,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359995.4398842, 'message': 'Dec 6 22:53:14 hqnl0246134 sshd[262713]: Failed password for invalid user oracle from 36.110.228.254 port 41548 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 22:53:17,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359997.4420228, 'message': 'Dec 6 22:53:16 hqnl0246134 sshd[262727]: Invalid user admin from 85.233.142.6 port 39278', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 22:53:17,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359997.442531, 'message': 'Dec 6 22:53:16 hqnl0246134 sshd[262713]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-06 22:53:17,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359997.4422717, 'message': 'Dec 6 22:53:16 hqnl0246134 sshd[262727]: pam_imunify(sshd:auth): [IM360_RBL] The IP 85.233.142.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 22:53:17,512] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359997.44241, 'message': 'Dec 6 22:53:16 hqnl0246134 sshd[262727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.233.142.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:53:17,892] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:53:17,893] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:53:17,899] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:53:17,910] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0165 seconds
INFO [2022-12-06 22:53:19,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359999.444413, 'message': 'Dec 6 22:53:17 hqnl0246134 sshd[262727]: Failed password for invalid user admin from 85.233.142.6 port 39278 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-06 22:53:19,474] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359999.4446166, 'message': 'Dec 6 22:53:18 hqnl0246134 sshd[262713]: Failed password for invalid user oracle from 36.110.228.254 port 41548 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 22:53:19,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '85.233.142.6', 'timestamp': 1670359999.44474, 'message': 'Dec 6 22:53:18 hqnl0246134 sshd[262727]: Disconnected from invalid user admin 85.233.142.6 port 39278 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 22:53:19,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670359999.4448962, 'message': 'Dec 6 22:53:18 hqnl0246134 sshd[262713]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 22:53:20,596] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:53:20,596] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:53:20,603] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:53:20,614] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 22:53:21,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360001.4515038, 'message': 'Dec 6 22:53:19 hqnl0246134 sshd[262713]: Failed password for invalid user oracle from 36.110.228.254 port 41548 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:53:21,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360001.4517384, 'message': 'Dec 6 22:53:20 hqnl0246134 sshd[262713]: error: maximum authentication attempts exceeded for invalid user oracle from 36.110.228.254 port 41548 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 22:53:21,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360001.4518676, 'message': 'Dec 6 22:53:20 hqnl0246134 sshd[262713]: Disconnecting invalid user oracle 36.110.228.254 port 41548: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 22:53:21,534] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360001.451997, 'message': 'Dec 6 22:53:21 hqnl0246134 sshd[262738]: Invalid user oracle from 36.110.228.254 port 45307', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:53:21,561] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360001.452111, 'message': 'Dec 6 22:53:21 hqnl0246134 sshd[262738]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-06 22:53:21,580] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360001.452218, 'message': 'Dec 6 22:53:21 hqnl0246134 sshd[262738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:53:23,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360003.4546885, 'message': 'Dec 6 22:53:22 hqnl0246134 sshd[262738]: Failed password for invalid user oracle from 36.110.228.254 port 45307 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 22:53:23,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360003.4549701, 'message': 'Dec 6 22:53:23 hqnl0246134 sshd[262738]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 22:53:25,474] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360005.456409, 'message': 'Dec 6 22:53:25 hqnl0246134 sshd[262738]: Failed password for invalid user oracle from 36.110.228.254 port 45307 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:53:27,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360007.4580433, 'message': 'Dec 6 22:53:26 hqnl0246134 sshd[262738]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:53:29,496] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360009.4617534, 'message': 'Dec 6 22:53:28 hqnl0246134 sshd[262738]: Failed password for invalid user oracle from 36.110.228.254 port 45307 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 22:53:29,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.255.116.74', 'timestamp': 1670360009.462102, 'message': 'Dec 6 22:53:29 hqnl0246134 sshd[262745]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.255.116.74 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 22:53:29,528] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360009.4619796, 'message': 'Dec 6 22:53:28 hqnl0246134 sshd[262738]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 22:53:29,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.255.116.74', 'timestamp': 1670360009.4622185, 'message': 'Dec 6 22:53:29 hqnl0246134 sshd[262745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.255.116.74 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 22:53:31,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360011.4702513, 'message': 'Dec 6 22:53:30 hqnl0246134 sshd[262738]: Failed password for invalid user oracle from 36.110.228.254 port 45307 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 22:53:31,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.255.116.74', 'timestamp': 1670360011.4705205, 'message': 'Dec 6 22:53:31 hqnl0246134 sshd[262745]: Failed password for root from 139.255.116.74 port 41564 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 22:53:33,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360013.4729083, 'message': 'Dec 6 22:53:32 hqnl0246134 sshd[262738]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0555 seconds
INFO [2022-12-06 22:53:35,539] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.179.226.199', 'timestamp': 1670360015.4755979, 'message': 'Dec 6 22:53:33 hqnl0246134 sshd[262751]: Invalid user bitnami from 193.179.226.199 port 34524', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0631 seconds
INFO [2022-12-06 22:53:35,542] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360015.4761722, 'message': 'Dec 6 22:53:34 hqnl0246134 sshd[262738]: Failed password for invalid user oracle from 36.110.228.254 port 45307 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0634 seconds
INFO [2022-12-06 22:53:35,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '193.179.226.199', 'timestamp': 1670360015.4758248, 'message': 'Dec 6 22:53:34 hqnl0246134 sshd[262751]: pam_imunify(sshd:auth): [IM360_RBL] The IP 193.179.226.199 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 22:53:35,592] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '193.179.226.199', 'timestamp': 1670360015.475968, 'message': 'Dec 6 22:53:34 hqnl0246134 sshd[262751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.179.226.199 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-06 22:53:37,530] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.179.226.199', 'timestamp': 1670360017.4783611, 'message': 'Dec 6 22:53:35 hqnl0246134 sshd[262751]: Failed password for invalid user bitnami from 193.179.226.199 port 34524 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0508 seconds
INFO [2022-12-06 22:53:37,531] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360017.478746, 'message': 'Dec 6 22:53:36 hqnl0246134 sshd[262738]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0515 seconds
INFO [2022-12-06 22:53:37,532] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.30.100', 'timestamp': 1670360017.4788785, 'message': 'Dec 6 22:53:36 hqnl0246134 sshd[262755]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.30.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0514 seconds
INFO [2022-12-06 22:53:37,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.30.100', 'timestamp': 1670360017.4790297, 'message': 'Dec 6 22:53:36 hqnl0246134 sshd[262755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.30.100 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:53:39,542] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '193.179.226.199', 'timestamp': 1670360019.4817593, 'message': 'Dec 6 22:53:37 hqnl0246134 sshd[262751]: Disconnected from invalid user bitnami 193.179.226.199 port 34524 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0590 seconds
INFO [2022-12-06 22:53:39,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360019.4821837, 'message': 'Dec 6 22:53:38 hqnl0246134 sshd[262738]: Failed password for invalid user oracle from 36.110.228.254 port 45307 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0590 seconds
INFO [2022-12-06 22:53:39,545] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.30.100', 'timestamp': 1670360019.4925663, 'message': 'Dec 6 22:53:38 hqnl0246134 sshd[262755]: Failed password for root from 43.153.30.100 port 51854 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0499 seconds
INFO [2022-12-06 22:53:41,549] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '211.105.209.169', 'timestamp': 1670360021.4820282, 'message': 'Dec 6 22:53:39 hqnl0246134 sshd[262750]: Invalid user admin from 211.105.209.169 port 39592', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0670 seconds
INFO [2022-12-06 22:53:41,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360021.4822943, 'message': 'Dec 6 22:53:39 hqnl0246134 sshd[262738]: error: maximum authentication attempts exceeded for invalid user oracle from 36.110.228.254 port 45307 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0670 seconds
INFO [2022-12-06 22:53:41,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '211.105.209.169', 'timestamp': 1670360021.4834495, 'message': 'Dec 6 22:53:39 hqnl0246134 sshd[262750]: pam_imunify(sshd:auth): [IM360_RBL] The IP 211.105.209.169 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1131 seconds
INFO [2022-12-06 22:53:41,673] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360021.4833095, 'message': 'Dec 6 22:53:39 hqnl0246134 sshd[262738]: Disconnecting invalid user oracle 36.110.228.254 port 45307: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1221 seconds
INFO [2022-12-06 22:53:41,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '211.105.209.169', 'timestamp': 1670360021.4835675, 'message': 'Dec 6 22:53:39 hqnl0246134 sshd[262750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.105.209.169 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1264 seconds
INFO [2022-12-06 22:53:41,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360021.4836934, 'message': 'Dec 6 22:53:41 hqnl0246134 sshd[262765]: Invalid user oracle from 36.110.228.254 port 54936', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1257 seconds
INFO [2022-12-06 22:53:41,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360021.4837916, 'message': 'Dec 6 22:53:41 hqnl0246134 sshd[262765]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0719 seconds
INFO [2022-12-06 22:53:41,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360021.483921, 'message': 'Dec 6 22:53:41 hqnl0246134 sshd[262765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0533 seconds
INFO [2022-12-06 22:53:43,515] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '211.105.209.169', 'timestamp': 1670360023.4855874, 'message': 'Dec 6 22:53:42 hqnl0246134 sshd[262750]: Failed password for invalid user admin from 211.105.209.169 port 39592 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 22:53:43,515] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360023.4858186, 'message': 'Dec 6 22:53:43 hqnl0246134 sshd[262765]: Failed password for invalid user oracle from 36.110.228.254 port 54936 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 22:53:45,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360025.486034, 'message': 'Dec 6 22:53:44 hqnl0246134 sshd[262765]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 22:53:47,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360027.4962306, 'message': 'Dec 6 22:53:46 hqnl0246134 sshd[262765]: Failed password for invalid user oracle from 36.110.228.254 port 54936 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 22:53:47,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360027.4968414, 'message': 'Dec 6 22:53:46 hqnl0246134 sshd[262765]: Disconnected from invalid user oracle 36.110.228.254 port 54936 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-06 22:53:49,428] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:53:49,429] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:53:49,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360029.5033472, 'message': 'Dec 6 22:53:47 hqnl0246134 sshd[262772]: Invalid user usuario from 36.110.228.254 port 22574', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 22:53:49,540] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360029.5041032, 'message': 'Dec 6 22:53:48 hqnl0246134 sshd[262770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 22:53:49,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360029.5036848, 'message': 'Dec 6 22:53:47 hqnl0246134 sshd[262772]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 22:53:49,571] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360029.5042667, 'message': 'Dec 6 22:53:48 hqnl0246134 sshd[262770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 22:53:49,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360029.5039144, 'message': 'Dec 6 22:53:47 hqnl0246134 sshd[262772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:53:51,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360031.5058014, 'message': 'Dec 6 22:53:50 hqnl0246134 sshd[262772]: Failed password for invalid user usuario from 36.110.228.254 port 22574 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-06 22:53:51,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360031.5060637, 'message': 'Dec 6 22:53:50 hqnl0246134 sshd[262770]: Failed password for root from 61.177.173.18 port 28710 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0446 seconds
INFO [2022-12-06 22:53:53,546] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360033.5148308, 'message': 'Dec 6 22:53:51 hqnl0246134 sshd[262772]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 22:53:53,546] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360033.515025, 'message': 'Dec 6 22:53:52 hqnl0246134 sshd[262770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 22:53:55,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360035.5277197, 'message': 'Dec 6 22:53:53 hqnl0246134 sshd[262772]: Failed password for invalid user usuario from 36.110.228.254 port 22574 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 22:53:55,559] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360035.5279222, 'message': 'Dec 6 22:53:54 hqnl0246134 sshd[262770]: Failed password for root from 61.177.173.18 port 28710 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 22:53:55,578] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360035.528078, 'message': 'Dec 6 22:53:54 hqnl0246134 sshd[262770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 22:53:57,585] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360037.530243, 'message': 'Dec 6 22:53:55 hqnl0246134 sshd[262772]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0543 seconds
INFO [2022-12-06 22:53:57,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360037.5304928, 'message': 'Dec 6 22:53:55 hqnl0246134 sshd[262770]: Failed password for root from 61.177.173.18 port 28710 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0548 seconds
INFO [2022-12-06 22:53:57,629] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360037.5306056, 'message': 'Dec 6 22:53:57 hqnl0246134 sshd[262772]: Failed password for invalid user usuario from 36.110.228.254 port 22574 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0431 seconds
INFO [2022-12-06 22:53:59,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360039.5333686, 'message': 'Dec 6 22:53:57 hqnl0246134 sshd[262772]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-06 22:53:59,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '203.76.121.230', 'timestamp': 1670360039.5336807, 'message': 'Dec 6 22:53:59 hqnl0246134 sshd[262781]: Invalid user postmaster from 203.76.121.230 port 40514', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0458 seconds
INFO [2022-12-06 22:53:59,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360039.5351086, 'message': 'Dec 6 22:53:59 hqnl0246134 sshd[262772]: Failed password for invalid user usuario from 36.110.228.254 port 22574 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 22:53:59,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '203.76.121.230', 'timestamp': 1670360039.5338547, 'message': 'Dec 6 22:53:59 hqnl0246134 sshd[262781]: pam_imunify(sshd:auth): [IM360_RBL] The IP 203.76.121.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 22:53:59,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '203.76.121.230', 'timestamp': 1670360039.534949, 'message': 'Dec 6 22:53:59 hqnl0246134 sshd[262781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.121.230 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 22:54:01,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360041.535998, 'message': 'Dec 6 22:53:59 hqnl0246134 sshd[262772]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 22:54:03,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '203.76.121.230', 'timestamp': 1670360043.5408373, 'message': 'Dec 6 22:54:01 hqnl0246134 sshd[262781]: Failed password for invalid user postmaster from 203.76.121.230 port 40514 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 22:54:03,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360043.5410388, 'message': 'Dec 6 22:54:02 hqnl0246134 sshd[262772]: Failed password for invalid user usuario from 36.110.228.254 port 22574 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 22:54:05,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '203.76.121.230', 'timestamp': 1670360045.5463688, 'message': 'Dec 6 22:54:03 hqnl0246134 sshd[262781]: Disconnected from invalid user postmaster 203.76.121.230 port 40514 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 22:54:05,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360045.5465698, 'message': 'Dec 6 22:54:04 hqnl0246134 sshd[262772]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 22:54:06,207] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:54:06,208] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:54:06,215] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:54:06,227] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 22:54:07,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360047.5579572, 'message': 'Dec 6 22:54:05 hqnl0246134 sshd[262772]: Failed password for invalid user usuario from 36.110.228.254 port 22574 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 22:54:07,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360047.5583203, 'message': 'Dec 6 22:54:05 hqnl0246134 sshd[262772]: error: maximum authentication attempts exceeded for invalid user usuario from 36.110.228.254 port 22574 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:54:07,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360047.5584793, 'message': 'Dec 6 22:54:05 hqnl0246134 sshd[262772]: Disconnecting invalid user usuario 36.110.228.254 port 22574: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:54:07,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360047.5586216, 'message': 'Dec 6 22:54:07 hqnl0246134 sshd[262795]: Invalid user usuario from 36.110.228.254 port 29716', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:54:07,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360047.5587363, 'message': 'Dec 6 22:54:07 hqnl0246134 sshd[262795]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:54:07,677] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360047.5589173, 'message': 'Dec 6 22:54:07 hqnl0246134 sshd[262795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:54:09,578] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360049.5600295, 'message': 'Dec 6 22:54:08 hqnl0246134 sshd[262795]: Failed password for invalid user usuario from 36.110.228.254 port 29716 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:54:09,597] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360049.5602276, 'message': 'Dec 6 22:54:09 hqnl0246134 sshd[262795]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 22:54:10,846] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:54:10,879] defence360agent.internals.the_sink: SensorIncidentList(<24 item(s)>) processed in 0.0398 seconds
INFO [2022-12-06 22:54:13,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360053.5681353, 'message': 'Dec 6 22:54:11 hqnl0246134 sshd[262795]: Failed password for invalid user usuario from 36.110.228.254 port 29716 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:54:13,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360053.5683959, 'message': 'Dec 6 22:54:13 hqnl0246134 sshd[262795]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:54:15,591] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360055.5721152, 'message': 'Dec 6 22:54:14 hqnl0246134 sshd[262795]: Failed password for invalid user usuario from 36.110.228.254 port 29716 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:54:15,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360055.572371, 'message': 'Dec 6 22:54:15 hqnl0246134 sshd[262795]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:54:17,607] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360057.5764785, 'message': 'Dec 6 22:54:17 hqnl0246134 sshd[262795]: Failed password for invalid user usuario from 36.110.228.254 port 29716 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 22:54:17,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360057.5767245, 'message': 'Dec 6 22:54:17 hqnl0246134 sshd[262795]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 22:54:17,848] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:54:17,849] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:54:17,857] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:54:17,869] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 22:54:19,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360059.5784764, 'message': 'Dec 6 22:54:19 hqnl0246134 sshd[262795]: Failed password for invalid user usuario from 36.110.228.254 port 29716 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:54:20,536] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:54:20,536] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:54:20,549] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:54:20,562] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0253 seconds
INFO [2022-12-06 22:54:21,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360061.5815275, 'message': 'Dec 6 22:54:19 hqnl0246134 sshd[262795]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 22:54:21,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360061.581725, 'message': 'Dec 6 22:54:20 hqnl0246134 sshd[262795]: Failed password for invalid user usuario from 36.110.228.254 port 29716 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:54:23,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360063.5829566, 'message': 'Dec 6 22:54:21 hqnl0246134 sshd[262795]: error: maximum authentication attempts exceeded for invalid user usuario from 36.110.228.254 port 29716 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 22:54:23,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360063.5831547, 'message': 'Dec 6 22:54:21 hqnl0246134 sshd[262795]: Disconnecting invalid user usuario 36.110.228.254 port 29716: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:54:23,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360063.583273, 'message': 'Dec 6 22:54:22 hqnl0246134 sshd[262817]: Invalid user usuario from 36.110.228.254 port 25578', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:54:23,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360063.583384, 'message': 'Dec 6 22:54:22 hqnl0246134 sshd[262817]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 22:54:23,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360063.5834994, 'message': 'Dec 6 22:54:22 hqnl0246134 sshd[262817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 22:54:25,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360065.585184, 'message': 'Dec 6 22:54:24 hqnl0246134 sshd[262817]: Failed password for invalid user usuario from 36.110.228.254 port 25578 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 22:54:27,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360067.591701, 'message': 'Dec 6 22:54:26 hqnl0246134 sshd[262817]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 22:54:29,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360069.5941036, 'message': 'Dec 6 22:54:28 hqnl0246134 sshd[262817]: Failed password for invalid user usuario from 36.110.228.254 port 25578 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 22:54:31,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360071.596291, 'message': 'Dec 6 22:54:30 hqnl0246134 sshd[262817]: Disconnected from invalid user usuario 36.110.228.254 port 25578 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0523 seconds
INFO [2022-12-06 22:54:33,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670360073.5980515, 'message': 'Dec 6 22:54:33 hqnl0246134 sshd[262822]: Invalid user mcserver from 194.204.194.11 port 46484', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 22:54:33,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.204.194.11', 'timestamp': 1670360073.5983057, 'message': 'Dec 6 22:54:33 hqnl0246134 sshd[262822]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.204.194.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:54:33,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.204.194.11', 'timestamp': 1670360073.5984774, 'message': 'Dec 6 22:54:33 hqnl0246134 sshd[262822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 22:54:35,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360075.6007526, 'message': 'Dec 6 22:54:33 hqnl0246134 sshd[262823]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 22:54:35,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670360075.6011143, 'message': 'Dec 6 22:54:35 hqnl0246134 sshd[262822]: Failed password for invalid user mcserver from 194.204.194.11 port 46484 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 22:54:35,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360075.6010022, 'message': 'Dec 6 22:54:34 hqnl0246134 sshd[262823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:54:37,644] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360077.602499, 'message': 'Dec 6 22:54:36 hqnl0246134 sshd[262823]: Failed password for root from 61.177.173.18 port 58353 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-06 22:54:37,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.204.194.11', 'timestamp': 1670360077.60304, 'message': 'Dec 6 22:54:37 hqnl0246134 sshd[262822]: Disconnected from invalid user mcserver 194.204.194.11 port 46484 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 22:54:39,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360079.605259, 'message': 'Dec 6 22:54:38 hqnl0246134 sshd[262823]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 22:54:41,628] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360081.6087294, 'message': 'Dec 6 22:54:39 hqnl0246134 sshd[262823]: Failed password for root from 61.177.173.18 port 58353 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 22:54:41,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360081.609025, 'message': 'Dec 6 22:54:40 hqnl0246134 sshd[262823]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:54:43,651] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360083.6148524, 'message': 'Dec 6 22:54:42 hqnl0246134 sshd[262827]: Invalid user test from 36.110.228.254 port 54310', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-06 22:54:43,653] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360083.6154864, 'message': 'Dec 6 22:54:42 hqnl0246134 sshd[262823]: Failed password for root from 61.177.173.18 port 58353 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 22:54:43,672] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360083.615107, 'message': 'Dec 6 22:54:42 hqnl0246134 sshd[262827]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 22:54:43,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360083.615315, 'message': 'Dec 6 22:54:42 hqnl0246134 sshd[262827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 22:54:45,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360085.625132, 'message': 'Dec 6 22:54:43 hqnl0246134 sshd[262827]: Failed password for invalid user test from 36.110.228.254 port 54310 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:54:45,660] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360085.6253529, 'message': 'Dec 6 22:54:44 hqnl0246134 sshd[262827]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:54:47,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360087.629839, 'message': 'Dec 6 22:54:47 hqnl0246134 sshd[262827]: Failed password for invalid user test from 36.110.228.254 port 54310 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 22:54:49,433] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:54:49,434] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:54:49,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360089.6403985, 'message': 'Dec 6 22:54:47 hqnl0246134 sshd[262827]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 22:54:49,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.135.20.5', 'timestamp': 1670360089.6405995, 'message': 'Dec 6 22:54:49 hqnl0246134 sshd[262838]: Invalid user cs from 194.135.20.5 port 60760', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 22:54:49,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.135.20.5', 'timestamp': 1670360089.6407344, 'message': 'Dec 6 22:54:49 hqnl0246134 sshd[262838]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.135.20.5 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:54:49,703] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.135.20.5', 'timestamp': 1670360089.6408973, 'message': 'Dec 6 22:54:49 hqnl0246134 sshd[262838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.135.20.5 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 22:54:51,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.55.100.134', 'timestamp': 1670360091.6420743, 'message': 'Dec 6 22:54:49 hqnl0246134 sshd[262840]: Invalid user sysadmin from 177.55.100.134 port 41698', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0494 seconds
INFO [2022-12-06 22:54:51,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360091.6425357, 'message': 'Dec 6 22:54:50 hqnl0246134 sshd[262827]: Failed password for invalid user test from 36.110.228.254 port 54310 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0496 seconds
INFO [2022-12-06 22:54:51,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.135.20.5', 'timestamp': 1670360091.642647, 'message': 'Dec 6 22:54:51 hqnl0246134 sshd[262838]: Failed password for invalid user cs from 194.135.20.5 port 60760 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0495 seconds
INFO [2022-12-06 22:54:51,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '177.55.100.134', 'timestamp': 1670360091.6422665, 'message': 'Dec 6 22:54:49 hqnl0246134 sshd[262840]: pam_imunify(sshd:auth): [IM360_RBL] The IP 177.55.100.134 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 22:54:51,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.135.20.5', 'timestamp': 1670360091.643327, 'message': 'Dec 6 22:54:51 hqnl0246134 sshd[262838]: Disconnected from invalid user cs 194.135.20.5 port 60760 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 22:54:51,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '177.55.100.134', 'timestamp': 1670360091.6423771, 'message': 'Dec 6 22:54:49 hqnl0246134 sshd[262840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.55.100.134 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 22:54:51,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.55.100.134', 'timestamp': 1670360091.6434822, 'message': 'Dec 6 22:54:51 hqnl0246134 sshd[262840]: Failed password for invalid user sysadmin from 177.55.100.134 port 41698 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:54:53,676] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '177.55.100.134', 'timestamp': 1670360093.6448557, 'message': 'Dec 6 22:54:51 hqnl0246134 sshd[262840]: Disconnected from invalid user sysadmin 177.55.100.134 port 41698 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 22:54:53,676] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360093.645055, 'message': 'Dec 6 22:54:52 hqnl0246134 sshd[262827]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 22:54:55,672] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360095.6460748, 'message': 'Dec 6 22:54:54 hqnl0246134 sshd[262827]: Failed password for invalid user test from 36.110.228.254 port 54310 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 22:54:55,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360095.6463532, 'message': 'Dec 6 22:54:55 hqnl0246134 sshd[262827]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 22:54:57,685] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.62.24.222', 'timestamp': 1670360097.6486807, 'message': 'Dec 6 22:54:56 hqnl0246134 sshd[262844]: Invalid user eagle from 178.62.24.222 port 39068', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 22:54:57,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360097.649214, 'message': 'Dec 6 22:54:57 hqnl0246134 sshd[262827]: Failed password for invalid user test from 36.110.228.254 port 54310 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 22:54:57,714] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '178.62.24.222', 'timestamp': 1670360097.6489067, 'message': 'Dec 6 22:54:57 hqnl0246134 sshd[262844]: pam_imunify(sshd:auth): [IM360_RBL] The IP 178.62.24.222 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 22:54:57,745] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '178.62.24.222', 'timestamp': 1670360097.6490216, 'message': 'Dec 6 22:54:57 hqnl0246134 sshd[262844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.24.222 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 22:54:59,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360099.6499367, 'message': 'Dec 6 22:54:57 hqnl0246134 sshd[262827]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 22:54:59,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.62.24.222', 'timestamp': 1670360099.6501052, 'message': 'Dec 6 22:54:59 hqnl0246134 sshd[262844]: Failed password for invalid user eagle from 178.62.24.222 port 39068 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 22:55:01,702] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360101.6532917, 'message': 'Dec 6 22:54:59 hqnl0246134 sshd[262827]: Failed password for invalid user test from 36.110.228.254 port 54310 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 22:55:01,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '178.62.24.222', 'timestamp': 1670360101.6667886, 'message': 'Dec 6 22:55:00 hqnl0246134 sshd[262844]: Disconnected from invalid user eagle 178.62.24.222 port 39068 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0659 seconds
INFO [2022-12-06 22:55:01,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360101.6669438, 'message': 'Dec 6 22:55:00 hqnl0246134 sshd[262847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0660 seconds
INFO [2022-12-06 22:55:01,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360101.6536422, 'message': 'Dec 6 22:55:00 hqnl0246134 sshd[262827]: error: maximum authentication attempts exceeded for invalid user test from 36.110.228.254 port 54310 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0462 seconds
INFO [2022-12-06 22:55:01,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360101.6538198, 'message': 'Dec 6 22:55:00 hqnl0246134 sshd[262827]: Disconnecting invalid user test 36.110.228.254 port 54310: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 22:55:01,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360101.6670506, 'message': 'Dec 6 22:55:01 hqnl0246134 sshd[262849]: Invalid user test from 36.110.228.254 port 41516', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 22:55:01,825] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360101.6672275, 'message': 'Dec 6 22:55:01 hqnl0246134 sshd[262849]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 22:55:01,856] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360101.6673498, 'message': 'Dec 6 22:55:01 hqnl0246134 sshd[262849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 22:55:03,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360103.6614978, 'message': 'Dec 6 22:55:02 hqnl0246134 sshd[262847]: Failed password for root from 165.227.166.207 port 34350 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0500 seconds
INFO [2022-12-06 22:55:03,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360103.6694937, 'message': 'Dec 6 22:55:03 hqnl0246134 sshd[262849]: Failed password for invalid user test from 36.110.228.254 port 41516 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0469 seconds
INFO [2022-12-06 22:55:05,688] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360105.665617, 'message': 'Dec 6 22:55:03 hqnl0246134 sshd[262849]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 22:55:07,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360107.6768801, 'message': 'Dec 6 22:55:05 hqnl0246134 sshd[262849]: Failed password for invalid user test from 36.110.228.254 port 41516 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 22:55:07,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.55', 'timestamp': 1670360107.6780245, 'message': 'Dec 6 22:55:07 hqnl0246134 sshd[262870]: Invalid user ahmad from 103.187.146.55 port 57664', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 22:55:07,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360107.6778595, 'message': 'Dec 6 22:55:06 hqnl0246134 sshd[262849]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 22:55:07,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.187.146.55', 'timestamp': 1670360107.6781945, 'message': 'Dec 6 22:55:07 hqnl0246134 sshd[262870]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.187.146.55 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 22:55:07,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.187.146.55', 'timestamp': 1670360107.678377, 'message': 'Dec 6 22:55:07 hqnl0246134 sshd[262870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.187.146.55 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:55:09,724] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360109.6822467, 'message': 'Dec 6 22:55:07 hqnl0246134 sshd[262849]: Failed password for invalid user test from 36.110.228.254 port 41516 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0411 seconds
INFO [2022-12-06 22:55:09,725] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.55', 'timestamp': 1670360109.6827161, 'message': 'Dec 6 22:55:09 hqnl0246134 sshd[262870]: Failed password for invalid user ahmad from 103.187.146.55 port 57664 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 22:55:09,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360109.68252, 'message': 'Dec 6 22:55:08 hqnl0246134 sshd[262849]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 22:55:10,854] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:55:10,885] defence360agent.internals.the_sink: SensorIncidentList(<23 item(s)>) processed in 0.0408 seconds
INFO [2022-12-06 22:55:11,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.55', 'timestamp': 1670360111.6849637, 'message': 'Dec 6 22:55:09 hqnl0246134 sshd[262870]: Disconnected from invalid user ahmad 103.187.146.55 port 57664 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 22:55:11,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360111.6852598, 'message': 'Dec 6 22:55:10 hqnl0246134 sshd[262849]: Failed password for invalid user test from 36.110.228.254 port 41516 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 22:55:11,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360111.6854734, 'message': 'Dec 6 22:55:11 hqnl0246134 sshd[262849]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:55:12,472] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:55:12,473] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:55:12,481] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:55:12,494] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 22:55:13,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360113.6860893, 'message': 'Dec 6 22:55:13 hqnl0246134 sshd[262849]: Failed password for invalid user test from 36.110.228.254 port 41516 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 22:55:15,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360115.6883738, 'message': 'Dec 6 22:55:14 hqnl0246134 sshd[262894]: Invalid user center from 103.67.165.114 port 48630', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 22:55:15,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360115.6885934, 'message': 'Dec 6 22:55:14 hqnl0246134 sshd[262894]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.67.165.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 22:55:15,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360115.6887321, 'message': 'Dec 6 22:55:14 hqnl0246134 sshd[262894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.67.165.114 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 22:55:17,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360117.6901488, 'message': 'Dec 6 22:55:15 hqnl0246134 sshd[262849]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0482 seconds
INFO [2022-12-06 22:55:17,740] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360117.6903362, 'message': 'Dec 6 22:55:16 hqnl0246134 sshd[262894]: Failed password for invalid user center from 103.67.165.114 port 48630 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0488 seconds
INFO [2022-12-06 22:55:17,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360117.6904645, 'message': 'Dec 6 22:55:17 hqnl0246134 sshd[262894]: Disconnected from invalid user center 103.67.165.114 port 48630 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 22:55:17,955] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:55:17,956] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:55:17,965] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:55:17,978] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 22:55:19,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360119.6938107, 'message': 'Dec 6 22:55:17 hqnl0246134 sshd[262849]: Failed password for invalid user test from 36.110.228.254 port 41516 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0796 seconds
INFO [2022-12-06 22:55:19,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360119.6941054, 'message': 'Dec 6 22:55:18 hqnl0246134 sshd[262849]: error: maximum authentication attempts exceeded for invalid user test from 36.110.228.254 port 41516 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1226 seconds
INFO [2022-12-06 22:55:19,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360119.694279, 'message': 'Dec 6 22:55:18 hqnl0246134 sshd[262849]: Disconnecting invalid user test 36.110.228.254 port 41516: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0575 seconds
INFO [2022-12-06 22:55:20,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360119.6944613, 'message': 'Dec 6 22:55:19 hqnl0246134 sshd[262910]: Invalid user test from 36.110.228.254 port 47873', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1055 seconds
INFO [2022-12-06 22:55:20,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360119.6946316, 'message': 'Dec 6 22:55:19 hqnl0246134 sshd[262910]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0598 seconds
INFO [2022-12-06 22:55:20,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360119.6947942, 'message': 'Dec 6 22:55:19 hqnl0246134 sshd[262910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0413 seconds
INFO [2022-12-06 22:55:21,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360121.6947875, 'message': 'Dec 6 22:55:21 hqnl0246134 sshd[262910]: Failed password for invalid user test from 36.110.228.254 port 47873 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0533 seconds
INFO [2022-12-06 22:55:21,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360121.6950119, 'message': 'Dec 6 22:55:21 hqnl0246134 sshd[262915]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0535 seconds
INFO [2022-12-06 22:55:21,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360121.6951282, 'message': 'Dec 6 22:55:21 hqnl0246134 sshd[262915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 22:55:22,193] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:55:22,194] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:55:22,204] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:55:22,224] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0294 seconds
INFO [2022-12-06 22:55:23,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360123.6960132, 'message': 'Dec 6 22:55:21 hqnl0246134 sshd[262910]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 22:55:23,724] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360123.696323, 'message': 'Dec 6 22:55:23 hqnl0246134 sshd[262915]: Failed password for root from 61.177.173.18 port 46365 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-06 22:55:23,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360123.696473, 'message': 'Dec 6 22:55:23 hqnl0246134 sshd[262910]: Failed password for invalid user test from 36.110.228.254 port 47873 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:55:25,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360125.6986291, 'message': 'Dec 6 22:55:23 hqnl0246134 sshd[262915]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 22:55:25,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360125.6988516, 'message': 'Dec 6 22:55:24 hqnl0246134 sshd[262910]: Disconnected from invalid user test 36.110.228.254 port 47873 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 22:55:25,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360125.698965, 'message': 'Dec 6 22:55:25 hqnl0246134 sshd[262920]: Invalid user user from 36.110.228.254 port 11787', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:55:25,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360125.6990774, 'message': 'Dec 6 22:55:25 hqnl0246134 sshd[262920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:55:25,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360125.6992173, 'message': 'Dec 6 22:55:25 hqnl0246134 sshd[262920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:55:27,778] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360127.7069118, 'message': 'Dec 6 22:55:26 hqnl0246134 sshd[262915]: Failed password for root from 61.177.173.18 port 46365 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0709 seconds
INFO [2022-12-06 22:55:27,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360127.7071362, 'message': 'Dec 6 22:55:26 hqnl0246134 sshd[262920]: Failed password for invalid user user from 36.110.228.254 port 11787 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0717 seconds
INFO [2022-12-06 22:55:27,782] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.149.77.178', 'timestamp': 1670360127.7073724, 'message': 'Dec 6 22:55:27 hqnl0246134 sshd[262922]: Invalid user sysadmin from 41.149.77.178 port 40244', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0726 seconds
INFO [2022-12-06 22:55:27,819] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360127.7072692, 'message': 'Dec 6 22:55:27 hqnl0246134 sshd[262920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-06 22:55:27,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.149.77.178', 'timestamp': 1670360127.7075026, 'message': 'Dec 6 22:55:27 hqnl0246134 sshd[262922]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.149.77.178 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 22:55:27,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.149.77.178', 'timestamp': 1670360127.707605, 'message': 'Dec 6 22:55:27 hqnl0246134 sshd[262922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.149.77.178 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 22:55:29,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360129.7184124, 'message': 'Dec 6 22:55:28 hqnl0246134 sshd[262915]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-06 22:55:29,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360129.7186859, 'message': 'Dec 6 22:55:29 hqnl0246134 sshd[262920]: Failed password for invalid user user from 36.110.228.254 port 11787 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 22:55:29,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.149.77.178', 'timestamp': 1670360129.7188158, 'message': 'Dec 6 22:55:29 hqnl0246134 sshd[262922]: Failed password for invalid user sysadmin from 41.149.77.178 port 40244 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0478 seconds
INFO [2022-12-06 22:55:31,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360131.7205007, 'message': 'Dec 6 22:55:30 hqnl0246134 sshd[262915]: Failed password for root from 61.177.173.18 port 46365 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0466 seconds
INFO [2022-12-06 22:55:31,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360131.7207594, 'message': 'Dec 6 22:55:31 hqnl0246134 sshd[262920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0471 seconds
INFO [2022-12-06 22:55:31,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.149.77.178', 'timestamp': 1670360131.7208858, 'message': 'Dec 6 22:55:31 hqnl0246134 sshd[262922]: Disconnected from invalid user sysadmin 41.149.77.178 port 40244 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0466 seconds
INFO [2022-12-06 22:55:33,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360133.7222805, 'message': 'Dec 6 22:55:33 hqnl0246134 sshd[262920]: Failed password for invalid user user from 36.110.228.254 port 11787 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 22:55:33,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360133.7225647, 'message': 'Dec 6 22:55:33 hqnl0246134 sshd[262920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 22:55:35,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360135.7246394, 'message': 'Dec 6 22:55:35 hqnl0246134 sshd[262920]: Failed password for invalid user user from 36.110.228.254 port 11787 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 22:55:35,778] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360135.7250342, 'message': 'Dec 6 22:55:35 hqnl0246134 sshd[262920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 22:55:39,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360139.7306576, 'message': 'Dec 6 22:55:37 hqnl0246134 sshd[262920]: Failed password for invalid user user from 36.110.228.254 port 11787 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 22:55:41,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360141.7325914, 'message': 'Dec 6 22:55:39 hqnl0246134 sshd[262920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:55:43,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360143.7343907, 'message': 'Dec 6 22:55:42 hqnl0246134 sshd[262920]: Failed password for invalid user user from 36.110.228.254 port 11787 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 22:55:43,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360143.734682, 'message': 'Dec 6 22:55:43 hqnl0246134 sshd[262920]: error: maximum authentication attempts exceeded for invalid user user from 36.110.228.254 port 11787 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:55:43,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360143.7348528, 'message': 'Dec 6 22:55:43 hqnl0246134 sshd[262920]: Disconnecting invalid user user 36.110.228.254 port 11787: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 22:55:45,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360145.7372725, 'message': 'Dec 6 22:55:44 hqnl0246134 sshd[262962]: Invalid user user from 36.110.228.254 port 22048', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 22:55:45,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360145.7437787, 'message': 'Dec 6 22:55:44 hqnl0246134 sshd[262962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 22:55:45,814] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360145.7440577, 'message': 'Dec 6 22:55:44 hqnl0246134 sshd[262962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 22:55:47,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360147.7379322, 'message': 'Dec 6 22:55:46 hqnl0246134 sshd[262962]: Failed password for invalid user user from 36.110.228.254 port 22048 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 22:55:47,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360147.7382116, 'message': 'Dec 6 22:55:46 hqnl0246134 sshd[262962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-06 22:55:49,437] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:55:49,438] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:55:49,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360149.7381246, 'message': 'Dec 6 22:55:49 hqnl0246134 sshd[262962]: Failed password for invalid user user from 36.110.228.254 port 22048 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:55:51,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360151.740686, 'message': 'Dec 6 22:55:51 hqnl0246134 sshd[262962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 22:55:53,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360153.7415385, 'message': 'Dec 6 22:55:53 hqnl0246134 sshd[262962]: Failed password for invalid user user from 36.110.228.254 port 22048 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:55:55,764] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360155.7449331, 'message': 'Dec 6 22:55:55 hqnl0246134 sshd[262962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:55:57,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360157.7492833, 'message': 'Dec 6 22:55:56 hqnl0246134 sshd[262962]: Failed password for invalid user user from 36.110.228.254 port 22048 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 22:55:57,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360157.749648, 'message': 'Dec 6 22:55:57 hqnl0246134 sshd[262962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 22:55:59,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360159.7496393, 'message': 'Dec 6 22:55:59 hqnl0246134 sshd[262962]: Failed password for invalid user user from 36.110.228.254 port 22048 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:56:01,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.89.85.14', 'timestamp': 1670360161.7545152, 'message': 'Dec 6 22:56:01 hqnl0246134 sshd[262975]: Invalid user yt from 103.89.85.14 port 52458', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-06 22:56:01,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360161.7548425, 'message': 'Dec 6 22:56:01 hqnl0246134 sshd[262962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-06 22:56:01,809] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.89.85.14', 'timestamp': 1670360161.7550254, 'message': 'Dec 6 22:56:01 hqnl0246134 sshd[262975]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.89.85.14 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:56:01,827] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.89.85.14', 'timestamp': 1670360161.7552016, 'message': 'Dec 6 22:56:01 hqnl0246134 sshd[262975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.85.14 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 22:56:03,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360163.7567897, 'message': 'Dec 6 22:56:03 hqnl0246134 sshd[262962]: Failed password for invalid user user from 36.110.228.254 port 22048 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0451 seconds
INFO [2022-12-06 22:56:03,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.89.85.14', 'timestamp': 1670360163.7570853, 'message': 'Dec 6 22:56:03 hqnl0246134 sshd[262975]: Failed password for invalid user yt from 103.89.85.14 port 52458 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0458 seconds
INFO [2022-12-06 22:56:03,831] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360163.7572775, 'message': 'Dec 6 22:56:03 hqnl0246134 sshd[262962]: error: maximum authentication attempts exceeded for invalid user user from 36.110.228.254 port 22048 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 22:56:03,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360163.7574677, 'message': 'Dec 6 22:56:03 hqnl0246134 sshd[262962]: Disconnecting invalid user user 36.110.228.254 port 22048: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 22:56:05,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360165.7606633, 'message': 'Dec 6 22:56:04 hqnl0246134 sshd[262991]: Invalid user user from 36.110.228.254 port 33643', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0390 seconds
INFO [2022-12-06 22:56:05,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360165.7614727, 'message': 'Dec 6 22:56:04 hqnl0246134 sshd[262989]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-06 22:56:05,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360165.7609591, 'message': 'Dec 6 22:56:04 hqnl0246134 sshd[262991]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0772 seconds
INFO [2022-12-06 22:56:05,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.89.85.14', 'timestamp': 1670360165.7618337, 'message': 'Dec 6 22:56:04 hqnl0246134 sshd[262975]: Disconnected from invalid user yt 103.89.85.14 port 52458 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0777 seconds
INFO [2022-12-06 22:56:05,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360165.7616572, 'message': 'Dec 6 22:56:04 hqnl0246134 sshd[262989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0760 seconds
INFO [2022-12-06 22:56:05,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360165.761216, 'message': 'Dec 6 22:56:04 hqnl0246134 sshd[262991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 22:56:07,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360167.762568, 'message': 'Dec 6 22:56:06 hqnl0246134 sshd[262991]: Failed password for invalid user user from 36.110.228.254 port 33643 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 22:56:07,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360167.762982, 'message': 'Dec 6 22:56:06 hqnl0246134 sshd[262989]: Failed password for root from 61.177.173.18 port 52442 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 22:56:09,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360169.765278, 'message': 'Dec 6 22:56:08 hqnl0246134 sshd[262991]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 22:56:09,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360169.7655265, 'message': 'Dec 6 22:56:09 hqnl0246134 sshd[262989]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
WARNING [2022-12-06 22:56:10,857] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:56:10,882] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0334 seconds
INFO [2022-12-06 22:56:11,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '198.199.109.204', 'timestamp': 1670360171.7678576, 'message': 'Dec 6 22:56:09 hqnl0246134 sshd[263003]: pam_imunify(sshd:auth): [IM360_RBL] The IP 198.199.109.204 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0763 seconds
INFO [2022-12-06 22:56:11,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360171.7684016, 'message': 'Dec 6 22:56:10 hqnl0246134 sshd[262991]: Failed password for invalid user user from 36.110.228.254 port 33643 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0770 seconds
INFO [2022-12-06 22:56:11,849] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360171.7687943, 'message': 'Dec 6 22:56:11 hqnl0246134 sshd[262989]: Failed password for root from 61.177.173.18 port 52442 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0768 seconds
INFO [2022-12-06 22:56:11,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '198.199.109.204', 'timestamp': 1670360171.7681763, 'message': 'Dec 6 22:56:09 hqnl0246134 sshd[263003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.109.204 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 22:56:11,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360171.7686083, 'message': 'Dec 6 22:56:11 hqnl0246134 sshd[262991]: Disconnected from invalid user user 36.110.228.254 port 33643 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 22:56:13,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '198.199.109.204', 'timestamp': 1670360173.769386, 'message': 'Dec 6 22:56:11 hqnl0246134 sshd[263003]: Failed password for root from 198.199.109.204 port 44308 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0721 seconds
INFO [2022-12-06 22:56:13,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360173.7697244, 'message': 'Dec 6 22:56:12 hqnl0246134 sshd[263005]: Invalid user ftpuser from 36.110.228.254 port 59210', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0724 seconds
INFO [2022-12-06 22:56:13,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360173.7702792, 'message': 'Dec 6 22:56:13 hqnl0246134 sshd[262989]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0714 seconds
INFO [2022-12-06 22:56:13,863] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360173.7699335, 'message': 'Dec 6 22:56:12 hqnl0246134 sshd[263005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:56:13,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360173.7701194, 'message': 'Dec 6 22:56:12 hqnl0246134 sshd[263005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 22:56:14,371] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 22:56:14,438] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 22:56:14,439] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 22:56:14,439] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 22:56:14,439] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 22:56:14,439] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 22:56:14,450] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 22:56:14,467] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0269 seconds
WARNING [2022-12-06 22:56:14,474] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 22:56:14,476] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:56:14,494] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0328 seconds
INFO [2022-12-06 22:56:14,495] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0308 seconds
INFO [2022-12-06 22:56:15,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360175.7707517, 'message': 'Dec 6 22:56:14 hqnl0246134 sshd[263005]: Failed password for invalid user ftpuser from 36.110.228.254 port 59210 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0709 seconds
INFO [2022-12-06 22:56:15,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360175.771323, 'message': 'Dec 6 22:56:15 hqnl0246134 sshd[262989]: Failed password for root from 61.177.173.18 port 52442 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0719 seconds
INFO [2022-12-06 22:56:15,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360175.7711174, 'message': 'Dec 6 22:56:14 hqnl0246134 sshd[263005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 22:56:17,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360177.77294, 'message': 'Dec 6 22:56:16 hqnl0246134 sshd[263005]: Failed password for invalid user ftpuser from 36.110.228.254 port 59210 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 22:56:17,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360177.7732863, 'message': 'Dec 6 22:56:17 hqnl0246134 sshd[263005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 22:56:18,235] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:56:18,236] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:56:18,247] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:56:18,261] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0238 seconds
INFO [2022-12-06 22:56:21,026] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:56:21,026] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:56:21,034] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:56:21,047] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 22:56:21,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360181.7827199, 'message': 'Dec 6 22:56:20 hqnl0246134 sshd[263005]: Failed password for invalid user ftpuser from 36.110.228.254 port 59210 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 22:56:21,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360181.7829242, 'message': 'Dec 6 22:56:20 hqnl0246134 sshd[263005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:56:23,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360183.7851925, 'message': 'Dec 6 22:56:21 hqnl0246134 sshd[263005]: Failed password for invalid user ftpuser from 36.110.228.254 port 59210 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:56:23,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360183.7854784, 'message': 'Dec 6 22:56:23 hqnl0246134 sshd[263005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 22:56:25,806] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360185.7857654, 'message': 'Dec 6 22:56:25 hqnl0246134 sshd[263005]: Failed password for invalid user ftpuser from 36.110.228.254 port 59210 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 22:56:27,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360187.7872043, 'message': 'Dec 6 22:56:26 hqnl0246134 sshd[263005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 22:56:29,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360189.789529, 'message': 'Dec 6 22:56:28 hqnl0246134 sshd[263005]: Failed password for invalid user ftpuser from 36.110.228.254 port 59210 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:56:29,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360189.7898052, 'message': 'Dec 6 22:56:28 hqnl0246134 sshd[263005]: error: maximum authentication attempts exceeded for invalid user ftpuser from 36.110.228.254 port 59210 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 22:56:29,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360189.7899356, 'message': 'Dec 6 22:56:28 hqnl0246134 sshd[263005]: Disconnecting invalid user ftpuser 36.110.228.254 port 59210: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-06 22:56:31,402] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:56:31,402] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:56:31,409] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:56:31,420] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 22:56:31,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360191.789885, 'message': 'Dec 6 22:56:29 hqnl0246134 sshd[263031]: Invalid user ftpuser from 36.110.228.254 port 63327', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 22:56:31,852] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360191.7901697, 'message': 'Dec 6 22:56:29 hqnl0246134 sshd[263031]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 22:56:31,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360191.7921984, 'message': 'Dec 6 22:56:29 hqnl0246134 sshd[263031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 22:56:33,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360193.7924223, 'message': 'Dec 6 22:56:32 hqnl0246134 sshd[263031]: Failed password for invalid user ftpuser from 36.110.228.254 port 63327 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:56:33,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360193.7926707, 'message': 'Dec 6 22:56:32 hqnl0246134 sshd[263031]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:56:35,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360195.794226, 'message': 'Dec 6 22:56:34 hqnl0246134 sshd[263031]: Failed password for invalid user ftpuser from 36.110.228.254 port 63327 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 22:56:35,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360195.7945247, 'message': 'Dec 6 22:56:35 hqnl0246134 sshd[263031]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 22:56:39,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360199.7979813, 'message': 'Dec 6 22:56:38 hqnl0246134 sshd[263031]: Failed password for invalid user ftpuser from 36.110.228.254 port 63327 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 22:56:41,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360201.8000512, 'message': 'Dec 6 22:56:40 hqnl0246134 sshd[263031]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:56:43,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '139.255.116.74', 'timestamp': 1670360203.8019614, 'message': 'Dec 6 22:56:42 hqnl0246134 sshd[263047]: pam_imunify(sshd:auth): [IM360_RBL] The IP 139.255.116.74 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 22:56:43,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360203.8023863, 'message': 'Dec 6 22:56:43 hqnl0246134 sshd[263031]: Failed password for invalid user ftpuser from 36.110.228.254 port 63327 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 22:56:43,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '139.255.116.74', 'timestamp': 1670360203.8021967, 'message': 'Dec 6 22:56:42 hqnl0246134 sshd[263047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.255.116.74 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-06 22:56:43,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360203.802538, 'message': 'Dec 6 22:56:43 hqnl0246134 sshd[263031]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 22:56:44,706] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 22:56:44,707] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 22:56:44,708] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 22:56:45,836] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '139.255.116.74', 'timestamp': 1670360205.8076453, 'message': 'Dec 6 22:56:44 hqnl0246134 sshd[263047]: Failed password for root from 139.255.116.74 port 60108 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 22:56:45,836] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360205.807892, 'message': 'Dec 6 22:56:44 hqnl0246134 sshd[263031]: Failed password for invalid user ftpuser from 36.110.228.254 port 63327 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 22:56:47,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360207.8137717, 'message': 'Dec 6 22:56:46 hqnl0246134 sshd[263031]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 22:56:49,442] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:56:49,443] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:56:49,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360209.8162048, 'message': 'Dec 6 22:56:48 hqnl0246134 sshd[263031]: Failed password for invalid user ftpuser from 36.110.228.254 port 63327 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 22:56:49,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360209.816569, 'message': 'Dec 6 22:56:48 hqnl0246134 sshd[263031]: error: maximum authentication attempts exceeded for invalid user ftpuser from 36.110.228.254 port 63327 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 22:56:49,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360209.81718, 'message': 'Dec 6 22:56:48 hqnl0246134 sshd[263031]: Disconnecting invalid user ftpuser 36.110.228.254 port 63327: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:56:51,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360211.828436, 'message': 'Dec 6 22:56:50 hqnl0246134 sshd[263050]: Invalid user ftpuser from 36.110.228.254 port 15770', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-06 22:56:51,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360211.8288367, 'message': 'Dec 6 22:56:51 hqnl0246134 sshd[263052]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 22:56:51,894] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360211.8286257, 'message': 'Dec 6 22:56:50 hqnl0246134 sshd[263050]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 22:56:51,897] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360211.8289375, 'message': 'Dec 6 22:56:51 hqnl0246134 sshd[263052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 22:56:51,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360211.8287342, 'message': 'Dec 6 22:56:50 hqnl0246134 sshd[263050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 22:56:53,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360213.8207908, 'message': 'Dec 6 22:56:51 hqnl0246134 sshd[263050]: Failed password for invalid user ftpuser from 36.110.228.254 port 15770 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 22:56:53,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360213.821098, 'message': 'Dec 6 22:56:53 hqnl0246134 sshd[263052]: Failed password for root from 61.177.173.18 port 23418 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-06 22:56:53,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360213.8209817, 'message': 'Dec 6 22:56:53 hqnl0246134 sshd[263050]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 22:56:55,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360215.822128, 'message': 'Dec 6 22:56:55 hqnl0246134 sshd[263050]: Failed password for invalid user ftpuser from 36.110.228.254 port 15770 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 22:56:55,852] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360215.8223474, 'message': 'Dec 6 22:56:55 hqnl0246134 sshd[263052]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 22:56:55,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360215.8225062, 'message': 'Dec 6 22:56:55 hqnl0246134 sshd[263050]: Disconnected from invalid user ftpuser 36.110.228.254 port 15770 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 22:56:57,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360217.8245986, 'message': 'Dec 6 22:56:57 hqnl0246134 sshd[263052]: Failed password for root from 61.177.173.18 port 23418 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 22:56:57,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360217.8248343, 'message': 'Dec 6 22:56:57 hqnl0246134 sshd[263055]: Invalid user test1 from 36.110.228.254 port 37392', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-06 22:56:57,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360217.8250084, 'message': 'Dec 6 22:56:57 hqnl0246134 sshd[263055]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 22:56:57,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360217.8251219, 'message': 'Dec 6 22:56:57 hqnl0246134 sshd[263055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:56:59,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360219.8263078, 'message': 'Dec 6 22:56:57 hqnl0246134 sshd[263052]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1038 seconds
INFO [2022-12-06 22:56:59,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360219.8266752, 'message': 'Dec 6 22:56:59 hqnl0246134 sshd[263055]: Failed password for invalid user test1 from 36.110.228.254 port 37392 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1040 seconds
INFO [2022-12-06 22:57:01,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360221.8293955, 'message': 'Dec 6 22:56:59 hqnl0246134 sshd[263052]: Failed password for root from 61.177.173.18 port 23418 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 22:57:01,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360221.8312192, 'message': 'Dec 6 22:57:00 hqnl0246134 sshd[263055]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-06 22:57:01,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360221.8313801, 'message': 'Dec 6 22:57:01 hqnl0246134 sshd[263067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-06 22:57:03,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360223.8305173, 'message': 'Dec 6 22:57:02 hqnl0246134 sshd[263055]: Failed password for invalid user test1 from 36.110.228.254 port 37392 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 22:57:03,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360223.8307276, 'message': 'Dec 6 22:57:03 hqnl0246134 sshd[263067]: Failed password for root from 165.227.166.207 port 44636 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 22:57:05,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360225.832892, 'message': 'Dec 6 22:57:03 hqnl0246134 sshd[263055]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 22:57:07,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360227.8337476, 'message': 'Dec 6 22:57:06 hqnl0246134 sshd[263055]: Failed password for invalid user test1 from 36.110.228.254 port 37392 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 22:57:07,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360227.8340797, 'message': 'Dec 6 22:57:07 hqnl0246134 sshd[263055]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:57:09,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360229.8372223, 'message': 'Dec 6 22:57:09 hqnl0246134 sshd[263055]: Failed password for invalid user test1 from 36.110.228.254 port 37392 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 22:57:10,862] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:57:10,887] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0334 seconds
INFO [2022-12-06 22:57:11,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360231.8378282, 'message': 'Dec 6 22:57:10 hqnl0246134 sshd[263055]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 22:57:13,863] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360233.8410168, 'message': 'Dec 6 22:57:12 hqnl0246134 sshd[263055]: Failed password for invalid user test1 from 36.110.228.254 port 37392 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 22:57:13,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360233.8412895, 'message': 'Dec 6 22:57:13 hqnl0246134 sshd[263055]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 22:57:15,863] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360235.841793, 'message': 'Dec 6 22:57:15 hqnl0246134 sshd[263055]: Failed password for invalid user test1 from 36.110.228.254 port 37392 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 22:57:17,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360237.8445497, 'message': 'Dec 6 22:57:16 hqnl0246134 sshd[263055]: error: maximum authentication attempts exceeded for invalid user test1 from 36.110.228.254 port 37392 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 22:57:17,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360237.8447793, 'message': 'Dec 6 22:57:16 hqnl0246134 sshd[263055]: Disconnecting invalid user test1 36.110.228.254 port 37392: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 22:57:17,980] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:57:17,981] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:57:17,988] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:57:18,002] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 22:57:19,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360239.846004, 'message': 'Dec 6 22:57:18 hqnl0246134 sshd[263093]: Invalid user test1 from 36.110.228.254 port 48441', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 22:57:19,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360239.8462477, 'message': 'Dec 6 22:57:18 hqnl0246134 sshd[263093]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 22:57:19,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360239.8463612, 'message': 'Dec 6 22:57:18 hqnl0246134 sshd[263093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 22:57:20,946] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:57:20,947] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:57:20,957] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:57:20,968] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-06 22:57:21,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360241.917126, 'message': 'Dec 6 22:57:20 hqnl0246134 sshd[263093]: Failed password for invalid user test1 from 36.110.228.254 port 48441 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 22:57:21,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360241.9173172, 'message': 'Dec 6 22:57:21 hqnl0246134 sshd[263093]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 22:57:23,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360243.850205, 'message': 'Dec 6 22:57:23 hqnl0246134 sshd[263093]: Failed password for invalid user test1 from 36.110.228.254 port 48441 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 22:57:25,873] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360245.8540401, 'message': 'Dec 6 22:57:24 hqnl0246134 sshd[263093]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:57:27,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360247.8575642, 'message': 'Dec 6 22:57:26 hqnl0246134 sshd[263093]: Failed password for invalid user test1 from 36.110.228.254 port 48441 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 22:57:27,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '203.76.121.230', 'timestamp': 1670360247.8578439, 'message': 'Dec 6 22:57:27 hqnl0246134 sshd[263106]: pam_imunify(sshd:auth): [IM360_RBL] The IP 203.76.121.230 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-06 22:57:27,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '203.76.121.230', 'timestamp': 1670360247.8580825, 'message': 'Dec 6 22:57:27 hqnl0246134 sshd[263106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.121.230 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:57:29,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360249.8614302, 'message': 'Dec 6 22:57:28 hqnl0246134 sshd[263093]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 22:57:31,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '203.76.121.230', 'timestamp': 1670360251.8616533, 'message': 'Dec 6 22:57:29 hqnl0246134 sshd[263106]: Failed password for root from 203.76.121.230 port 58332 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 22:57:31,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360251.8618426, 'message': 'Dec 6 22:57:30 hqnl0246134 sshd[263093]: Failed password for invalid user test1 from 36.110.228.254 port 48441 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 22:57:33,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360253.86448, 'message': 'Dec 6 22:57:32 hqnl0246134 sshd[263093]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 22:57:34,345] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:57:34,345] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:57:34,352] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:57:34,364] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 22:57:35,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360255.8659909, 'message': 'Dec 6 22:57:33 hqnl0246134 sshd[263093]: Failed password for invalid user test1 from 36.110.228.254 port 48441 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 22:57:35,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360255.866181, 'message': 'Dec 6 22:57:35 hqnl0246134 sshd[263093]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 22:57:37,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360257.8723757, 'message': 'Dec 6 22:57:37 hqnl0246134 sshd[263093]: Failed password for invalid user test1 from 36.110.228.254 port 48441 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0980 seconds
INFO [2022-12-06 22:57:39,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360259.870629, 'message': 'Dec 6 22:57:38 hqnl0246134 sshd[263093]: error: maximum authentication attempts exceeded for invalid user test1 from 36.110.228.254 port 48441 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 22:57:39,910] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360259.8710866, 'message': 'Dec 6 22:57:38 hqnl0246134 sshd[263113]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-06 22:57:39,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360259.8709466, 'message': 'Dec 6 22:57:38 hqnl0246134 sshd[263093]: Disconnecting invalid user test1 36.110.228.254 port 48441: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0383 seconds
INFO [2022-12-06 22:57:39,949] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360259.8711936, 'message': 'Dec 6 22:57:38 hqnl0246134 sshd[263113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 22:57:39,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360259.8712957, 'message': 'Dec 6 22:57:39 hqnl0246134 sshd[263123]: Invalid user test1 from 36.110.228.254 port 61580', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:57:39,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360259.8714142, 'message': 'Dec 6 22:57:39 hqnl0246134 sshd[263123]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:57:40,005] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360259.8715758, 'message': 'Dec 6 22:57:39 hqnl0246134 sshd[263123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:57:41,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360261.8740993, 'message': 'Dec 6 22:57:40 hqnl0246134 sshd[263113]: Failed password for root from 61.177.173.18 port 45911 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 22:57:41,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360261.8744044, 'message': 'Dec 6 22:57:41 hqnl0246134 sshd[263123]: Failed password for invalid user test1 from 36.110.228.254 port 61580 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 22:57:41,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360261.8742905, 'message': 'Dec 6 22:57:40 hqnl0246134 sshd[263113]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 22:57:43,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360263.8769255, 'message': 'Dec 6 22:57:42 hqnl0246134 sshd[263123]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 22:57:43,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360263.877113, 'message': 'Dec 6 22:57:43 hqnl0246134 sshd[263113]: Failed password for root from 61.177.173.18 port 45911 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 22:57:45,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360265.8779194, 'message': 'Dec 6 22:57:44 hqnl0246134 sshd[263123]: Failed password for invalid user test1 from 36.110.228.254 port 61580 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 22:57:45,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360265.8781414, 'message': 'Dec 6 22:57:45 hqnl0246134 sshd[263113]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 22:57:45,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360265.8782542, 'message': 'Dec 6 22:57:45 hqnl0246134 sshd[263123]: Disconnected from invalid user test1 36.110.228.254 port 61580 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 22:57:47,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360267.883517, 'message': 'Dec 6 22:57:46 hqnl0246134 sshd[263126]: Invalid user test2 from 36.110.228.254 port 28921', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0580 seconds
INFO [2022-12-06 22:57:47,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360267.8840618, 'message': 'Dec 6 22:57:47 hqnl0246134 sshd[263113]: Failed password for root from 61.177.173.18 port 45911 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0578 seconds
INFO [2022-12-06 22:57:47,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360267.8837473, 'message': 'Dec 6 22:57:46 hqnl0246134 sshd[263126]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 22:57:47,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360267.8838623, 'message': 'Dec 6 22:57:46 hqnl0246134 sshd[263126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-06 22:57:49,448] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:57:49,449] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:57:49,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360269.8857427, 'message': 'Dec 6 22:57:49 hqnl0246134 sshd[263126]: Failed password for invalid user test2 from 36.110.228.254 port 28921 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:57:52,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360271.995519, 'message': 'Dec 6 22:57:51 hqnl0246134 sshd[263126]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:57:53,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360273.8899455, 'message': 'Dec 6 22:57:52 hqnl0246134 sshd[263126]: Failed password for invalid user test2 from 36.110.228.254 port 28921 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 22:57:53,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360273.8901622, 'message': 'Dec 6 22:57:53 hqnl0246134 sshd[263126]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 22:57:57,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360277.8941872, 'message': 'Dec 6 22:57:55 hqnl0246134 sshd[263126]: Failed password for invalid user test2 from 36.110.228.254 port 28921 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:57:57,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360277.8944094, 'message': 'Dec 6 22:57:57 hqnl0246134 sshd[263126]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 22:57:59,918] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360279.8966153, 'message': 'Dec 6 22:57:59 hqnl0246134 sshd[263126]: Failed password for invalid user test2 from 36.110.228.254 port 28921 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 22:58:01,920] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360281.898908, 'message': 'Dec 6 22:58:01 hqnl0246134 sshd[263126]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 22:58:03,920] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360283.9005892, 'message': 'Dec 6 22:58:03 hqnl0246134 sshd[263126]: Failed password for invalid user test2 from 36.110.228.254 port 28921 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:58:03,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360283.9009037, 'message': 'Dec 6 22:58:03 hqnl0246134 sshd[263126]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:58:05,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360285.9035664, 'message': 'Dec 6 22:58:05 hqnl0246134 sshd[263126]: Failed password for invalid user test2 from 36.110.228.254 port 28921 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 22:58:05,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360285.9037738, 'message': 'Dec 6 22:58:05 hqnl0246134 sshd[263126]: error: maximum authentication attempts exceeded for invalid user test2 from 36.110.228.254 port 28921 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 22:58:05,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360285.9039361, 'message': 'Dec 6 22:58:05 hqnl0246134 sshd[263126]: Disconnecting invalid user test2 36.110.228.254 port 28921: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 22:58:07,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360287.9080462, 'message': 'Dec 6 22:58:07 hqnl0246134 sshd[263147]: Invalid user test2 from 36.110.228.254 port 36144', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 22:58:07,949] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360287.908294, 'message': 'Dec 6 22:58:07 hqnl0246134 sshd[263147]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:58:08,057] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360287.9084096, 'message': 'Dec 6 22:58:07 hqnl0246134 sshd[263147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1080 seconds
INFO [2022-12-06 22:58:09,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360289.9103744, 'message': 'Dec 6 22:58:09 hqnl0246134 sshd[263147]: Failed password for invalid user test2 from 36.110.228.254 port 36144 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0326 seconds
WARNING [2022-12-06 22:58:10,866] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:58:10,888] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0300 seconds
INFO [2022-12-06 22:58:11,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360291.9123764, 'message': 'Dec 6 22:58:11 hqnl0246134 sshd[263147]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 22:58:13,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360293.9138823, 'message': 'Dec 6 22:58:13 hqnl0246134 sshd[263147]: Failed password for invalid user test2 from 36.110.228.254 port 36144 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 22:58:15,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360295.9161205, 'message': 'Dec 6 22:58:15 hqnl0246134 sshd[263147]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 22:58:17,847] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:58:17,847] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:58:17,858] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:58:17,871] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-06 22:58:17,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360297.9185975, 'message': 'Dec 6 22:58:17 hqnl0246134 sshd[263147]: Failed password for invalid user test2 from 36.110.228.254 port 36144 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:58:20,656] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:58:20,656] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:58:20,663] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:58:20,675] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 22:58:21,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360301.9216745, 'message': 'Dec 6 22:58:19 hqnl0246134 sshd[263147]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:58:23,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360303.924104, 'message': 'Dec 6 22:58:22 hqnl0246134 sshd[263147]: Failed password for invalid user test2 from 36.110.228.254 port 36144 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 22:58:25,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360305.925026, 'message': 'Dec 6 22:58:24 hqnl0246134 sshd[263147]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 22:58:25,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360305.9253268, 'message': 'Dec 6 22:58:25 hqnl0246134 sshd[263168]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 22:58:25,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360305.9255345, 'message': 'Dec 6 22:58:25 hqnl0246134 sshd[263168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 22:58:27,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360307.92585, 'message': 'Dec 6 22:58:26 hqnl0246134 sshd[263147]: Failed password for invalid user test2 from 36.110.228.254 port 36144 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 22:58:27,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360307.9260404, 'message': 'Dec 6 22:58:26 hqnl0246134 sshd[263168]: Failed password for root from 61.177.173.18 port 62338 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 22:58:27,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360307.9261513, 'message': 'Dec 6 22:58:27 hqnl0246134 sshd[263168]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-06 22:58:29,990] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360309.9296148, 'message': 'Dec 6 22:58:28 hqnl0246134 sshd[263147]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0604 seconds
INFO [2022-12-06 22:58:29,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360309.9311247, 'message': 'Dec 6 22:58:29 hqnl0246134 sshd[263168]: Failed password for root from 61.177.173.18 port 62338 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0603 seconds
INFO [2022-12-06 22:58:30,013] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360309.9312906, 'message': 'Dec 6 22:58:29 hqnl0246134 sshd[263168]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 22:58:31,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360311.930193, 'message': 'Dec 6 22:58:30 hqnl0246134 sshd[263147]: Failed password for invalid user test2 from 36.110.228.254 port 36144 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 22:58:33,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360313.932795, 'message': 'Dec 6 22:58:32 hqnl0246134 sshd[263168]: Failed password for root from 61.177.173.18 port 62338 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-06 22:58:33,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360313.9329984, 'message': 'Dec 6 22:58:32 hqnl0246134 sshd[263147]: error: maximum authentication attempts exceeded for invalid user test2 from 36.110.228.254 port 36144 ssh2 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 22:58:33,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360313.9331305, 'message': 'Dec 6 22:58:32 hqnl0246134 sshd[263147]: Disconnecting invalid user test2 36.110.228.254 port 36144: Too many authentication failures [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 22:58:34,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360313.933265, 'message': 'Dec 6 22:58:33 hqnl0246134 sshd[263171]: Invalid user test2 from 36.110.228.254 port 60004', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:58:34,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360313.9333696, 'message': 'Dec 6 22:58:33 hqnl0246134 sshd[263171]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 22:58:34,051] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360313.9335053, 'message': 'Dec 6 22:58:33 hqnl0246134 sshd[263171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 22:58:35,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.149.77.178', 'timestamp': 1670360315.9353216, 'message': 'Dec 6 22:58:34 hqnl0246134 sshd[263173]: Invalid user xujie from 41.149.77.178 port 53572', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0408 seconds
INFO [2022-12-06 22:58:35,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360315.9360085, 'message': 'Dec 6 22:58:35 hqnl0246134 sshd[263171]: Failed password for invalid user test2 from 36.110.228.254 port 60004 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-06 22:58:35,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.149.77.178', 'timestamp': 1670360315.9356718, 'message': 'Dec 6 22:58:34 hqnl0246134 sshd[263173]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.149.77.178 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:58:36,017] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.149.77.178', 'timestamp': 1670360315.935893, 'message': 'Dec 6 22:58:34 hqnl0246134 sshd[263173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.149.77.178 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 22:58:37,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.149.77.178', 'timestamp': 1670360317.9370773, 'message': 'Dec 6 22:58:36 hqnl0246134 sshd[263173]: Failed password for invalid user xujie from 41.149.77.178 port 53572 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-06 22:58:37,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360317.9375901, 'message': 'Dec 6 22:58:37 hqnl0246134 sshd[263171]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0519 seconds
INFO [2022-12-06 22:58:38,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.149.77.178', 'timestamp': 1670360317.9373848, 'message': 'Dec 6 22:58:37 hqnl0246134 sshd[263173]: Disconnected from invalid user xujie 41.149.77.178 port 53572 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 22:58:39,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360319.9377062, 'message': 'Dec 6 22:58:39 hqnl0246134 sshd[263171]: Failed password for invalid user test2 from 36.110.228.254 port 60004 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 22:58:41,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360321.9423573, 'message': 'Dec 6 22:58:40 hqnl0246134 sshd[263171]: Disconnected from invalid user test2 36.110.228.254 port 60004 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 22:58:41,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360321.9426641, 'message': 'Dec 6 22:58:40 hqnl0246134 sshd[263187]: Invalid user contador from 36.110.228.254 port 26365', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 22:58:42,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360321.9428623, 'message': 'Dec 6 22:58:40 hqnl0246134 sshd[263187]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 22:58:42,058] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360321.9429955, 'message': 'Dec 6 22:58:40 hqnl0246134 sshd[263187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 22:58:42,870] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:58:42,871] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:58:42,879] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:58:42,892] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 22:58:43,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360323.942196, 'message': 'Dec 6 22:58:43 hqnl0246134 sshd[263187]: Failed password for invalid user contador from 36.110.228.254 port 26365 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 22:58:45,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360325.9444315, 'message': 'Dec 6 22:58:44 hqnl0246134 sshd[263187]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 22:58:47,976] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360327.9474013, 'message': 'Dec 6 22:58:46 hqnl0246134 sshd[263187]: Failed password for invalid user contador from 36.110.228.254 port 26365 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 22:58:47,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.180.102', 'timestamp': 1670360327.9476285, 'message': 'Dec 6 22:58:47 hqnl0246134 sshd[263197]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.180.102 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 22:58:47,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.180.102', 'timestamp': 1670360327.9477544, 'message': 'Dec 6 22:58:47 hqnl0246134 sshd[263197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-06 22:58:49,457] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:58:49,458] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 22:58:49,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360329.957731, 'message': 'Dec 6 22:58:48 hqnl0246134 sshd[263187]: Disconnected from invalid user contador 36.110.228.254 port 26365 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-06 22:58:49,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.197.180.102', 'timestamp': 1670360329.957912, 'message': 'Dec 6 22:58:49 hqnl0246134 sshd[263197]: Failed password for root from 138.197.180.102 port 54126 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-06 22:58:51,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360331.9612179, 'message': 'Dec 6 22:58:50 hqnl0246134 sshd[263199]: Invalid user duni from 36.110.228.254 port 50308', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:58:52,000] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360331.9615133, 'message': 'Dec 6 22:58:50 hqnl0246134 sshd[263199]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:58:52,017] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360331.9616728, 'message': 'Dec 6 22:58:50 hqnl0246134 sshd[263199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 22:58:53,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360333.9621992, 'message': 'Dec 6 22:58:53 hqnl0246134 sshd[263199]: Failed password for invalid user duni from 36.110.228.254 port 50308 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 22:58:54,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360333.9624712, 'message': 'Dec 6 22:58:53 hqnl0246134 sshd[263199]: Disconnected from invalid user duni 36.110.228.254 port 50308 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 22:58:55,990] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360335.9634821, 'message': 'Dec 6 22:58:55 hqnl0246134 sshd[263203]: Invalid user pi from 36.110.228.254 port 11078', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 22:58:56,021] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360335.9637556, 'message': 'Dec 6 22:58:55 hqnl0246134 sshd[263203]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-06 22:58:56,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360335.963943, 'message': 'Dec 6 22:58:55 hqnl0246134 sshd[263203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0398 seconds
INFO [2022-12-06 22:58:57,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360337.9635532, 'message': 'Dec 6 22:58:57 hqnl0246134 sshd[263203]: Failed password for invalid user pi from 36.110.228.254 port 11078 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 22:58:58,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360337.9637578, 'message': 'Dec 6 22:58:57 hqnl0246134 sshd[263203]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 22:58:59,988] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360339.9657292, 'message': 'Dec 6 22:58:59 hqnl0246134 sshd[263203]: Failed password for invalid user pi from 36.110.228.254 port 11078 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 22:59:02,016] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360341.9692736, 'message': 'Dec 6 22:59:00 hqnl0246134 sshd[263203]: Disconnected from invalid user pi 36.110.228.254 port 11078 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0468 seconds
INFO [2022-12-06 22:59:02,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360341.979479, 'message': 'Dec 6 22:59:01 hqnl0246134 sshd[263208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-06 22:59:02,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360341.979753, 'message': 'Dec 6 22:59:01 hqnl0246134 sshd[263206]: Invalid user baikal from 36.110.228.254 port 30776', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 22:59:02,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360341.9799583, 'message': 'Dec 6 22:59:01 hqnl0246134 sshd[263206]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.110.228.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 22:59:02,088] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360341.980156, 'message': 'Dec 6 22:59:01 hqnl0246134 sshd[263206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-06 22:59:04,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360343.9699106, 'message': 'Dec 6 22:59:02 hqnl0246134 sshd[263208]: Failed password for root from 165.227.166.207 port 54906 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 22:59:04,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360343.970217, 'message': 'Dec 6 22:59:03 hqnl0246134 sshd[263206]: Failed password for invalid user baikal from 36.110.228.254 port 30776 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-06 22:59:05,988] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.110.228.254', 'timestamp': 1670360345.9702322, 'message': 'Dec 6 22:59:04 hqnl0246134 sshd[263206]: Disconnected from invalid user baikal 36.110.228.254 port 30776 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 22:59:10,871] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:59:10,895] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0325 seconds
INFO [2022-12-06 22:59:12,000] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360351.9782321, 'message': 'Dec 6 22:59:11 hqnl0246134 sshd[263226]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 22:59:12,021] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360351.9785914, 'message': 'Dec 6 22:59:11 hqnl0246134 sshd[263226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 22:59:14,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360353.982576, 'message': 'Dec 6 22:59:13 hqnl0246134 sshd[263226]: Failed password for root from 61.177.173.18 port 24482 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 22:59:15,844] defence360agent.files: Updating all files
INFO [2022-12-06 22:59:16,126] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 22:59:16,127] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 22:59:16,465] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 22:59:16,465] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 22:59:16,786] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 22:59:16,786] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 22:59:17,114] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 22:59:17,114] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 22:59:17,114] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 22:59:17,432] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 20:59:17 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E4FE525BA02FE'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 22:59:17,434] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 22:59:17,435] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 22:59:17,937] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:59:17,938] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:59:17,945] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:59:17,957] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 22:59:18,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360357.9852793, 'message': 'Dec 6 22:59:16 hqnl0246134 sshd[263226]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 22:59:18,026] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 22:59:18,026] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 22:59:18,285] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 22:59:18,285] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 22:59:18,605] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 22:59:18,605] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 22:59:18,954] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 22:59:18,954] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 22:59:19,397] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 22:59:19,399] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 22:59:20,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360359.987778, 'message': 'Dec 6 22:59:18 hqnl0246134 sshd[263226]: Failed password for root from 61.177.173.18 port 24482 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 22:59:20,645] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 22:59:20,646] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 22:59:20,653] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 22:59:20,664] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 22:59:22,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360361.9899879, 'message': 'Dec 6 22:59:20 hqnl0246134 sshd[263226]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 22:59:24,017] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360363.9925742, 'message': 'Dec 6 22:59:22 hqnl0246134 sshd[263226]: Failed password for root from 61.177.173.18 port 24482 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0244 seconds
WARNING [2022-12-06 22:59:49,461] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 22:59:49,462] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:00:00,073] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360400.0496593, 'message': 'Dec 6 22:59:58 hqnl0246134 sshd[263275]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 23:00:00,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360400.0502243, 'message': 'Dec 6 22:59:58 hqnl0246134 sshd[263275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 23:00:02,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360402.0453675, 'message': 'Dec 6 23:00:00 hqnl0246134 sshd[263275]: Failed password for root from 61.177.173.18 port 48725 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-06 23:00:02,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360402.04579, 'message': 'Dec 6 23:00:00 hqnl0246134 sshd[263275]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 23:00:04,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360404.0464065, 'message': 'Dec 6 23:00:03 hqnl0246134 sshd[263275]: Failed password for root from 61.177.173.18 port 48725 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0609 seconds
INFO [2022-12-06 23:00:06,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360406.047885, 'message': 'Dec 6 23:00:05 hqnl0246134 sshd[263275]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 23:00:08,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360408.0534108, 'message': 'Dec 6 23:00:07 hqnl0246134 sshd[263275]: Failed password for root from 61.177.173.18 port 48725 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 23:00:10,885] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:00:10,917] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0497 seconds
INFO [2022-12-06 23:00:12,669] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:00:12,670] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:00:12,699] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:00:12,712] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0415 seconds
INFO [2022-12-06 23:00:17,790] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:00:17,791] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:00:17,799] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:00:17,814] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
INFO [2022-12-06 23:00:20,479] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:00:20,480] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:00:20,489] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:00:20,501] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 23:00:41,934] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 23:00:42,007] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 23:00:42,008] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 23:00:42,008] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 23:00:42,009] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 23:00:42,010] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 23:00:42,029] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 23:00:42,059] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0481 seconds
WARNING [2022-12-06 23:00:42,071] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:00:42,074] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:00:42,091] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0421 seconds
INFO [2022-12-06 23:00:42,092] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0371 seconds
INFO [2022-12-06 23:00:44,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360444.0994737, 'message': 'Dec 6 23:00:43 hqnl0246134 sshd[263367]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 23:00:44,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360444.0997307, 'message': 'Dec 6 23:00:43 hqnl0246134 sshd[263367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:00:46,120] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360446.1015062, 'message': 'Dec 6 23:00:44 hqnl0246134 sshd[263367]: Failed password for root from 61.177.173.18 port 61022 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:00:46,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360446.101714, 'message': 'Dec 6 23:00:45 hqnl0246134 sshd[263367]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 23:00:48,125] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360448.107247, 'message': 'Dec 6 23:00:47 hqnl0246134 sshd[263367]: Failed password for root from 61.177.173.18 port 61022 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 23:00:48,142] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360448.1074424, 'message': 'Dec 6 23:00:47 hqnl0246134 sshd[263367]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 23:00:49,467] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:00:49,468] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:00:50,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360450.1128542, 'message': 'Dec 6 23:00:50 hqnl0246134 sshd[263367]: Failed password for root from 61.177.173.18 port 61022 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 23:00:54,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360454.117451, 'message': 'Dec 6 23:00:54 hqnl0246134 sshd[263373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 23:00:56,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360456.1177056, 'message': 'Dec 6 23:00:55 hqnl0246134 sshd[263373]: Failed password for root from 165.227.166.207 port 36966 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 23:01:04,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.28.101.14', 'timestamp': 1670360464.1343746, 'message': 'Dec 6 23:01:04 hqnl0246134 sshd[263385]: Invalid user db2fenc1 from 181.28.101.14 port 52500', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-06 23:01:06,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '181.28.101.14', 'timestamp': 1670360466.1386392, 'message': 'Dec 6 23:01:04 hqnl0246134 sshd[263385]: pam_imunify(sshd:auth): [IM360_RBL] The IP 181.28.101.14 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-06 23:01:06,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '181.28.101.14', 'timestamp': 1670360466.1389499, 'message': 'Dec 6 23:01:04 hqnl0246134 sshd[263385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.28.101.14 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-06 23:01:08,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.28.101.14', 'timestamp': 1670360468.145529, 'message': 'Dec 6 23:01:06 hqnl0246134 sshd[263385]: Failed password for invalid user db2fenc1 from 181.28.101.14 port 52500 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 23:01:08,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '181.28.101.14', 'timestamp': 1670360468.1457515, 'message': 'Dec 6 23:01:07 hqnl0246134 sshd[263385]: Disconnected from invalid user db2fenc1 181.28.101.14 port 52500 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0167 seconds
WARNING [2022-12-06 23:01:10,880] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:01:10,906] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0354 seconds
INFO [2022-12-06 23:01:12,138] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 23:01:12,138] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 23:01:12,139] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 23:01:17,889] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:01:17,889] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:01:17,897] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:01:17,909] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 23:01:20,604] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:01:20,604] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:01:20,613] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:01:20,626] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
INFO [2022-12-06 23:01:30,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360490.176384, 'message': 'Dec 6 23:01:29 hqnl0246134 sshd[263408]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 23:01:30,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360490.1767654, 'message': 'Dec 6 23:01:29 hqnl0246134 sshd[263408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 23:01:32,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360492.1798642, 'message': 'Dec 6 23:01:31 hqnl0246134 sshd[263408]: Failed password for root from 61.177.173.18 port 30758 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 23:01:32,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360492.1801093, 'message': 'Dec 6 23:01:31 hqnl0246134 sshd[263408]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:01:34,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360494.1832705, 'message': 'Dec 6 23:01:32 hqnl0246134 sshd[263408]: Failed password for root from 61.177.173.18 port 30758 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 23:01:34,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360494.1835616, 'message': 'Dec 6 23:01:33 hqnl0246134 sshd[263408]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 23:01:36,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360496.186787, 'message': 'Dec 6 23:01:35 hqnl0246134 sshd[263408]: Failed password for root from 61.177.173.18 port 30758 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 23:01:38,622] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:01:38,623] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:01:38,636] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:01:38,655] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0308 seconds
WARNING [2022-12-06 23:01:49,470] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:01:49,471] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 23:01:54,046] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 23:02:10,883] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:02:10,907] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0333 seconds
INFO [2022-12-06 23:02:16,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360536.2437794, 'message': 'Dec 6 23:02:14 hqnl0246134 sshd[263460]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 23:02:16,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360536.2440574, 'message': 'Dec 6 23:02:14 hqnl0246134 sshd[263460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 23:02:18,195] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:02:18,196] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:02:18,205] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:02:18,217] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 23:02:18,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360538.2454195, 'message': 'Dec 6 23:02:16 hqnl0246134 sshd[263460]: Failed password for root from 61.177.173.18 port 49279 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 23:02:18,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360538.2456696, 'message': 'Dec 6 23:02:16 hqnl0246134 sshd[263460]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:02:20,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360540.2500613, 'message': 'Dec 6 23:02:18 hqnl0246134 sshd[263460]: Failed password for root from 61.177.173.18 port 49279 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:02:22,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360542.252246, 'message': 'Dec 6 23:02:21 hqnl0246134 sshd[263460]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 23:02:22,827] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:02:22,828] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:02:22,835] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:02:22,847] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 23:02:24,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360544.257598, 'message': 'Dec 6 23:02:23 hqnl0246134 sshd[263460]: Failed password for root from 61.177.173.18 port 49279 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 23:02:42,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360562.2855756, 'message': 'Dec 6 23:02:41 hqnl0246134 sshd[263505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 23:02:46,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360566.2881336, 'message': 'Dec 6 23:02:44 hqnl0246134 sshd[263505]: Failed password for root from 165.227.166.207 port 47304 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 23:02:48,435] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:02:48,436] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:02:48,443] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:02:48,454] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
WARNING [2022-12-06 23:02:49,473] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:02:49,474] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:03:02,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360582.3088665, 'message': 'Dec 6 23:03:01 hqnl0246134 sshd[263519]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 23:03:02,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360582.3092558, 'message': 'Dec 6 23:03:01 hqnl0246134 sshd[263519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 23:03:04,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360584.3099544, 'message': 'Dec 6 23:03:03 hqnl0246134 sshd[263519]: Failed password for root from 61.177.173.18 port 18241 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 23:03:04,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360584.3102329, 'message': 'Dec 6 23:03:03 hqnl0246134 sshd[263519]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 23:03:06,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360586.3120644, 'message': 'Dec 6 23:03:05 hqnl0246134 sshd[263519]: Failed password for root from 61.177.173.18 port 18241 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-06 23:03:06,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360586.3123088, 'message': 'Dec 6 23:03:06 hqnl0246134 sshd[263519]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 23:03:10,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360590.3172889, 'message': 'Dec 6 23:03:08 hqnl0246134 sshd[263519]: Failed password for root from 61.177.173.18 port 18241 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0378 seconds
WARNING [2022-12-06 23:03:10,885] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:03:10,905] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0277 seconds
INFO [2022-12-06 23:03:17,974] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:03:17,975] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:03:17,983] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:03:17,996] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 23:03:21,798] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:03:21,799] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:03:21,807] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:03:21,818] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 23:03:48,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360628.3605757, 'message': 'Dec 6 23:03:47 hqnl0246134 sshd[263564]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 23:03:48,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360628.3613381, 'message': 'Dec 6 23:03:47 hqnl0246134 sshd[263564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 23:03:49,477] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:03:49,478] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:03:50,382] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360630.3609543, 'message': 'Dec 6 23:03:50 hqnl0246134 sshd[263564]: Failed password for root from 61.177.173.18 port 33526 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 23:03:52,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360632.364071, 'message': 'Dec 6 23:03:52 hqnl0246134 sshd[263564]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 23:03:54,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360634.3660185, 'message': 'Dec 6 23:03:54 hqnl0246134 sshd[263564]: Failed password for root from 61.177.173.18 port 33526 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 23:03:56,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360636.368834, 'message': 'Dec 6 23:03:56 hqnl0246134 sshd[263564]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 23:03:58,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360638.3722243, 'message': 'Dec 6 23:03:58 hqnl0246134 sshd[263564]: Failed password for root from 61.177.173.18 port 33526 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-06 23:04:10,898] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:04:10,935] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0524 seconds
INFO [2022-12-06 23:04:18,142] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:04:18,142] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:04:18,152] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:04:18,165] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 23:04:21,149] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:04:21,150] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:04:21,163] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:04:21,185] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0340 seconds
INFO [2022-12-06 23:04:34,463] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360674.4390357, 'message': 'Dec 6 23:04:33 hqnl0246134 sshd[263600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 23:04:36,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360676.4405293, 'message': 'Dec 6 23:04:34 hqnl0246134 sshd[263602]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 23:04:36,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360676.440903, 'message': 'Dec 6 23:04:35 hqnl0246134 sshd[263600]: Failed password for root from 165.227.166.207 port 57566 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 23:04:36,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360676.4407492, 'message': 'Dec 6 23:04:34 hqnl0246134 sshd[263602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 23:04:38,463] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360678.441931, 'message': 'Dec 6 23:04:37 hqnl0246134 sshd[263602]: Failed password for root from 61.177.173.18 port 60083 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 23:04:40,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360680.4445882, 'message': 'Dec 6 23:04:39 hqnl0246134 sshd[263602]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 23:04:41,394] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:04:41,394] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:04:41,401] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:04:41,412] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-06 23:04:42,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360682.4464548, 'message': 'Dec 6 23:04:40 hqnl0246134 sshd[263602]: Failed password for root from 61.177.173.18 port 60083 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 23:04:42,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360682.4466813, 'message': 'Dec 6 23:04:41 hqnl0246134 sshd[263602]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 23:04:44,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360684.448682, 'message': 'Dec 6 23:04:44 hqnl0246134 sshd[263602]: Failed password for root from 61.177.173.18 port 60083 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-06 23:04:49,481] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:04:49,482] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 23:05:10,898] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:05:10,917] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0281 seconds
INFO [2022-12-06 23:05:18,168] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:05:18,169] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:05:18,178] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:05:18,190] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 23:05:21,413] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:05:21,413] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:05:21,421] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:05:21,437] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0234 seconds
INFO [2022-12-06 23:05:24,534] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360724.5091848, 'message': 'Dec 6 23:05:23 hqnl0246134 sshd[263672]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 23:05:24,561] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360724.509498, 'message': 'Dec 6 23:05:23 hqnl0246134 sshd[263672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 23:05:26,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360726.5116353, 'message': 'Dec 6 23:05:25 hqnl0246134 sshd[263672]: Failed password for root from 61.177.173.18 port 42647 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 23:05:28,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360728.5143454, 'message': 'Dec 6 23:05:27 hqnl0246134 sshd[263672]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 23:05:30,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360730.5209947, 'message': 'Dec 6 23:05:29 hqnl0246134 sshd[263672]: Failed password for root from 61.177.173.18 port 42647 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 23:05:30,559] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360730.5212448, 'message': 'Dec 6 23:05:29 hqnl0246134 sshd[263672]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 23:05:32,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360732.5245159, 'message': 'Dec 6 23:05:32 hqnl0246134 sshd[263672]: Failed password for root from 61.177.173.18 port 42647 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:05:42,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360742.53957, 'message': 'Dec 6 23:05:41 hqnl0246134 sshd[263676]: Invalid user nicolas from 103.67.165.114 port 45200', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 23:05:42,585] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360742.5400832, 'message': 'Dec 6 23:05:41 hqnl0246134 sshd[263676]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.67.165.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:05:42,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360742.5403996, 'message': 'Dec 6 23:05:41 hqnl0246134 sshd[263676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.67.165.114 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 23:05:44,560] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360744.5413048, 'message': 'Dec 6 23:05:43 hqnl0246134 sshd[263676]: Failed password for invalid user nicolas from 103.67.165.114 port 45200 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 23:05:46,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360746.5423405, 'message': 'Dec 6 23:05:45 hqnl0246134 sshd[263676]: Disconnected from invalid user nicolas 103.67.165.114 port 45200 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 23:05:48,636] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:05:48,637] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:05:48,651] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:05:48,667] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0291 seconds
WARNING [2022-12-06 23:05:49,485] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:05:49,485] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:05:51,802] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 23:05:51,875] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 23:05:51,876] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 23:05:51,876] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 23:05:51,876] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 23:05:51,877] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 23:05:51,889] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 23:05:51,904] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0273 seconds
WARNING [2022-12-06 23:05:51,911] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:05:51,914] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:05:51,935] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0362 seconds
INFO [2022-12-06 23:05:51,937] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0346 seconds
INFO [2022-12-06 23:06:08,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.19.172', 'timestamp': 1670360768.5721157, 'message': 'Dec 6 23:06:06 hqnl0246134 sshd[263704]: Invalid user joshua from 49.51.19.172 port 41472', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 23:06:08,606] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360768.5733168, 'message': 'Dec 6 23:06:07 hqnl0246134 sshd[263702]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 23:06:08,639] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.51.19.172', 'timestamp': 1670360768.572419, 'message': 'Dec 6 23:06:07 hqnl0246134 sshd[263704]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.51.19.172 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 23:06:08,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360768.5734546, 'message': 'Dec 6 23:06:07 hqnl0246134 sshd[263702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 23:06:08,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.51.19.172', 'timestamp': 1670360768.572601, 'message': 'Dec 6 23:06:07 hqnl0246134 sshd[263704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.19.172 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:06:10,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360770.5746403, 'message': 'Dec 6 23:06:08 hqnl0246134 sshd[263702]: Failed password for root from 61.177.173.18 port 49996 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-06 23:06:10,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.19.172', 'timestamp': 1670360770.575008, 'message': 'Dec 6 23:06:09 hqnl0246134 sshd[263704]: Failed password for invalid user joshua from 49.51.19.172 port 41472 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-06 23:06:10,651] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360770.5751522, 'message': 'Dec 6 23:06:09 hqnl0246134 sshd[263702]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-06 23:06:10,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.19.172', 'timestamp': 1670360770.5753026, 'message': 'Dec 6 23:06:09 hqnl0246134 sshd[263704]: Disconnected from invalid user joshua 49.51.19.172 port 41472 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0413 seconds
WARNING [2022-12-06 23:06:10,901] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:06:10,994] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.1006 seconds
INFO [2022-12-06 23:06:12,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.180.102', 'timestamp': 1670360772.577601, 'message': 'Dec 6 23:06:11 hqnl0246134 sshd[263714]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.180.102 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-06 23:06:12,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360772.578027, 'message': 'Dec 6 23:06:11 hqnl0246134 sshd[263702]: Failed password for root from 61.177.173.18 port 49996 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0410 seconds
INFO [2022-12-06 23:06:12,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.180.102', 'timestamp': 1670360772.577851, 'message': 'Dec 6 23:06:11 hqnl0246134 sshd[263714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 23:06:12,653] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360772.579016, 'message': 'Dec 6 23:06:12 hqnl0246134 sshd[263702]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 23:06:14,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.197.180.102', 'timestamp': 1670360774.5856786, 'message': 'Dec 6 23:06:12 hqnl0246134 sshd[263714]: Failed password for root from 138.197.180.102 port 41488 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-06 23:06:14,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360774.586574, 'message': 'Dec 6 23:06:13 hqnl0246134 sshd[263702]: Failed password for root from 61.177.173.18 port 49996 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 23:06:17,873] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:06:17,874] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:06:17,881] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:06:17,892] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 23:06:20,920] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:06:20,921] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:06:20,928] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:06:20,942] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 23:06:22,004] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 23:06:22,005] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 23:06:22,006] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-06 23:06:24,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360784.5937095, 'message': 'Dec 6 23:06:23 hqnl0246134 sshd[263752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 23:06:26,632] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360786.598381, 'message': 'Dec 6 23:06:24 hqnl0246134 sshd[263752]: Failed password for root from 165.227.166.207 port 39632 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
WARNING [2022-12-06 23:06:49,491] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:06:49,493] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:06:52,673] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360812.6490352, 'message': 'Dec 6 23:06:52 hqnl0246134 sshd[263764]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 23:06:52,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360812.6496284, 'message': 'Dec 6 23:06:52 hqnl0246134 sshd[263764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 23:06:54,676] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360814.6527152, 'message': 'Dec 6 23:06:54 hqnl0246134 sshd[263764]: Failed password for root from 61.177.173.18 port 14676 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 23:06:56,675] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360816.6560314, 'message': 'Dec 6 23:06:54 hqnl0246134 sshd[263764]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 23:06:58,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360818.657712, 'message': 'Dec 6 23:06:56 hqnl0246134 sshd[263764]: Failed password for root from 61.177.173.18 port 14676 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 23:06:58,697] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360818.657976, 'message': 'Dec 6 23:06:57 hqnl0246134 sshd[263764]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:06:58,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360818.658102, 'message': 'Dec 6 23:06:58 hqnl0246134 sshd[263764]: Failed password for root from 61.177.173.18 port 14676 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 23:07:10,906] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:07:10,930] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0324 seconds
INFO [2022-12-06 23:07:18,050] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:07:18,050] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:07:18,058] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:07:18,070] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 23:07:21,096] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:07:21,097] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:07:21,109] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:07:21,126] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0286 seconds
INFO [2022-12-06 23:07:38,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360858.7261617, 'message': 'Dec 6 23:07:37 hqnl0246134 sshd[263806]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:07:38,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360858.726417, 'message': 'Dec 6 23:07:37 hqnl0246134 sshd[263806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 23:07:40,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360860.7270944, 'message': 'Dec 6 23:07:39 hqnl0246134 sshd[263806]: Failed password for root from 61.177.173.18 port 33437 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0399 seconds
INFO [2022-12-06 23:07:40,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360860.7275429, 'message': 'Dec 6 23:07:39 hqnl0246134 sshd[263806]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 23:07:42,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360862.730998, 'message': 'Dec 6 23:07:41 hqnl0246134 sshd[263806]: Failed password for root from 61.177.173.18 port 33437 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:07:42,783] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360862.731227, 'message': 'Dec 6 23:07:41 hqnl0246134 sshd[263806]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 23:07:44,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360864.7342455, 'message': 'Dec 6 23:07:44 hqnl0246134 sshd[263806]: Failed password for root from 61.177.173.18 port 33437 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 23:07:49,467] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:07:49,467] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:07:49,483] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:07:49,494] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:07:49,494] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:07:49,505] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0358 seconds
INFO [2022-12-06 23:08:08,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360888.7663035, 'message': 'Dec 6 23:08:08 hqnl0246134 sshd[263838]: Invalid user snow from 103.67.165.114 port 52530', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 23:08:08,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360888.7669244, 'message': 'Dec 6 23:08:08 hqnl0246134 sshd[263838]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.67.165.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 23:08:08,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360888.7671037, 'message': 'Dec 6 23:08:08 hqnl0246134 sshd[263838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.67.165.114 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
WARNING [2022-12-06 23:08:11,748] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:08:11,769] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.8683 seconds
INFO [2022-12-06 23:08:12,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360892.7666063, 'message': 'Dec 6 23:08:10 hqnl0246134 sshd[263838]: Failed password for invalid user snow from 103.67.165.114 port 52530 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0614 seconds
INFO [2022-12-06 23:08:12,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.67.165.114', 'timestamp': 1670360892.7669213, 'message': 'Dec 6 23:08:11 hqnl0246134 sshd[263838]: Disconnected from invalid user snow 103.67.165.114 port 52530 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0555 seconds
INFO [2022-12-06 23:08:18,117] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:08:18,118] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:08:18,126] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:08:18,138] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 23:08:21,223] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:08:21,223] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:08:21,231] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:08:21,244] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 23:08:22,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360902.7825894, 'message': 'Dec 6 23:08:21 hqnl0246134 sshd[263861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 23:08:24,815] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360904.7841537, 'message': 'Dec 6 23:08:22 hqnl0246134 sshd[263863]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 23:08:24,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670360904.7851217, 'message': 'Dec 6 23:08:23 hqnl0246134 sshd[263861]: Failed password for root from 165.227.166.207 port 49904 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-06 23:08:24,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360904.7850132, 'message': 'Dec 6 23:08:22 hqnl0246134 sshd[263863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 23:08:26,809] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360906.7888238, 'message': 'Dec 6 23:08:25 hqnl0246134 sshd[263863]: Failed password for root from 61.177.173.18 port 56850 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 23:08:28,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360908.7923067, 'message': 'Dec 6 23:08:27 hqnl0246134 sshd[263863]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 23:08:30,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360910.7966037, 'message': 'Dec 6 23:08:29 hqnl0246134 sshd[263863]: Failed password for root from 61.177.173.18 port 56850 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 23:08:32,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360912.8009052, 'message': 'Dec 6 23:08:31 hqnl0246134 sshd[263863]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:08:34,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360914.8050733, 'message': 'Dec 6 23:08:33 hqnl0246134 sshd[263863]: Failed password for root from 61.177.173.18 port 56850 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 23:08:40,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.180.102', 'timestamp': 1670360920.8132215, 'message': 'Dec 6 23:08:39 hqnl0246134 sshd[263868]: Invalid user user2 from 138.197.180.102 port 59418', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-06 23:08:40,856] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.180.102', 'timestamp': 1670360920.8135579, 'message': 'Dec 6 23:08:39 hqnl0246134 sshd[263868]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.180.102 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 23:08:40,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.180.102', 'timestamp': 1670360920.8137164, 'message': 'Dec 6 23:08:39 hqnl0246134 sshd[263868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 23:08:42,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.180.102', 'timestamp': 1670360922.815011, 'message': 'Dec 6 23:08:41 hqnl0246134 sshd[263868]: Failed password for invalid user user2 from 138.197.180.102 port 59418 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 23:08:42,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.180.102', 'timestamp': 1670360922.815317, 'message': 'Dec 6 23:08:42 hqnl0246134 sshd[263868]: Disconnected from invalid user user2 138.197.180.102 port 59418 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
WARNING [2022-12-06 23:08:49,502] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:08:49,503] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:09:10,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360950.8659132, 'message': 'Dec 6 23:09:09 hqnl0246134 sshd[264024]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
WARNING [2022-12-06 23:09:10,916] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:09:10,945] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360950.8666782, 'message': 'Dec 6 23:09:09 hqnl0246134 sshd[264024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0453 seconds
INFO [2022-12-06 23:09:10,947] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0446 seconds
INFO [2022-12-06 23:09:12,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360952.872201, 'message': 'Dec 6 23:09:11 hqnl0246134 sshd[264024]: Failed password for root from 61.177.173.18 port 23074 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 23:09:14,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360954.8735192, 'message': 'Dec 6 23:09:13 hqnl0246134 sshd[264024]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 23:09:16,895] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360956.877116, 'message': 'Dec 6 23:09:15 hqnl0246134 sshd[264024]: Failed password for root from 61.177.173.18 port 23074 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:09:16,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360956.8773646, 'message': 'Dec 6 23:09:15 hqnl0246134 sshd[264024]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 23:09:18,261] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:09:18,262] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:09:18,278] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:09:18,298] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0324 seconds
INFO [2022-12-06 23:09:18,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360958.883622, 'message': 'Dec 6 23:09:17 hqnl0246134 sshd[264024]: Failed password for root from 61.177.173.18 port 23074 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 23:09:18,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.19.172', 'timestamp': 1670360958.8838053, 'message': 'Dec 6 23:09:18 hqnl0246134 sshd[264040]: Invalid user atul from 49.51.19.172 port 41210', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 23:09:18,935] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.51.19.172', 'timestamp': 1670360958.8839262, 'message': 'Dec 6 23:09:18 hqnl0246134 sshd[264040]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.51.19.172 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:09:18,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.51.19.172', 'timestamp': 1670360958.8840332, 'message': 'Dec 6 23:09:18 hqnl0246134 sshd[264040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.19.172 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 23:09:20,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.19.172', 'timestamp': 1670360960.885729, 'message': 'Dec 6 23:09:20 hqnl0246134 sshd[264040]: Failed password for invalid user atul from 49.51.19.172 port 41210 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0681 seconds
INFO [2022-12-06 23:09:21,235] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:09:21,235] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:09:21,242] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:09:21,254] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 23:09:21,526] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:09:21,527] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:09:21,535] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:09:21,547] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 23:09:22,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.19.172', 'timestamp': 1670360962.8887868, 'message': 'Dec 6 23:09:21 hqnl0246134 sshd[264040]: Disconnected from invalid user atul 49.51.19.172 port 41210 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 23:09:49,509] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:09:49,511] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:09:56,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360996.951223, 'message': 'Dec 6 23:09:56 hqnl0246134 sshd[264065]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 23:09:56,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360996.9516592, 'message': 'Dec 6 23:09:56 hqnl0246134 sshd[264065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 23:09:58,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360998.9556398, 'message': 'Dec 6 23:09:58 hqnl0246134 sshd[264065]: Failed password for root from 61.177.173.18 port 44903 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 23:09:59,001] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670360998.9568324, 'message': 'Dec 6 23:09:58 hqnl0246134 sshd[264065]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 23:10:00,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361000.960962, 'message': 'Dec 6 23:10:00 hqnl0246134 sshd[264065]: Failed password for root from 61.177.173.18 port 44903 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 23:10:01,021] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361000.9612854, 'message': 'Dec 6 23:10:00 hqnl0246134 sshd[264065]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 23:10:05,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361004.96937, 'message': 'Dec 6 23:10:03 hqnl0246134 sshd[264065]: Failed password for root from 61.177.173.18 port 44903 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0337 seconds
WARNING [2022-12-06 23:10:10,916] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:10:10,946] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0401 seconds
INFO [2022-12-06 23:10:17,948] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:10:17,949] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:10:17,958] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:10:17,971] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 23:10:20,617] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:10:20,618] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:10:20,625] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:10:20,636] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 23:10:21,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361020.9964418, 'message': 'Dec 6 23:10:19 hqnl0246134 sshd[264133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 23:10:23,017] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361022.9980907, 'message': 'Dec 6 23:10:21 hqnl0246134 sshd[264133]: Failed password for root from 165.227.166.207 port 60200 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:10:24,498] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:10:24,499] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:10:24,507] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:10:24,520] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 23:10:39,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.67.165.114', 'timestamp': 1670361039.0232203, 'message': 'Dec 6 23:10:37 hqnl0246134 sshd[264150]: Invalid user student6 from 103.67.165.114 port 59832', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 23:10:39,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.67.165.114', 'timestamp': 1670361039.023583, 'message': 'Dec 6 23:10:37 hqnl0246134 sshd[264150]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.67.165.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 23:10:39,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.67.165.114', 'timestamp': 1670361039.0237756, 'message': 'Dec 6 23:10:37 hqnl0246134 sshd[264150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.67.165.114 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-06 23:10:41,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.67.165.114', 'timestamp': 1670361041.0268805, 'message': 'Dec 6 23:10:39 hqnl0246134 sshd[264150]: Failed password for invalid user student6 from 103.67.165.114 port 59832 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-06 23:10:41,097] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.67.165.114', 'timestamp': 1670361041.0274463, 'message': 'Dec 6 23:10:40 hqnl0246134 sshd[264150]: Disconnected from invalid user student6 103.67.165.114 port 59832 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-06 23:10:45,064] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361045.042687, 'message': 'Dec 6 23:10:43 hqnl0246134 sshd[264162]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 23:10:45,098] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361045.0430117, 'message': 'Dec 6 23:10:43 hqnl0246134 sshd[264162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 23:10:45,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361045.0432103, 'message': 'Dec 6 23:10:44 hqnl0246134 sshd[264162]: Failed password for root from 61.177.173.18 port 63748 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 23:10:47,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361047.043299, 'message': 'Dec 6 23:10:45 hqnl0246134 sshd[264162]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 23:10:49,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361049.0458965, 'message': 'Dec 6 23:10:47 hqnl0246134 sshd[264162]: Failed password for root from 61.177.173.18 port 63748 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0484 seconds
WARNING [2022-12-06 23:10:49,514] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:10:49,515] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:10:51,128] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361051.052014, 'message': 'Dec 6 23:10:49 hqnl0246134 sshd[264162]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0749 seconds
INFO [2022-12-06 23:10:53,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361053.0503368, 'message': 'Dec 6 23:10:52 hqnl0246134 sshd[264162]: Failed password for root from 61.177.173.18 port 63748 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0260 seconds
WARNING [2022-12-06 23:11:10,919] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:11:10,967] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0571 seconds
INFO [2022-12-06 23:11:18,095] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:11:18,096] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:11:18,106] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:11:18,118] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0211 seconds
INFO [2022-12-06 23:11:19,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.180.102', 'timestamp': 1670361079.0907269, 'message': 'Dec 6 23:11:17 hqnl0246134 sshd[264213]: Invalid user vijay from 138.197.180.102 port 49302', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 23:11:19,158] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.180.102', 'timestamp': 1670361079.0910838, 'message': 'Dec 6 23:11:17 hqnl0246134 sshd[264213]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.180.102 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 23:11:19,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.180.102', 'timestamp': 1670361079.091319, 'message': 'Dec 6 23:11:17 hqnl0246134 sshd[264213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0394 seconds
INFO [2022-12-06 23:11:20,953] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:11:20,953] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:11:20,960] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:11:20,973] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 23:11:21,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.180.102', 'timestamp': 1670361081.092053, 'message': 'Dec 6 23:11:19 hqnl0246134 sshd[264213]: Failed password for invalid user vijay from 138.197.180.102 port 49302 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 23:11:21,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.180.102', 'timestamp': 1670361081.092277, 'message': 'Dec 6 23:11:20 hqnl0246134 sshd[264213]: Disconnected from invalid user vijay 138.197.180.102 port 49302 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 23:11:31,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361091.1106045, 'message': 'Dec 6 23:11:30 hqnl0246134 sshd[264224]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 23:11:31,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361091.1109767, 'message': 'Dec 6 23:11:30 hqnl0246134 sshd[264224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 23:11:33,142] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361093.113155, 'message': 'Dec 6 23:11:32 hqnl0246134 sshd[264224]: Failed password for root from 61.177.173.18 port 29694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 23:11:35,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361095.1174643, 'message': 'Dec 6 23:11:33 hqnl0246134 sshd[264224]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 23:11:37,136] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361097.1194289, 'message': 'Dec 6 23:11:35 hqnl0246134 sshd[264224]: Failed password for root from 61.177.173.18 port 29694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 23:11:39,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361099.1225019, 'message': 'Dec 6 23:11:37 hqnl0246134 sshd[264224]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 23:11:41,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361101.1333325, 'message': 'Dec 6 23:11:39 hqnl0246134 sshd[264224]: Failed password for root from 61.177.173.18 port 29694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0929 seconds
INFO [2022-12-06 23:11:44,421] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:11:44,422] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:11:44,430] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:11:44,442] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
WARNING [2022-12-06 23:11:49,520] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:11:49,521] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 23:11:54,049] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 23:12:03,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.19.172', 'timestamp': 1670361123.1646078, 'message': 'Dec 6 23:12:02 hqnl0246134 sshd[264261]: Invalid user localhost from 49.51.19.172 port 59444', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-06 23:12:03,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.51.19.172', 'timestamp': 1670361123.165224, 'message': 'Dec 6 23:12:02 hqnl0246134 sshd[264261]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.51.19.172 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 23:12:03,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.51.19.172', 'timestamp': 1670361123.165487, 'message': 'Dec 6 23:12:02 hqnl0246134 sshd[264261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.19.172 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 23:12:05,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.19.172', 'timestamp': 1670361125.166025, 'message': 'Dec 6 23:12:03 hqnl0246134 sshd[264261]: Failed password for invalid user localhost from 49.51.19.172 port 59444 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 23:12:05,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.19.172', 'timestamp': 1670361125.1664653, 'message': 'Dec 6 23:12:03 hqnl0246134 sshd[264261]: Disconnected from invalid user localhost 49.51.19.172 port 59444 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
WARNING [2022-12-06 23:12:10,921] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:12:10,942] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0286 seconds
INFO [2022-12-06 23:12:17,814] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:12:17,815] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:12:17,825] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:12:17,839] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-06 23:12:19,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361139.19451, 'message': 'Dec 6 23:12:17 hqnl0246134 sshd[264299]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1366 seconds
INFO [2022-12-06 23:12:19,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361139.1948526, 'message': 'Dec 6 23:12:17 hqnl0246134 sshd[264299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 23:12:20,367] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:12:20,368] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:12:20,375] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:12:20,387] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 23:12:21,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361141.1974564, 'message': 'Dec 6 23:12:19 hqnl0246134 sshd[264299]: Failed password for root from 61.177.173.18 port 54071 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 23:12:21,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361141.1977675, 'message': 'Dec 6 23:12:20 hqnl0246134 sshd[264299]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 23:12:23,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361143.199432, 'message': 'Dec 6 23:12:21 hqnl0246134 sshd[264299]: Failed password for root from 61.177.173.18 port 54071 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 23:12:23,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361143.2011814, 'message': 'Dec 6 23:12:22 hqnl0246134 sshd[264310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 23:12:23,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361143.1997418, 'message': 'Dec 6 23:12:22 hqnl0246134 sshd[264299]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 23:12:25,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361145.2010489, 'message': 'Dec 6 23:12:24 hqnl0246134 sshd[264299]: Failed password for root from 61.177.173.18 port 54071 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 23:12:25,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361145.201629, 'message': 'Dec 6 23:12:24 hqnl0246134 sshd[264310]: Failed password for root from 165.227.166.207 port 42252 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 23:12:42,751] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 23:12:42,816] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 23:12:42,817] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 23:12:42,817] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 23:12:42,817] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 23:12:42,818] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 23:12:42,829] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 23:12:42,846] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0274 seconds
WARNING [2022-12-06 23:12:42,853] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:12:42,855] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:12:42,872] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0321 seconds
INFO [2022-12-06 23:12:42,875] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0311 seconds
WARNING [2022-12-06 23:12:49,527] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:12:49,528] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:13:02,092] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-06 23:13:02,099] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:13:02,119] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0254 seconds
INFO [2022-12-06 23:13:05,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361185.2448797, 'message': 'Dec 6 23:13:04 hqnl0246134 sshd[264345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:13:05,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361185.2451327, 'message': 'Dec 6 23:13:04 hqnl0246134 sshd[264345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 23:13:07,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361187.2469916, 'message': 'Dec 6 23:13:06 hqnl0246134 sshd[264345]: Failed password for root from 61.177.173.18 port 18701 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 23:13:09,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361189.2501159, 'message': 'Dec 6 23:13:08 hqnl0246134 sshd[264345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-06 23:13:10,928] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:13:10,952] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0354 seconds
INFO [2022-12-06 23:13:11,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361191.2539468, 'message': 'Dec 6 23:13:10 hqnl0246134 sshd[264345]: Failed password for root from 61.177.173.18 port 18701 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 23:13:11,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361191.254124, 'message': 'Dec 6 23:13:10 hqnl0246134 sshd[264345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 23:13:13,290] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361193.2610178, 'message': 'Dec 6 23:13:12 hqnl0246134 sshd[264345]: Failed password for root from 61.177.173.18 port 18701 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 23:13:15,248] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 23:13:15,248] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 23:13:15,249] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 23:13:15,863] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:13:15,863] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:13:15,872] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:13:15,884] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-06 23:13:17,864] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:13:17,864] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:13:17,873] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:13:17,884] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-06 23:13:20,352] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:13:20,353] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:13:20,360] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:13:20,371] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
WARNING [2022-12-06 23:13:49,530] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:13:49,532] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:13:51,353] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361231.308034, 'message': 'Dec 6 23:13:50 hqnl0246134 sshd[264406]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0435 seconds
INFO [2022-12-06 23:13:51,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361231.3089714, 'message': 'Dec 6 23:13:50 hqnl0246134 sshd[264406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 23:13:53,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361233.30831, 'message': 'Dec 6 23:13:52 hqnl0246134 sshd[264406]: Failed password for root from 61.177.173.18 port 37698 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-06 23:13:55,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361235.30999, 'message': 'Dec 6 23:13:54 hqnl0246134 sshd[264406]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 23:13:57,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361237.3123965, 'message': 'Dec 6 23:13:56 hqnl0246134 sshd[264406]: Failed password for root from 61.177.173.18 port 37698 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 23:13:59,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361239.315212, 'message': 'Dec 6 23:13:58 hqnl0246134 sshd[264406]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 23:14:01,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361241.317638, 'message': 'Dec 6 23:14:00 hqnl0246134 sshd[264406]: Failed password for root from 61.177.173.18 port 37698 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 23:14:05,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.20.198', 'timestamp': 1670361245.3221078, 'message': 'Dec 6 23:14:04 hqnl0246134 sshd[264415]: Invalid user consul from 68.183.20.198 port 60750', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-06 23:14:05,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.20.198', 'timestamp': 1670361245.3250933, 'message': 'Dec 6 23:14:05 hqnl0246134 sshd[264415]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.20.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 23:14:05,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.20.198', 'timestamp': 1670361245.325292, 'message': 'Dec 6 23:14:05 hqnl0246134 sshd[264415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.20.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 23:14:07,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.20.198', 'timestamp': 1670361247.3225014, 'message': 'Dec 6 23:14:06 hqnl0246134 sshd[264415]: Failed password for invalid user consul from 68.183.20.198 port 60750 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 23:14:07,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.20.198', 'timestamp': 1670361247.3227608, 'message': 'Dec 6 23:14:07 hqnl0246134 sshd[264415]: Disconnected from invalid user consul 68.183.20.198 port 60750 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-06 23:14:10,933] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:14:10,957] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0356 seconds
INFO [2022-12-06 23:14:17,888] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:14:17,888] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:14:17,897] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:14:17,911] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 23:14:20,693] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:14:20,694] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:14:20,702] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:14:20,713] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 23:14:25,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361265.3448925, 'message': 'Dec 6 23:14:24 hqnl0246134 sshd[264438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 23:14:27,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361267.3476412, 'message': 'Dec 6 23:14:27 hqnl0246134 sshd[264438]: Failed password for root from 165.227.166.207 port 52564 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 23:14:31,375] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:14:31,376] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:14:31,385] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:14:31,397] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 23:14:37,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.19.172', 'timestamp': 1670361277.3692663, 'message': 'Dec 6 23:14:35 hqnl0246134 sshd[264448]: Invalid user administrador from 49.51.19.172 port 44714', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 23:14:37,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361277.3702888, 'message': 'Dec 6 23:14:35 hqnl0246134 sshd[264445]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 23:14:37,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '49.51.19.172', 'timestamp': 1670361277.36997, 'message': 'Dec 6 23:14:35 hqnl0246134 sshd[264448]: pam_imunify(sshd:auth): [IM360_RBL] The IP 49.51.19.172 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 23:14:37,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361277.3704934, 'message': 'Dec 6 23:14:35 hqnl0246134 sshd[264445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-06 23:14:37,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '49.51.19.172', 'timestamp': 1670361277.3701577, 'message': 'Dec 6 23:14:35 hqnl0246134 sshd[264448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.19.172 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 23:14:37,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.19.172', 'timestamp': 1670361277.370633, 'message': 'Dec 6 23:14:37 hqnl0246134 sshd[264448]: Failed password for invalid user administrador from 49.51.19.172 port 44714 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 23:14:39,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361279.3695703, 'message': 'Dec 6 23:14:37 hqnl0246134 sshd[264445]: Failed password for root from 61.177.173.18 port 55095 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0404 seconds
INFO [2022-12-06 23:14:39,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '49.51.19.172', 'timestamp': 1670361279.3698356, 'message': 'Dec 6 23:14:37 hqnl0246134 sshd[264448]: Disconnected from invalid user administrador 49.51.19.172 port 44714 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0406 seconds
INFO [2022-12-06 23:14:39,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361279.3699608, 'message': 'Dec 6 23:14:37 hqnl0246134 sshd[264445]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:14:41,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361281.3734057, 'message': 'Dec 6 23:14:40 hqnl0246134 sshd[264445]: Failed password for root from 61.177.173.18 port 55095 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-06 23:14:43,425] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361283.3741114, 'message': 'Dec 6 23:14:42 hqnl0246134 sshd[264445]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0507 seconds
INFO [2022-12-06 23:14:45,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361285.3777723, 'message': 'Dec 6 23:14:44 hqnl0246134 sshd[264445]: Failed password for root from 61.177.173.18 port 55095 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
WARNING [2022-12-06 23:14:49,543] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:14:49,544] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 23:15:10,940] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:15:10,974] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0457 seconds
INFO [2022-12-06 23:15:18,065] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:15:18,065] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:15:18,074] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:15:18,086] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-06 23:15:20,788] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:15:20,789] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:15:20,796] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:15:20,807] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-06 23:15:23,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361323.4568644, 'message': 'Dec 6 23:15:22 hqnl0246134 sshd[264517]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 23:15:23,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361323.4572155, 'message': 'Dec 6 23:15:22 hqnl0246134 sshd[264517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:15:25,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361325.4578898, 'message': 'Dec 6 23:15:24 hqnl0246134 sshd[264517]: Failed password for root from 61.177.173.18 port 26739 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:15:25,496] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361325.458123, 'message': 'Dec 6 23:15:24 hqnl0246134 sshd[264517]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 23:15:27,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361327.4607484, 'message': 'Dec 6 23:15:26 hqnl0246134 sshd[264517]: Failed password for root from 61.177.173.18 port 26739 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 23:15:27,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361327.4610312, 'message': 'Dec 6 23:15:27 hqnl0246134 sshd[264517]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 23:15:29,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361329.4657218, 'message': 'Dec 6 23:15:29 hqnl0246134 sshd[264517]: Failed password for root from 61.177.173.18 port 26739 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
WARNING [2022-12-06 23:15:49,548] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:15:49,550] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:16:09,548] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361369.522436, 'message': 'Dec 6 23:16:09 hqnl0246134 sshd[264543]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 23:16:09,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361369.5233293, 'message': 'Dec 6 23:16:09 hqnl0246134 sshd[264543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-06 23:16:10,941] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:16:10,962] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0288 seconds
INFO [2022-12-06 23:16:11,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361371.523927, 'message': 'Dec 6 23:16:11 hqnl0246134 sshd[264543]: Failed password for root from 61.177.173.18 port 42500 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 23:16:15,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361375.5290477, 'message': 'Dec 6 23:16:13 hqnl0246134 sshd[264543]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-06 23:16:17,548] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361377.5299256, 'message': 'Dec 6 23:16:16 hqnl0246134 sshd[264543]: Failed password for root from 61.177.173.18 port 42500 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 23:16:18,119] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:16:18,120] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:16:18,128] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:16:18,141] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 23:16:19,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361379.5327013, 'message': 'Dec 6 23:16:18 hqnl0246134 sshd[264543]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 23:16:20,964] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:16:20,965] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:16:20,972] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:16:20,982] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 23:16:21,552] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361381.5339344, 'message': 'Dec 6 23:16:20 hqnl0246134 sshd[264543]: Failed password for root from 61.177.173.18 port 42500 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 23:16:24,845] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:16:24,845] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:16:24,853] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:16:24,865] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 23:16:27,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361387.5467033, 'message': 'Dec 6 23:16:26 hqnl0246134 sshd[264570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 23:16:29,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361389.5494285, 'message': 'Dec 6 23:16:28 hqnl0246134 sshd[264570]: Failed password for root from 165.227.166.207 port 34604 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
WARNING [2022-12-06 23:16:49,554] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:16:49,555] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:16:57,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361417.5768096, 'message': 'Dec 6 23:16:57 hqnl0246134 sshd[264586]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 23:16:57,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361417.577419, 'message': 'Dec 6 23:16:57 hqnl0246134 sshd[264586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 23:16:59,595] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361419.5774465, 'message': 'Dec 6 23:16:59 hqnl0246134 sshd[264586]: Failed password for root from 61.177.173.18 port 18430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 23:17:01,606] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361421.5807586, 'message': 'Dec 6 23:16:59 hqnl0246134 sshd[264586]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 23:17:03,608] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361423.585256, 'message': 'Dec 6 23:17:02 hqnl0246134 sshd[264586]: Failed password for root from 61.177.173.18 port 18430 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 23:17:05,607] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361425.5851116, 'message': 'Dec 6 23:17:04 hqnl0246134 sshd[264586]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 23:17:07,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361427.5860627, 'message': 'Dec 6 23:17:06 hqnl0246134 sshd[264586]: Failed password for root from 61.177.173.18 port 18430 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 23:17:09,455] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 23:17:09,522] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 23:17:09,523] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 23:17:09,523] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 23:17:09,523] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 23:17:09,524] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 23:17:09,533] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 23:17:09,549] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0254 seconds
WARNING [2022-12-06 23:17:09,556] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:17:09,559] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:17:09,577] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0332 seconds
INFO [2022-12-06 23:17:09,578] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0311 seconds
WARNING [2022-12-06 23:17:10,947] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:17:10,979] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0405 seconds
INFO [2022-12-06 23:17:18,217] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:17:18,218] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:17:18,229] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:17:18,250] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0308 seconds
INFO [2022-12-06 23:17:21,056] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:17:21,056] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:17:21,065] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:17:21,077] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-06 23:17:21,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.123', 'timestamp': 1670361441.60151, 'message': 'Dec 6 23:17:20 hqnl0246134 sshd[264645]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.123 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 23:17:21,644] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.123', 'timestamp': 1670361441.6017342, 'message': 'Dec 6 23:17:20 hqnl0246134 sshd[264645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.123 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 23:17:23,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '152.89.196.123', 'timestamp': 1670361443.602278, 'message': 'Dec 6 23:17:21 hqnl0246134 sshd[264645]: Failed password for root from 152.89.196.123 port 23506 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 23:17:43,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361463.6272051, 'message': 'Dec 6 23:17:43 hqnl0246134 sshd[264653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-06 23:17:43,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361463.627937, 'message': 'Dec 6 23:17:43 hqnl0246134 sshd[264653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 23:17:45,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361465.6301773, 'message': 'Dec 6 23:17:44 hqnl0246134 sshd[264653]: Failed password for root from 61.177.173.18 port 25097 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 23:17:45,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361465.6304348, 'message': 'Dec 6 23:17:45 hqnl0246134 sshd[264653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 23:17:49,557] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:17:49,559] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:17:49,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361469.63781, 'message': 'Dec 6 23:17:47 hqnl0246134 sshd[264653]: Failed password for root from 61.177.173.18 port 25097 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 23:17:51,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361471.6387837, 'message': 'Dec 6 23:17:49 hqnl0246134 sshd[264653]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-06 23:17:52,715] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 23:17:52,716] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 23:17:52,718] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 23:17:53,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361473.6403933, 'message': 'Dec 6 23:17:52 hqnl0246134 sshd[264653]: Failed password for root from 61.177.173.18 port 25097 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 23:17:56,746] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:17:56,747] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:17:56,759] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:17:56,772] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0240 seconds
WARNING [2022-12-06 23:18:10,949] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:18:10,973] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0313 seconds
INFO [2022-12-06 23:18:17,950] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:18:17,951] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:18:17,960] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:18:17,973] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 23:18:20,618] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:18:20,618] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:18:20,626] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:18:20,638] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 23:18:21,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361501.6743488, 'message': 'Dec 6 23:18:20 hqnl0246134 sshd[264692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 23:18:23,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361503.6767554, 'message': 'Dec 6 23:18:21 hqnl0246134 sshd[264692]: Failed password for root from 165.227.166.207 port 44898 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 23:18:31,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361511.6847298, 'message': 'Dec 6 23:18:30 hqnl0246134 sshd[264698]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 23:18:31,724] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361511.684936, 'message': 'Dec 6 23:18:30 hqnl0246134 sshd[264698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:18:33,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361513.6857553, 'message': 'Dec 6 23:18:32 hqnl0246134 sshd[264698]: Failed password for root from 61.177.173.18 port 54858 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 23:18:35,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361515.6881797, 'message': 'Dec 6 23:18:34 hqnl0246134 sshd[264698]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 23:18:37,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361517.6912065, 'message': 'Dec 6 23:18:37 hqnl0246134 sshd[264698]: Failed password for root from 61.177.173.18 port 54858 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 23:18:39,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361519.6931393, 'message': 'Dec 6 23:18:38 hqnl0246134 sshd[264698]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 23:18:41,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361521.6943398, 'message': 'Dec 6 23:18:40 hqnl0246134 sshd[264698]: Failed password for root from 61.177.173.18 port 54858 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
WARNING [2022-12-06 23:18:49,562] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:18:49,564] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 23:19:10,964] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:19:10,990] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0411 seconds
INFO [2022-12-06 23:19:15,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361555.725429, 'message': 'Dec 6 23:19:15 hqnl0246134 sshd[264733]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 23:19:15,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361555.7257843, 'message': 'Dec 6 23:19:15 hqnl0246134 sshd[264733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:19:17,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361557.726391, 'message': 'Dec 6 23:19:16 hqnl0246134 sshd[264733]: Failed password for root from 61.177.173.18 port 12338 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 23:19:17,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361557.7266698, 'message': 'Dec 6 23:19:17 hqnl0246134 sshd[264733]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 23:19:17,896] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:19:17,897] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:19:17,904] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:19:17,917] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 23:19:19,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361559.727297, 'message': 'Dec 6 23:19:19 hqnl0246134 sshd[264733]: Failed password for root from 61.177.173.18 port 12338 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 23:19:20,606] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:19:20,606] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:19:20,613] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:19:20,624] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-06 23:19:21,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361561.728885, 'message': 'Dec 6 23:19:19 hqnl0246134 sshd[264733]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 23:19:23,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361563.7297401, 'message': 'Dec 6 23:19:22 hqnl0246134 sshd[264733]: Failed password for root from 61.177.173.18 port 12338 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:19:26,669] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:19:26,670] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:19:26,683] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:19:26,704] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0328 seconds
WARNING [2022-12-06 23:19:49,568] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:19:49,569] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:20:01,814] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361601.7760983, 'message': 'Dec 6 23:20:00 hqnl0246134 sshd[264764]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0374 seconds
INFO [2022-12-06 23:20:01,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361601.7766008, 'message': 'Dec 6 23:20:00 hqnl0246134 sshd[264764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-06 23:20:03,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361603.7771795, 'message': 'Dec 6 23:20:02 hqnl0246134 sshd[264764]: Failed password for root from 61.177.173.18 port 33309 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 23:20:03,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361603.777527, 'message': 'Dec 6 23:20:02 hqnl0246134 sshd[264764]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 23:20:05,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361605.7785168, 'message': 'Dec 6 23:20:04 hqnl0246134 sshd[264764]: Failed password for root from 61.177.173.18 port 33309 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 23:20:05,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361605.778842, 'message': 'Dec 6 23:20:04 hqnl0246134 sshd[264766]: Invalid user duser from 103.187.146.55 port 42366', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 23:20:05,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361605.7793102, 'message': 'Dec 6 23:20:05 hqnl0246134 sshd[264764]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 23:20:05,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361605.7790716, 'message': 'Dec 6 23:20:04 hqnl0246134 sshd[264766]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.187.146.55 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-06 23:20:05,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361605.7792037, 'message': 'Dec 6 23:20:04 hqnl0246134 sshd[264766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.187.146.55 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-06 23:20:07,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361607.7802505, 'message': 'Dec 6 23:20:06 hqnl0246134 sshd[264766]: Failed password for invalid user duser from 103.187.146.55 port 42366 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 23:20:07,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361607.78043, 'message': 'Dec 6 23:20:07 hqnl0246134 sshd[264764]: Failed password for root from 61.177.173.18 port 33309 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-06 23:20:09,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361609.7830193, 'message': 'Dec 6 23:20:08 hqnl0246134 sshd[264766]: Disconnected from invalid user duser 103.187.146.55 port 42366 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
WARNING [2022-12-06 23:20:10,960] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:20:10,978] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0259 seconds
INFO [2022-12-06 23:20:11,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361611.785484, 'message': 'Dec 6 23:20:11 hqnl0246134 sshd[264794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 23:20:13,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.149.30', 'timestamp': 1670361613.7900295, 'message': 'Dec 6 23:20:12 hqnl0246134 sshd[264793]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.149.30 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 23:20:13,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361613.7905934, 'message': 'Dec 6 23:20:13 hqnl0246134 sshd[264794]: Failed password for root from 165.227.166.207 port 55198 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-06 23:20:13,849] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.149.30', 'timestamp': 1670361613.790427, 'message': 'Dec 6 23:20:12 hqnl0246134 sshd[264793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.149.30 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:20:15,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '128.199.149.30', 'timestamp': 1670361615.790648, 'message': 'Dec 6 23:20:14 hqnl0246134 sshd[264793]: Failed password for root from 128.199.149.30 port 39658 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 23:20:18,685] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:20:18,686] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:20:18,697] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:20:18,739] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0518 seconds
INFO [2022-12-06 23:20:24,400] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:20:24,400] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:20:24,414] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:20:24,433] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0318 seconds
INFO [2022-12-06 23:20:47,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361647.8315413, 'message': 'Dec 6 23:20:46 hqnl0246134 sshd[264845]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-06 23:20:47,897] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361647.8320692, 'message': 'Dec 6 23:20:46 hqnl0246134 sshd[264845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0275 seconds
WARNING [2022-12-06 23:20:49,572] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:20:49,572] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:20:49,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361649.8344612, 'message': 'Dec 6 23:20:48 hqnl0246134 sshd[264845]: Failed password for root from 61.177.173.18 port 56324 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 23:20:49,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361649.8346448, 'message': 'Dec 6 23:20:49 hqnl0246134 sshd[264845]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 23:20:51,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361651.8346465, 'message': 'Dec 6 23:20:50 hqnl0246134 sshd[264842]: Invalid user info from 103.187.146.55 port 59850', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 23:20:51,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361651.8354025, 'message': 'Dec 6 23:20:51 hqnl0246134 sshd[264845]: Failed password for root from 61.177.173.18 port 56324 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 23:20:51,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361651.8350558, 'message': 'Dec 6 23:20:50 hqnl0246134 sshd[264842]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.187.146.55 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:20:51,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361651.835288, 'message': 'Dec 6 23:20:50 hqnl0246134 sshd[264842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.187.146.55 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:20:53,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361653.836433, 'message': 'Dec 6 23:20:52 hqnl0246134 sshd[264842]: Failed password for invalid user info from 103.187.146.55 port 59850 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-06 23:20:53,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361653.8367174, 'message': 'Dec 6 23:20:53 hqnl0246134 sshd[264845]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 23:20:53,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361653.836605, 'message': 'Dec 6 23:20:53 hqnl0246134 sshd[264842]: Disconnected from invalid user info 103.187.146.55 port 59850 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 23:20:55,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361655.8375995, 'message': 'Dec 6 23:20:55 hqnl0246134 sshd[264845]: Failed password for root from 61.177.173.18 port 56324 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 23:20:56,109] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:20:56,109] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:20:56,222] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:20:56,234] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1243 seconds
WARNING [2022-12-06 23:21:10,969] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:21:10,996] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0359 seconds
INFO [2022-12-06 23:21:17,871] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:21:17,872] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:21:17,881] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:21:17,893] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 23:21:20,581] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:21:20,581] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:21:20,591] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:21:20,604] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-06 23:21:33,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361693.875776, 'message': 'Dec 6 23:21:33 hqnl0246134 sshd[264910]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 23:21:33,945] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361693.8763888, 'message': 'Dec 6 23:21:33 hqnl0246134 sshd[264910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 23:21:35,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361695.8774352, 'message': 'Dec 6 23:21:35 hqnl0246134 sshd[264910]: Failed password for root from 61.177.173.18 port 25478 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 23:21:35,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361695.8776422, 'message': 'Dec 6 23:21:35 hqnl0246134 sshd[264910]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 23:21:37,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361697.8795824, 'message': 'Dec 6 23:21:36 hqnl0246134 sshd[264908]: Invalid user test from 103.187.146.55 port 46716', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 23:21:37,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361697.8800135, 'message': 'Dec 6 23:21:37 hqnl0246134 sshd[264910]: Failed password for root from 61.177.173.18 port 25478 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-06 23:21:37,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361697.8797684, 'message': 'Dec 6 23:21:36 hqnl0246134 sshd[264908]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.187.146.55 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 23:21:37,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361697.879882, 'message': 'Dec 6 23:21:36 hqnl0246134 sshd[264908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.187.146.55 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 23:21:39,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361699.8825486, 'message': 'Dec 6 23:21:39 hqnl0246134 sshd[264908]: Failed password for invalid user test from 103.187.146.55 port 46716 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 23:21:39,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361699.8827343, 'message': 'Dec 6 23:21:39 hqnl0246134 sshd[264910]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 23:21:41,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361701.885096, 'message': 'Dec 6 23:21:41 hqnl0246134 sshd[264910]: Failed password for root from 61.177.173.18 port 25478 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 23:21:41,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '103.187.146.55', 'timestamp': 1670361701.885311, 'message': 'Dec 6 23:21:41 hqnl0246134 sshd[264908]: Disconnected from invalid user test 103.187.146.55 port 46716 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
WARNING [2022-12-06 23:21:49,574] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:21:49,575] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 23:21:54,052] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 23:22:05,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361725.9118154, 'message': 'Dec 6 23:22:05 hqnl0246134 sshd[264939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-06 23:22:07,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361727.9121234, 'message': 'Dec 6 23:22:06 hqnl0246134 sshd[264939]: Failed password for root from 165.227.166.207 port 37236 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 23:22:09,939] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:22:09,940] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:22:09,951] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:22:09,971] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0305 seconds
INFO [2022-12-06 23:22:10,110] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 23:22:10,182] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 23:22:10,183] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 23:22:10,183] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 23:22:10,184] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 23:22:10,184] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 23:22:10,202] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 23:22:10,230] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0452 seconds
WARNING [2022-12-06 23:22:10,241] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:22:10,243] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:22:10,264] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0429 seconds
INFO [2022-12-06 23:22:10,265] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0392 seconds
WARNING [2022-12-06 23:22:10,971] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:22:10,993] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0297 seconds
INFO [2022-12-06 23:22:17,855] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:22:17,856] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:22:17,866] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:22:17,881] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0228 seconds
INFO [2022-12-06 23:22:19,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361739.9194703, 'message': 'Dec 6 23:22:19 hqnl0246134 sshd[264966]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 23:22:19,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361739.9198027, 'message': 'Dec 6 23:22:19 hqnl0246134 sshd[264966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:22:20,583] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:22:20,583] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:22:20,594] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:22:20,606] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-06 23:22:23,950] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361743.923363, 'message': 'Dec 6 23:22:22 hqnl0246134 sshd[264966]: Failed password for root from 61.177.173.18 port 43693 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-06 23:22:25,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361745.9283314, 'message': 'Dec 6 23:22:24 hqnl0246134 sshd[264966]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-06 23:22:27,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361747.9301825, 'message': 'Dec 6 23:22:26 hqnl0246134 sshd[264966]: Failed password for root from 61.177.173.18 port 43693 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 23:22:27,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361747.9304254, 'message': 'Dec 6 23:22:26 hqnl0246134 sshd[264966]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:22:29,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361749.932948, 'message': 'Dec 6 23:22:27 hqnl0246134 sshd[264966]: Failed password for root from 61.177.173.18 port 43693 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 23:22:41,896] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 23:22:41,897] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 23:22:41,899] im360.plugins.client360: Waiting 4 minutes before retry...
WARNING [2022-12-06 23:22:49,582] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:22:49,583] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:23:10,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361789.9869864, 'message': 'Dec 6 23:23:07 hqnl0246134 sshd[264995]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 23:23:10,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361789.9874804, 'message': 'Dec 6 23:23:07 hqnl0246134 sshd[264995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-06 23:23:10,973] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:23:10,990] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0242 seconds
INFO [2022-12-06 23:23:12,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361791.9878488, 'message': 'Dec 6 23:23:10 hqnl0246134 sshd[264995]: Failed password for root from 61.177.173.18 port 16153 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 23:23:14,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361793.9921627, 'message': 'Dec 6 23:23:12 hqnl0246134 sshd[264995]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 23:23:16,013] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361795.9925272, 'message': 'Dec 6 23:23:14 hqnl0246134 sshd[264995]: Failed password for root from 61.177.173.18 port 16153 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 23:23:16,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361795.9927478, 'message': 'Dec 6 23:23:14 hqnl0246134 sshd[264995]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 23:23:17,887] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:23:17,888] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:23:17,895] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:23:17,906] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 23:23:18,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361797.993789, 'message': 'Dec 6 23:23:16 hqnl0246134 sshd[264995]: Failed password for root from 61.177.173.18 port 16153 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 23:23:20,476] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:23:20,477] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:23:20,485] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:23:20,496] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-06 23:23:24,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.178.90.17', 'timestamp': 1670361804.0084267, 'message': 'Dec 6 23:23:23 hqnl0246134 sshd[265019]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.178.90.17 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 23:23:24,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.178.90.17', 'timestamp': 1670361804.0088236, 'message': 'Dec 6 23:23:23 hqnl0246134 sshd[265019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.90.17 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 23:23:26,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.178.90.17', 'timestamp': 1670361806.0125337, 'message': 'Dec 6 23:23:25 hqnl0246134 sshd[265019]: Failed password for root from 51.178.90.17 port 57320 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
WARNING [2022-12-06 23:23:49,586] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:23:49,588] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:23:54,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361834.0534737, 'message': 'Dec 6 23:23:53 hqnl0246134 sshd[265032]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 23:23:54,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361834.0543027, 'message': 'Dec 6 23:23:53 hqnl0246134 sshd[265032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 23:23:56,075] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361836.053675, 'message': 'Dec 6 23:23:55 hqnl0246134 sshd[265032]: Failed password for root from 61.177.173.18 port 28168 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-06 23:23:58,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361838.056119, 'message': 'Dec 6 23:23:56 hqnl0246134 sshd[265032]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 23:23:58,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361838.0564184, 'message': 'Dec 6 23:23:56 hqnl0246134 sshd[265034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 23:24:00,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361840.0581408, 'message': 'Dec 6 23:23:58 hqnl0246134 sshd[265032]: Failed password for root from 61.177.173.18 port 28168 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-06 23:24:00,096] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361840.0583856, 'message': 'Dec 6 23:23:58 hqnl0246134 sshd[265034]: Failed password for root from 165.227.166.207 port 47526 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-06 23:24:01,701] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:24:01,702] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:24:01,712] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:24:01,725] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 23:24:02,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361842.060478, 'message': 'Dec 6 23:24:00 hqnl0246134 sshd[265032]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 23:24:04,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361844.0618038, 'message': 'Dec 6 23:24:02 hqnl0246134 sshd[265032]: Failed password for root from 61.177.173.18 port 28168 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 23:24:10,979] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:24:11,004] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0333 seconds
INFO [2022-12-06 23:24:17,784] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:24:17,785] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:24:17,793] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:24:17,806] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-06 23:24:20,610] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:24:20,610] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:24:20,617] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:24:20,629] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-06 23:24:38,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '180.190.241.88', 'timestamp': 1670361878.1076102, 'message': 'Dec 6 23:24:36 hqnl0246134 sshd[265075]: Invalid user openhab from 180.190.241.88 port 28496', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 23:24:38,151] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '180.190.241.88', 'timestamp': 1670361878.1080384, 'message': 'Dec 6 23:24:36 hqnl0246134 sshd[265075]: pam_imunify(sshd:auth): [IM360_RBL] The IP 180.190.241.88 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 23:24:38,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '180.190.241.88', 'timestamp': 1670361878.1082058, 'message': 'Dec 6 23:24:36 hqnl0246134 sshd[265075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 23:24:40,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '180.190.241.88', 'timestamp': 1670361880.1083522, 'message': 'Dec 6 23:24:38 hqnl0246134 sshd[265075]: Failed password for invalid user openhab from 180.190.241.88 port 28496 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 23:24:40,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361880.1094894, 'message': 'Dec 6 23:24:39 hqnl0246134 sshd[265077]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 23:24:40,159] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361880.1096547, 'message': 'Dec 6 23:24:39 hqnl0246134 sshd[265077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:24:42,142] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '180.190.241.88', 'timestamp': 1670361882.1131434, 'message': 'Dec 6 23:24:40 hqnl0246134 sshd[265075]: Disconnected from invalid user openhab 180.190.241.88 port 28496 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-06 23:24:42,143] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361882.1133893, 'message': 'Dec 6 23:24:42 hqnl0246134 sshd[265077]: Failed password for root from 61.177.173.18 port 44385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-06 23:24:44,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361884.1170914, 'message': 'Dec 6 23:24:43 hqnl0246134 sshd[265077]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0683 seconds
INFO [2022-12-06 23:24:46,143] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361886.1186197, 'message': 'Dec 6 23:24:45 hqnl0246134 sshd[265077]: Failed password for root from 61.177.173.18 port 44385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 23:24:46,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361886.1190584, 'message': 'Dec 6 23:24:46 hqnl0246134 sshd[265077]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 23:24:49,593] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:24:49,594] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:24:50,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361890.1219182, 'message': 'Dec 6 23:24:48 hqnl0246134 sshd[265077]: Failed password for root from 61.177.173.18 port 44385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 23:24:58,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.20.198', 'timestamp': 1670361898.1299722, 'message': 'Dec 6 23:24:57 hqnl0246134 sshd[265089]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.20.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 23:24:58,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.20.198', 'timestamp': 1670361898.1302388, 'message': 'Dec 6 23:24:57 hqnl0246134 sshd[265089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.20.198 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:25:00,151] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '68.183.20.198', 'timestamp': 1670361900.1343288, 'message': 'Dec 6 23:24:59 hqnl0246134 sshd[265089]: Failed password for root from 68.183.20.198 port 59324 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 23:25:02,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.114.8', 'timestamp': 1670361902.1378434, 'message': 'Dec 6 23:25:00 hqnl0246134 sshd[265091]: Invalid user user from 188.166.114.8 port 35018', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0642 seconds
INFO [2022-12-06 23:25:02,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '188.166.114.8', 'timestamp': 1670361902.1381392, 'message': 'Dec 6 23:25:00 hqnl0246134 sshd[265091]: pam_imunify(sshd:auth): [IM360_RBL] The IP 188.166.114.8 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-06 23:25:02,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '188.166.114.8', 'timestamp': 1670361902.1383626, 'message': 'Dec 6 23:25:00 hqnl0246134 sshd[265091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.114.8 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 23:25:04,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.114.8', 'timestamp': 1670361904.1426642, 'message': 'Dec 6 23:25:02 hqnl0246134 sshd[265091]: Failed password for invalid user user from 188.166.114.8 port 35018 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-06 23:25:06,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.114.8', 'timestamp': 1670361906.1481147, 'message': 'Dec 6 23:25:04 hqnl0246134 sshd[265091]: Disconnected from invalid user user 188.166.114.8 port 35018 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 23:25:07,673] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:25:07,673] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:25:07,680] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:25:07,692] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
WARNING [2022-12-06 23:25:10,985] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:25:11,013] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0364 seconds
INFO [2022-12-06 23:25:17,892] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:25:17,892] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:25:17,907] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:25:17,920] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-06 23:25:20,578] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:25:20,578] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:25:20,587] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:25:20,599] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 23:25:26,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361926.1649926, 'message': 'Dec 6 23:25:26 hqnl0246134 sshd[265148]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 23:25:26,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361926.1661043, 'message': 'Dec 6 23:25:26 hqnl0246134 sshd[265148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 23:25:28,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361928.1656146, 'message': 'Dec 6 23:25:28 hqnl0246134 sshd[265148]: Failed password for root from 61.177.173.18 port 10075 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 23:25:30,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361930.1690195, 'message': 'Dec 6 23:25:28 hqnl0246134 sshd[265148]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-06 23:25:32,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361932.1698563, 'message': 'Dec 6 23:25:30 hqnl0246134 sshd[265148]: Failed password for root from 61.177.173.18 port 10075 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 23:25:32,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361932.1700606, 'message': 'Dec 6 23:25:30 hqnl0246134 sshd[265148]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 23:25:32,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361932.1702127, 'message': 'Dec 6 23:25:32 hqnl0246134 sshd[265148]: Failed password for root from 61.177.173.18 port 10075 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0262 seconds
WARNING [2022-12-06 23:25:49,609] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:25:49,610] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:25:50,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361950.1869164, 'message': 'Dec 6 23:25:49 hqnl0246134 sshd[265164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 23:25:52,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670361952.18958, 'message': 'Dec 6 23:25:50 hqnl0246134 sshd[265164]: Failed password for root from 165.227.166.207 port 57820 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-06 23:26:10,990] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:26:11,013] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0322 seconds
INFO [2022-12-06 23:26:12,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361972.2062893, 'message': 'Dec 6 23:26:12 hqnl0246134 sshd[265179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 23:26:14,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361974.207594, 'message': 'Dec 6 23:26:12 hqnl0246134 sshd[265179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 23:26:14,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361974.207973, 'message': 'Dec 6 23:26:14 hqnl0246134 sshd[265179]: Failed password for root from 61.177.173.18 port 31050 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 23:26:16,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361976.2140388, 'message': 'Dec 6 23:26:14 hqnl0246134 sshd[265179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0434 seconds
INFO [2022-12-06 23:26:16,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361976.2147365, 'message': 'Dec 6 23:26:16 hqnl0246134 sshd[265179]: Failed password for root from 61.177.173.18 port 31050 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 23:26:18,015] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:26:18,015] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:26:18,025] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:26:18,038] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-06 23:26:18,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361978.2131956, 'message': 'Dec 6 23:26:16 hqnl0246134 sshd[265179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 23:26:20,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670361980.2167218, 'message': 'Dec 6 23:26:18 hqnl0246134 sshd[265179]: Failed password for root from 61.177.173.18 port 31050 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 23:26:20,762] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:26:20,763] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:26:20,771] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:26:20,783] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
WARNING [2022-12-06 23:26:49,614] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:26:49,615] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:26:58,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362018.3071818, 'message': 'Dec 6 23:26:57 hqnl0246134 sshd[265236]: pam_imunify(sshd:auth): [IM360_RBL] The IP 180.190.241.88 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 23:26:58,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362018.3076916, 'message': 'Dec 6 23:26:57 hqnl0246134 sshd[265238]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 23:26:58,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362018.3075478, 'message': 'Dec 6 23:26:57 hqnl0246134 sshd[265236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 23:26:58,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362018.3077974, 'message': 'Dec 6 23:26:58 hqnl0246134 sshd[265238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 23:27:00,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362020.3099246, 'message': 'Dec 6 23:26:59 hqnl0246134 sshd[265236]: Failed password for root from 180.190.241.88 port 48192 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 23:27:00,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362020.3101954, 'message': 'Dec 6 23:26:59 hqnl0246134 sshd[265238]: Failed password for root from 61.177.173.18 port 55187 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 23:27:00,362] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362020.3103774, 'message': 'Dec 6 23:27:00 hqnl0246134 sshd[265238]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 23:27:02,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362022.3105006, 'message': 'Dec 6 23:27:01 hqnl0246134 sshd[265238]: Failed password for root from 61.177.173.18 port 55187 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-06 23:27:02,613] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:27:02,613] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:27:02,631] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:27:02,654] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0395 seconds
INFO [2022-12-06 23:27:04,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362024.312048, 'message': 'Dec 6 23:27:02 hqnl0246134 sshd[265238]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:27:06,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362026.316639, 'message': 'Dec 6 23:27:04 hqnl0246134 sshd[265238]: Failed password for root from 61.177.173.18 port 55187 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0233 seconds
WARNING [2022-12-06 23:27:10,997] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:27:11,020] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0337 seconds
INFO [2022-12-06 23:27:18,563] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:27:18,564] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:27:18,575] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:27:18,588] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0228 seconds
INFO [2022-12-06 23:27:21,234] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:27:21,235] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:27:21,244] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:27:21,257] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-06 23:27:30,215] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 23:27:30,284] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 23:27:30,285] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 23:27:30,285] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 23:27:30,286] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 23:27:30,286] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 23:27:30,304] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 23:27:30,335] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0485 seconds
WARNING [2022-12-06 23:27:30,344] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:27:30,346] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:27:30,363] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0370 seconds
INFO [2022-12-06 23:27:30,364] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0325 seconds
INFO [2022-12-06 23:27:40,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362060.3426592, 'message': 'Dec 6 23:27:38 hqnl0246134 sshd[265295]: Invalid user ts3srv from 180.190.241.88 port 29826', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 23:27:40,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362060.3429892, 'message': 'Dec 6 23:27:38 hqnl0246134 sshd[265295]: pam_imunify(sshd:auth): [IM360_RBL] The IP 180.190.241.88 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:27:40,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362060.3431442, 'message': 'Dec 6 23:27:38 hqnl0246134 sshd[265295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 23:27:42,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362062.3458219, 'message': 'Dec 6 23:27:40 hqnl0246134 sshd[265295]: Failed password for invalid user ts3srv from 180.190.241.88 port 29826 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0468 seconds
INFO [2022-12-06 23:27:42,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362062.3461206, 'message': 'Dec 6 23:27:40 hqnl0246134 sshd[265297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0472 seconds
INFO [2022-12-06 23:27:42,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362062.3462977, 'message': 'Dec 6 23:27:41 hqnl0246134 sshd[265295]: Disconnected from invalid user ts3srv 180.190.241.88 port 29826 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 23:27:44,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362064.3491707, 'message': 'Dec 6 23:27:43 hqnl0246134 sshd[265299]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 23:27:44,382] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362064.3494713, 'message': 'Dec 6 23:27:43 hqnl0246134 sshd[265297]: Failed password for root from 165.227.166.207 port 39868 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-06 23:27:44,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362064.3493547, 'message': 'Dec 6 23:27:43 hqnl0246134 sshd[265299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 23:27:46,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362066.3523555, 'message': 'Dec 6 23:27:45 hqnl0246134 sshd[265299]: Failed password for root from 61.177.173.18 port 14143 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 23:27:48,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362068.3547328, 'message': 'Dec 6 23:27:47 hqnl0246134 sshd[265299]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
WARNING [2022-12-06 23:27:49,619] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:27:49,620] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:27:50,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362070.3562078, 'message': 'Dec 6 23:27:49 hqnl0246134 sshd[265299]: Failed password for root from 61.177.173.18 port 14143 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:27:50,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362070.35646, 'message': 'Dec 6 23:27:49 hqnl0246134 sshd[265299]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:27:52,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362072.35785, 'message': 'Dec 6 23:27:51 hqnl0246134 sshd[265299]: Failed password for root from 61.177.173.18 port 14143 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 23:28:00,748] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 23:28:00,749] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 23:28:00,750] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-06 23:28:06,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '188.166.114.8', 'timestamp': 1670362086.3737671, 'message': 'Dec 6 23:28:05 hqnl0246134 sshd[265328]: pam_imunify(sshd:auth): [IM360_RBL] The IP 188.166.114.8 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:28:06,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '188.166.114.8', 'timestamp': 1670362086.3741236, 'message': 'Dec 6 23:28:05 hqnl0246134 sshd[265328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.114.8 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:28:08,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '188.166.114.8', 'timestamp': 1670362088.375979, 'message': 'Dec 6 23:28:08 hqnl0246134 sshd[265328]: Failed password for root from 188.166.114.8 port 57602 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-06 23:28:11,000] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:28:11,024] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0328 seconds
INFO [2022-12-06 23:28:12,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.20.198', 'timestamp': 1670362092.3809793, 'message': 'Dec 6 23:28:11 hqnl0246134 sshd[265332]: Invalid user rodney from 68.183.20.198 port 48832', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 23:28:12,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.20.198', 'timestamp': 1670362092.3812687, 'message': 'Dec 6 23:28:11 hqnl0246134 sshd[265332]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.20.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 23:28:12,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.20.198', 'timestamp': 1670362092.381398, 'message': 'Dec 6 23:28:11 hqnl0246134 sshd[265332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.20.198 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:28:12,543] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:28:12,544] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:28:12,552] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:28:12,564] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 23:28:14,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.20.198', 'timestamp': 1670362094.3836722, 'message': 'Dec 6 23:28:14 hqnl0246134 sshd[265332]: Failed password for invalid user rodney from 68.183.20.198 port 48832 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 23:28:16,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '68.183.20.198', 'timestamp': 1670362096.3874917, 'message': 'Dec 6 23:28:15 hqnl0246134 sshd[265332]: Disconnected from invalid user rodney 68.183.20.198 port 48832 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 23:28:17,935] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:28:17,935] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:28:17,943] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:28:17,955] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 23:28:20,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362100.3900182, 'message': 'Dec 6 23:28:19 hqnl0246134 sshd[265355]: Invalid user vz from 180.190.241.88 port 35932', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 23:28:20,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362100.3902652, 'message': 'Dec 6 23:28:19 hqnl0246134 sshd[265355]: pam_imunify(sshd:auth): [IM360_RBL] The IP 180.190.241.88 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 23:28:20,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362100.3904693, 'message': 'Dec 6 23:28:19 hqnl0246134 sshd[265355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 23:28:21,001] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:28:21,002] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:28:21,009] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:28:21,020] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-06 23:28:22,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362102.3907263, 'message': 'Dec 6 23:28:21 hqnl0246134 sshd[265355]: Failed password for invalid user vz from 180.190.241.88 port 35932 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 23:28:24,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '180.190.241.88', 'timestamp': 1670362104.3937232, 'message': 'Dec 6 23:28:22 hqnl0246134 sshd[265355]: Disconnected from invalid user vz 180.190.241.88 port 35932 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 23:28:30,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362110.3992925, 'message': 'Dec 6 23:28:30 hqnl0246134 sshd[265369]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 23:28:30,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362110.399747, 'message': 'Dec 6 23:28:30 hqnl0246134 sshd[265369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:28:32,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362112.3993762, 'message': 'Dec 6 23:28:31 hqnl0246134 sshd[265369]: Failed password for root from 61.177.173.18 port 34346 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 23:28:32,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362112.3996065, 'message': 'Dec 6 23:28:32 hqnl0246134 sshd[265369]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:28:36,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362116.4013965, 'message': 'Dec 6 23:28:34 hqnl0246134 sshd[265369]: Failed password for root from 61.177.173.18 port 34346 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 23:28:38,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362118.4022636, 'message': 'Dec 6 23:28:36 hqnl0246134 sshd[265369]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 23:28:38,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362118.4024737, 'message': 'Dec 6 23:28:37 hqnl0246134 sshd[265373]: Invalid user rtorrent from 104.131.40.97 port 33448', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 23:28:38,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362118.4029086, 'message': 'Dec 6 23:28:38 hqnl0246134 sshd[265369]: Failed password for root from 61.177.173.18 port 34346 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0511 seconds
INFO [2022-12-06 23:28:38,487] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362118.402624, 'message': 'Dec 6 23:28:37 hqnl0246134 sshd[265373]: pam_imunify(sshd:auth): [IM360_RBL] The IP 104.131.40.97 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0512 seconds
INFO [2022-12-06 23:28:38,512] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362118.402798, 'message': 'Dec 6 23:28:37 hqnl0246134 sshd[265373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.40.97 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-06 23:28:40,425] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362120.4040854, 'message': 'Dec 6 23:28:40 hqnl0246134 sshd[265373]: Failed password for invalid user rtorrent from 104.131.40.97 port 33448 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 23:28:42,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.240.206.206', 'timestamp': 1670362122.406344, 'message': 'Dec 6 23:28:40 hqnl0246134 sshd[265375]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.240.206.206 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 23:28:42,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362122.4066892, 'message': 'Dec 6 23:28:41 hqnl0246134 sshd[265373]: Disconnected from invalid user rtorrent 104.131.40.97 port 33448 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 23:28:42,458] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.240.206.206', 'timestamp': 1670362122.4065313, 'message': 'Dec 6 23:28:40 hqnl0246134 sshd[265375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.240.206.206 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 23:28:44,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '115.240.206.206', 'timestamp': 1670362124.4080524, 'message': 'Dec 6 23:28:42 hqnl0246134 sshd[265375]: Failed password for root from 115.240.206.206 port 9252 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 23:28:49,630] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:28:49,631] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:29:02,468] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362142.4333751, 'message': 'Dec 6 23:29:01 hqnl0246134 sshd[265389]: Invalid user luo from 51.178.90.17 port 45570', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 23:29:02,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362142.4338841, 'message': 'Dec 6 23:29:01 hqnl0246134 sshd[265389]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.178.90.17 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 23:29:02,509] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362142.4341152, 'message': 'Dec 6 23:29:01 hqnl0246134 sshd[265389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.90.17 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 23:29:04,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362144.4350393, 'message': 'Dec 6 23:29:03 hqnl0246134 sshd[265389]: Failed password for invalid user luo from 51.178.90.17 port 45570 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 23:29:06,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362146.4394908, 'message': 'Dec 6 23:29:04 hqnl0246134 sshd[265389]: Disconnected from invalid user luo 51.178.90.17 port 45570 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0331 seconds
WARNING [2022-12-06 23:29:11,005] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:29:11,033] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.0372 seconds
INFO [2022-12-06 23:29:18,020] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:29:18,021] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:29:18,032] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:29:18,045] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0222 seconds
INFO [2022-12-06 23:29:18,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362158.4531758, 'message': 'Dec 6 23:29:17 hqnl0246134 sshd[265410]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 23:29:18,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362158.4535809, 'message': 'Dec 6 23:29:17 hqnl0246134 sshd[265410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 23:29:19,404] defence360agent.files: Updating all files
INFO [2022-12-06 23:29:19,733] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 23:29:19,734] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 23:29:20,039] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 23:29:20,040] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 23:29:20,299] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 23:29:20,300] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 23:29:20,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362160.4540126, 'message': 'Dec 6 23:29:20 hqnl0246134 sshd[265410]: Failed password for root from 61.177.173.18 port 63335 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 23:29:20,586] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 23:29:20,587] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 23:29:20,587] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 23:29:20,849] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 21:29:20 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E518909CC00BE'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 23:29:20,850] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 23:29:20,851] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 23:29:21,337] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:29:21,337] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:29:21,352] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:29:21,373] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0344 seconds
INFO [2022-12-06 23:29:21,484] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 23:29:21,484] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 23:29:21,740] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 23:29:21,741] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 23:29:22,041] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 23:29:22,041] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 23:29:22,445] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 23:29:22,445] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 23:29:22,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362162.6165206, 'message': 'Dec 6 23:29:22 hqnl0246134 sshd[265410]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 23:29:22,935] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 23:29:22,936] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 23:29:24,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362164.4588637, 'message': 'Dec 6 23:29:24 hqnl0246134 sshd[265410]: Failed password for root from 61.177.173.18 port 63335 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:29:26,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362166.4606404, 'message': 'Dec 6 23:29:26 hqnl0246134 sshd[265410]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 23:29:28,496] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362168.4621775, 'message': 'Dec 6 23:29:28 hqnl0246134 sshd[265410]: Failed password for root from 61.177.173.18 port 63335 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-06 23:29:31,248] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:29:31,248] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:29:31,257] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:29:31,268] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 23:29:34,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362174.466673, 'message': 'Dec 6 23:29:34 hqnl0246134 sshd[265433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 23:29:36,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362176.4697285, 'message': 'Dec 6 23:29:36 hqnl0246134 sshd[265433]: Failed password for root from 165.227.166.207 port 50172 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 23:29:49,633] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:29:49,634] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:30:06,539] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362206.51598, 'message': 'Dec 6 23:30:04 hqnl0246134 sshd[265468]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 23:30:06,557] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362206.5165138, 'message': 'Dec 6 23:30:04 hqnl0246134 sshd[265468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 23:30:08,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362208.520839, 'message': 'Dec 6 23:30:07 hqnl0246134 sshd[265468]: Failed password for root from 61.177.173.18 port 21007 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 23:30:10,546] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362210.5245764, 'message': 'Dec 6 23:30:08 hqnl0246134 sshd[265468]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 23:30:11,009] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:30:11,034] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0342 seconds
INFO [2022-12-06 23:30:12,571] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362212.5303233, 'message': 'Dec 6 23:30:10 hqnl0246134 sshd[265468]: Failed password for root from 61.177.173.18 port 21007 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0403 seconds
INFO [2022-12-06 23:30:12,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.149.30', 'timestamp': 1670362212.5307555, 'message': 'Dec 6 23:30:11 hqnl0246134 sshd[265496]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.149.30 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-06 23:30:12,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362212.530576, 'message': 'Dec 6 23:30:11 hqnl0246134 sshd[265468]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0393 seconds
INFO [2022-12-06 23:30:12,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.149.30', 'timestamp': 1670362212.5309224, 'message': 'Dec 6 23:30:11 hqnl0246134 sshd[265496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.149.30 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-06 23:30:14,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362214.5361917, 'message': 'Dec 6 23:30:13 hqnl0246134 sshd[265468]: Failed password for root from 61.177.173.18 port 21007 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 23:30:14,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '128.199.149.30', 'timestamp': 1670362214.5364592, 'message': 'Dec 6 23:30:13 hqnl0246134 sshd[265496]: Failed password for root from 128.199.149.30 port 55560 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-06 23:30:17,875] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:30:17,876] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:30:17,893] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:30:17,916] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0362 seconds
INFO [2022-12-06 23:30:20,610] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:30:20,611] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:30:20,623] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:30:20,638] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0251 seconds
INFO [2022-12-06 23:30:48,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.114.8', 'timestamp': 1670362248.6188693, 'message': 'Dec 6 23:30:47 hqnl0246134 sshd[265532]: Invalid user sysadmin from 188.166.114.8 port 46920', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 23:30:48,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '188.166.114.8', 'timestamp': 1670362248.619217, 'message': 'Dec 6 23:30:47 hqnl0246134 sshd[265532]: pam_imunify(sshd:auth): [IM360_RBL] The IP 188.166.114.8 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 23:30:48,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '188.166.114.8', 'timestamp': 1670362248.6193852, 'message': 'Dec 6 23:30:47 hqnl0246134 sshd[265532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.114.8 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-06 23:30:49,639] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:30:49,640] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:30:50,639] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.114.8', 'timestamp': 1670362250.6211462, 'message': 'Dec 6 23:30:49 hqnl0246134 sshd[265532]: Failed password for invalid user sysadmin from 188.166.114.8 port 46920 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 23:30:50,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '188.166.114.8', 'timestamp': 1670362250.621383, 'message': 'Dec 6 23:30:49 hqnl0246134 sshd[265532]: Disconnected from invalid user sysadmin 188.166.114.8 port 46920 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 23:30:52,188] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:30:52,189] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:30:52,197] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:30:52,209] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-06 23:30:52,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362252.6250365, 'message': 'Dec 6 23:30:51 hqnl0246134 sshd[265536]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 23:30:52,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362252.6252244, 'message': 'Dec 6 23:30:51 hqnl0246134 sshd[265536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:30:54,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362254.62863, 'message': 'Dec 6 23:30:53 hqnl0246134 sshd[265536]: Failed password for root from 61.177.173.18 port 40894 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 23:30:54,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '68.183.20.198', 'timestamp': 1670362254.628841, 'message': 'Dec 6 23:30:54 hqnl0246134 sshd[265541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 68.183.20.198 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-06 23:30:54,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '68.183.20.198', 'timestamp': 1670362254.6289794, 'message': 'Dec 6 23:30:54 hqnl0246134 sshd[265541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.20.198 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 23:30:56,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362256.6323087, 'message': 'Dec 6 23:30:55 hqnl0246134 sshd[265536]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-06 23:30:56,660] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '68.183.20.198', 'timestamp': 1670362256.6329622, 'message': 'Dec 6 23:30:56 hqnl0246134 sshd[265541]: Failed password for root from 68.183.20.198 port 38376 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 23:30:58,653] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362258.6348934, 'message': 'Dec 6 23:30:57 hqnl0246134 sshd[265536]: Failed password for root from 61.177.173.18 port 40894 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:30:58,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362258.6350768, 'message': 'Dec 6 23:30:57 hqnl0246134 sshd[265536]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:31:00,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362260.6357787, 'message': 'Dec 6 23:30:59 hqnl0246134 sshd[265536]: Failed password for root from 61.177.173.18 port 40894 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
WARNING [2022-12-06 23:31:11,012] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:31:11,033] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0292 seconds
INFO [2022-12-06 23:31:17,907] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:31:17,908] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:31:17,917] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:31:17,934] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0255 seconds
INFO [2022-12-06 23:31:20,539] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:31:20,540] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:31:20,547] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:31:20,559] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 23:31:30,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362290.687172, 'message': 'Dec 6 23:31:29 hqnl0246134 sshd[265575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 23:31:32,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362292.6865108, 'message': 'Dec 6 23:31:31 hqnl0246134 sshd[265575]: Failed password for root from 165.227.166.207 port 60440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 23:31:38,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362298.6981945, 'message': 'Dec 6 23:31:38 hqnl0246134 sshd[265579]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-06 23:31:38,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362298.6985612, 'message': 'Dec 6 23:31:38 hqnl0246134 sshd[265579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 23:31:40,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362300.7035239, 'message': 'Dec 6 23:31:38 hqnl0246134 sshd[265581]: Invalid user user from 51.178.90.17 port 45402', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-06 23:31:40,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362300.7038846, 'message': 'Dec 6 23:31:38 hqnl0246134 sshd[265581]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.178.90.17 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 23:31:40,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362300.7041216, 'message': 'Dec 6 23:31:38 hqnl0246134 sshd[265581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.90.17 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 23:31:42,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362302.7074714, 'message': 'Dec 6 23:31:40 hqnl0246134 sshd[265579]: Failed password for root from 61.177.173.18 port 12770 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-06 23:31:42,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362302.7077863, 'message': 'Dec 6 23:31:41 hqnl0246134 sshd[265581]: Failed password for invalid user user from 51.178.90.17 port 45402 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 23:31:42,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362302.707999, 'message': 'Dec 6 23:31:42 hqnl0246134 sshd[265579]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 23:31:44,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362304.7140539, 'message': 'Dec 6 23:31:42 hqnl0246134 sshd[265581]: Disconnected from invalid user user 51.178.90.17 port 45402 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-06 23:31:44,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362304.714235, 'message': 'Dec 6 23:31:43 hqnl0246134 sshd[265579]: Failed password for root from 61.177.173.18 port 12770 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-06 23:31:46,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362306.7160046, 'message': 'Dec 6 23:31:44 hqnl0246134 sshd[265579]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-06 23:31:46,764] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362306.7164352, 'message': 'Dec 6 23:31:46 hqnl0246134 sshd[265579]: Failed password for root from 61.177.173.18 port 12770 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 23:31:49,643] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:31:49,644] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 23:31:54,057] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 23:32:11,019] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:32:11,053] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0450 seconds
INFO [2022-12-06 23:32:18,056] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:32:18,057] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:32:18,066] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:32:18,079] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-06 23:32:20,800] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:32:20,801] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:32:20,808] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:32:20,821] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 23:32:22,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362342.7734127, 'message': 'Dec 6 23:32:21 hqnl0246134 sshd[265632]: Invalid user billy from 137.184.183.214 port 35494', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 23:32:22,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362342.7736452, 'message': 'Dec 6 23:32:21 hqnl0246134 sshd[265632]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.183.214 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 23:32:22,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362342.773805, 'message': 'Dec 6 23:32:21 hqnl0246134 sshd[265632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.183.214 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:32:24,051] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 23:32:24,117] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 23:32:24,117] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 23:32:24,118] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 23:32:24,118] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 23:32:24,118] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 23:32:24,127] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 23:32:24,143] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0250 seconds
WARNING [2022-12-06 23:32:24,150] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:32:24,153] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:32:24,171] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0331 seconds
INFO [2022-12-06 23:32:24,172] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0309 seconds
INFO [2022-12-06 23:32:24,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362344.7752664, 'message': 'Dec 6 23:32:23 hqnl0246134 sshd[265632]: Failed password for invalid user billy from 137.184.183.214 port 35494 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:32:26,817] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362346.7813652, 'message': 'Dec 6 23:32:25 hqnl0246134 sshd[265634]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 23:32:26,818] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362346.7817967, 'message': 'Dec 6 23:32:26 hqnl0246134 sshd[265632]: Disconnected from invalid user billy 137.184.183.214 port 35494 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 23:32:26,836] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362346.7816062, 'message': 'Dec 6 23:32:25 hqnl0246134 sshd[265634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:32:28,620] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:32:28,621] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:32:28,632] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:32:28,648] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0268 seconds
INFO [2022-12-06 23:32:28,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362348.7821548, 'message': 'Dec 6 23:32:26 hqnl0246134 sshd[265634]: Failed password for root from 61.177.173.18 port 35201 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 23:32:28,836] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362348.7824497, 'message': 'Dec 6 23:32:27 hqnl0246134 sshd[265634]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 23:32:30,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362350.7866488, 'message': 'Dec 6 23:32:29 hqnl0246134 sshd[265634]: Failed password for root from 61.177.173.18 port 35201 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 23:32:30,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362350.7869916, 'message': 'Dec 6 23:32:29 hqnl0246134 sshd[265634]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 23:32:32,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362352.7903695, 'message': 'Dec 6 23:32:31 hqnl0246134 sshd[265634]: Failed password for root from 61.177.173.18 port 35201 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
WARNING [2022-12-06 23:32:49,647] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:32:49,649] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:32:54,368] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 23:32:54,369] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 23:32:54,370] im360.plugins.client360: Waiting 2 minutes before retry...
INFO [2022-12-06 23:33:00,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.149.30', 'timestamp': 1670362380.8346307, 'message': 'Dec 6 23:32:59 hqnl0246134 sshd[265659]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.149.30 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-06 23:33:00,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.149.30', 'timestamp': 1670362380.8352697, 'message': 'Dec 6 23:33:00 hqnl0246134 sshd[265659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.149.30 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:33:02,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '128.199.149.30', 'timestamp': 1670362382.8374074, 'message': 'Dec 6 23:33:02 hqnl0246134 sshd[265659]: Failed password for root from 128.199.149.30 port 51372 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-06 23:33:10,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362390.8582003, 'message': 'Dec 6 23:33:09 hqnl0246134 sshd[265671]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 23:33:10,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362390.8584187, 'message': 'Dec 6 23:33:09 hqnl0246134 sshd[265671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-06 23:33:11,021] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:33:11,052] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0380 seconds
INFO [2022-12-06 23:33:12,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362392.860661, 'message': 'Dec 6 23:33:11 hqnl0246134 sshd[265671]: Failed password for root from 61.177.173.18 port 46964 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-06 23:33:12,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362392.867952, 'message': 'Dec 6 23:33:12 hqnl0246134 sshd[265671]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 23:33:14,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362394.8650923, 'message': 'Dec 6 23:33:13 hqnl0246134 sshd[265671]: Failed password for root from 61.177.173.18 port 46964 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 23:33:14,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362394.8652618, 'message': 'Dec 6 23:33:14 hqnl0246134 sshd[265671]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 23:33:16,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362396.8663383, 'message': 'Dec 6 23:33:15 hqnl0246134 sshd[265671]: Failed password for root from 61.177.173.18 port 46964 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 23:33:17,906] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:33:17,907] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:33:17,914] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:33:17,926] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-06 23:33:18,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '191.17.116.8', 'timestamp': 1670362398.8690915, 'message': 'Dec 6 23:33:17 hqnl0246134 sshd[265675]: Invalid user vz from 191.17.116.8 port 43957', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-06 23:33:18,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '191.17.116.8', 'timestamp': 1670362398.869273, 'message': 'Dec 6 23:33:17 hqnl0246134 sshd[265675]: pam_imunify(sshd:auth): [IM360_RBL] The IP 191.17.116.8 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 23:33:18,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '191.17.116.8', 'timestamp': 1670362398.869409, 'message': 'Dec 6 23:33:17 hqnl0246134 sshd[265675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.17.116.8 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:33:20,650] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:33:20,650] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:33:20,663] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:33:20,688] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0363 seconds
INFO [2022-12-06 23:33:20,906] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '188.166.114.8', 'timestamp': 1670362400.870591, 'message': 'Dec 6 23:33:18 hqnl0246134 sshd[265715]: pam_imunify(sshd:auth): [IM360_RBL] The IP 188.166.114.8 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 23:33:20,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '191.17.116.8', 'timestamp': 1670362400.871045, 'message': 'Dec 6 23:33:19 hqnl0246134 sshd[265675]: Failed password for invalid user vz from 191.17.116.8 port 43957 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-06 23:33:20,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '188.166.114.8', 'timestamp': 1670362400.8708262, 'message': 'Dec 6 23:33:18 hqnl0246134 sshd[265715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.114.8 user=ftp', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-06 23:33:20,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '191.17.116.8', 'timestamp': 1670362400.8711853, 'message': 'Dec 6 23:33:20 hqnl0246134 sshd[265675]: Disconnected from invalid user vz 191.17.116.8 port 43957 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-06 23:33:20,957] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '188.166.114.8', 'timestamp': 1670362400.8713143, 'message': 'Dec 6 23:33:20 hqnl0246134 sshd[265715]: Failed password for ftp from 188.166.114.8 port 36260 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 23:33:28,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362408.8785582, 'message': 'Dec 6 23:33:27 hqnl0246134 sshd[265720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 23:33:30,898] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362410.881018, 'message': 'Dec 6 23:33:29 hqnl0246134 sshd[265720]: Failed password for root from 165.227.166.207 port 42502 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:33:38,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.255.60.194', 'timestamp': 1670362418.8916218, 'message': 'Dec 6 23:33:38 hqnl0246134 sshd[265724]: Invalid user cent from 20.255.60.194 port 33876', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 23:33:40,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.255.60.194', 'timestamp': 1670362420.8956807, 'message': 'Dec 6 23:33:38 hqnl0246134 sshd[265724]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.255.60.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 23:33:40,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.255.60.194', 'timestamp': 1670362420.8959713, 'message': 'Dec 6 23:33:38 hqnl0246134 sshd[265724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.255.60.194 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 23:33:40,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.255.60.194', 'timestamp': 1670362420.8960857, 'message': 'Dec 6 23:33:40 hqnl0246134 sshd[265724]: Failed password for invalid user cent from 20.255.60.194 port 33876 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:33:42,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.255.60.194', 'timestamp': 1670362422.898483, 'message': 'Dec 6 23:33:41 hqnl0246134 sshd[265724]: Disconnected from invalid user cent 20.255.60.194 port 33876 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 23:33:43,799] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:33:43,800] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:33:43,806] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:33:43,818] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
WARNING [2022-12-06 23:33:49,651] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:33:49,652] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:33:56,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362436.9384487, 'message': 'Dec 6 23:33:56 hqnl0246134 sshd[265741]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 23:33:56,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362436.9388745, 'message': 'Dec 6 23:33:56 hqnl0246134 sshd[265741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:33:58,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362438.942386, 'message': 'Dec 6 23:33:58 hqnl0246134 sshd[265741]: Failed password for root from 61.177.173.18 port 17416 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 23:33:58,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362438.9426053, 'message': 'Dec 6 23:33:58 hqnl0246134 sshd[265741]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:34:02,975] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362442.9504244, 'message': 'Dec 6 23:34:01 hqnl0246134 sshd[265741]: Failed password for root from 61.177.173.18 port 17416 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 23:34:04,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362444.9523122, 'message': 'Dec 6 23:34:03 hqnl0246134 sshd[265741]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 23:34:06,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362446.9556348, 'message': 'Dec 6 23:34:05 hqnl0246134 sshd[265741]: Failed password for root from 61.177.173.18 port 17416 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 23:34:08,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362448.9603238, 'message': 'Dec 6 23:34:07 hqnl0246134 sshd[265752]: Invalid user thomas from 51.178.90.17 port 45426', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 23:34:09,000] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362448.960704, 'message': 'Dec 6 23:34:07 hqnl0246134 sshd[265752]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.178.90.17 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 23:34:09,019] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362448.96088, 'message': 'Dec 6 23:34:07 hqnl0246134 sshd[265752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.90.17 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:34:11,012] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362450.961641, 'message': 'Dec 6 23:34:09 hqnl0246134 sshd[265752]: Failed password for invalid user thomas from 51.178.90.17 port 45426 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0501 seconds
WARNING [2022-12-06 23:34:11,050] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:34:11,146] defence360agent.internals.the_sink: SensorIncidentList(<18 item(s)>) processed in 0.1228 seconds
INFO [2022-12-06 23:34:12,984] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.90.17', 'timestamp': 1670362452.9658592, 'message': 'Dec 6 23:34:12 hqnl0246134 sshd[265752]: Disconnected from invalid user thomas 51.178.90.17 port 45426 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 23:34:17,826] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:34:17,827] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:34:17,847] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:34:17,882] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0540 seconds
INFO [2022-12-06 23:34:21,334] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:34:21,335] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:34:21,344] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:34:21,355] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 23:34:43,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362483.0197968, 'message': 'Dec 6 23:34:42 hqnl0246134 sshd[265777]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-06 23:34:43,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362483.0202208, 'message': 'Dec 6 23:34:42 hqnl0246134 sshd[265777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-06 23:34:45,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362485.025354, 'message': 'Dec 6 23:34:44 hqnl0246134 sshd[265777]: Failed password for root from 61.177.173.18 port 30479 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-06 23:34:45,084] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362485.0256376, 'message': 'Dec 6 23:34:44 hqnl0246134 sshd[265777]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-06 23:34:47,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362487.0292447, 'message': 'Dec 6 23:34:46 hqnl0246134 sshd[265777]: Failed password for root from 61.177.173.18 port 30479 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 23:34:47,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362487.0297534, 'message': 'Dec 6 23:34:46 hqnl0246134 sshd[265777]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 23:34:49,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362489.031112, 'message': 'Dec 6 23:34:48 hqnl0246134 sshd[265777]: Failed password for root from 61.177.173.18 port 30479 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
WARNING [2022-12-06 23:34:49,655] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:34:49,655] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 23:35:11,037] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:35:11,060] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0318 seconds
INFO [2022-12-06 23:35:18,025] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:35:18,025] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:35:18,033] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:35:18,044] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-06 23:35:21,020] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:35:21,021] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:35:21,027] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:35:21,040] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 23:35:23,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362523.0957217, 'message': 'Dec 6 23:35:22 hqnl0246134 sshd[265844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0641 seconds
INFO [2022-12-06 23:35:27,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362527.0978346, 'message': 'Dec 6 23:35:25 hqnl0246134 sshd[265844]: Failed password for root from 165.227.166.207 port 52792 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:35:29,536] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:35:29,536] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:35:29,545] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:35:29,558] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0211 seconds
INFO [2022-12-06 23:35:31,133] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362531.1023118, 'message': 'Dec 6 23:35:29 hqnl0246134 sshd[265850]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-06 23:35:31,159] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362531.1025715, 'message': 'Dec 6 23:35:29 hqnl0246134 sshd[265850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 23:35:33,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362533.1063213, 'message': 'Dec 6 23:35:31 hqnl0246134 sshd[265850]: Failed password for root from 61.177.173.18 port 57478 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-06 23:35:35,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362535.1137657, 'message': 'Dec 6 23:35:33 hqnl0246134 sshd[265850]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 23:35:37,143] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362537.1198065, 'message': 'Dec 6 23:35:35 hqnl0246134 sshd[265850]: Failed password for root from 61.177.173.18 port 57478 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-06 23:35:37,161] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362537.12004, 'message': 'Dec 6 23:35:36 hqnl0246134 sshd[265850]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-06 23:35:39,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362539.1223724, 'message': 'Dec 6 23:35:38 hqnl0246134 sshd[265850]: Failed password for root from 61.177.173.18 port 57478 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-06 23:35:45,614] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 23:35:45,681] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 23:35:45,682] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 23:35:45,682] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 23:35:45,682] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 23:35:45,682] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 23:35:45,692] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 23:35:45,715] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0316 seconds
WARNING [2022-12-06 23:35:45,727] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:35:45,731] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:35:45,763] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0555 seconds
INFO [2022-12-06 23:35:45,765] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0542 seconds
INFO [2022-12-06 23:35:47,172] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.149.30', 'timestamp': 1670362547.1491792, 'message': 'Dec 6 23:35:46 hqnl0246134 sshd[265856]: Invalid user angie from 128.199.149.30 port 50624', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 23:35:47,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.149.30', 'timestamp': 1670362547.149537, 'message': 'Dec 6 23:35:46 hqnl0246134 sshd[265856]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.149.30 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 23:35:47,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.149.30', 'timestamp': 1670362547.1496894, 'message': 'Dec 6 23:35:46 hqnl0246134 sshd[265856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.149.30 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 23:35:49,177] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.149.30', 'timestamp': 1670362549.1582367, 'message': 'Dec 6 23:35:49 hqnl0246134 sshd[265856]: Failed password for invalid user angie from 128.199.149.30 port 50624 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-06 23:35:49,659] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:35:49,659] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:35:51,183] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.149.30', 'timestamp': 1670362551.1640503, 'message': 'Dec 6 23:35:50 hqnl0246134 sshd[265856]: Disconnected from invalid user angie 128.199.149.30 port 50624 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:36:05,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362565.1888359, 'message': 'Dec 6 23:36:03 hqnl0246134 sshd[265875]: Invalid user whmcs from 104.131.40.97 port 48916', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 23:36:05,231] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362565.1892061, 'message': 'Dec 6 23:36:03 hqnl0246134 sshd[265875]: pam_imunify(sshd:auth): [IM360_RBL] The IP 104.131.40.97 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 23:36:05,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362565.1893327, 'message': 'Dec 6 23:36:03 hqnl0246134 sshd[265875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.40.97 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 23:36:07,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362567.1901183, 'message': 'Dec 6 23:36:05 hqnl0246134 sshd[265875]: Failed password for invalid user whmcs from 104.131.40.97 port 48916 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 23:36:07,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362567.1903684, 'message': 'Dec 6 23:36:07 hqnl0246134 sshd[265875]: Disconnected from invalid user whmcs 104.131.40.97 port 48916 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-06 23:36:11,041] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:36:11,066] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0328 seconds
INFO [2022-12-06 23:36:11,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '81.182.248.193', 'timestamp': 1670362571.1943376, 'message': 'Dec 6 23:36:10 hqnl0246134 sshd[265877]: Invalid user nginx from 81.182.248.193 port 41948', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:36:11,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '81.182.248.193', 'timestamp': 1670362571.194551, 'message': 'Dec 6 23:36:10 hqnl0246134 sshd[265877]: pam_imunify(sshd:auth): [IM360_RBL] The IP 81.182.248.193 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-06 23:36:11,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '81.182.248.193', 'timestamp': 1670362571.1946862, 'message': 'Dec 6 23:36:10 hqnl0246134 sshd[265877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.182.248.193 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 23:36:13,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '81.182.248.193', 'timestamp': 1670362573.196204, 'message': 'Dec 6 23:36:12 hqnl0246134 sshd[265877]: Failed password for invalid user nginx from 81.182.248.193 port 41948 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 23:36:15,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '81.182.248.193', 'timestamp': 1670362575.1984227, 'message': 'Dec 6 23:36:14 hqnl0246134 sshd[265877]: Disconnected from invalid user nginx 81.182.248.193 port 41948 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0436 seconds
INFO [2022-12-06 23:36:15,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362575.198605, 'message': 'Dec 6 23:36:15 hqnl0246134 sshd[265882]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0442 seconds
INFO [2022-12-06 23:36:15,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362575.1987638, 'message': 'Dec 6 23:36:15 hqnl0246134 sshd[265882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-06 23:36:15,808] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 23:36:15,809] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 23:36:15,809] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-06 23:36:17,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362577.2003334, 'message': 'Dec 6 23:36:16 hqnl0246134 sshd[265882]: Failed password for root from 61.177.173.18 port 10838 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-06 23:36:17,965] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:36:17,965] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:36:17,973] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:36:17,985] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 23:36:19,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362579.2056997, 'message': 'Dec 6 23:36:17 hqnl0246134 sshd[265882]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 23:36:20,629] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:36:20,630] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:36:20,636] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:36:20,648] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 23:36:21,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362581.2107918, 'message': 'Dec 6 23:36:19 hqnl0246134 sshd[265882]: Failed password for root from 61.177.173.18 port 10838 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 23:36:23,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362583.2146714, 'message': 'Dec 6 23:36:21 hqnl0246134 sshd[265882]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 23:36:25,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362585.2151973, 'message': 'Dec 6 23:36:23 hqnl0246134 sshd[265882]: Failed password for root from 61.177.173.18 port 10838 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-06 23:36:49,671] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:36:49,672] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:37:05,382] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362625.3570743, 'message': 'Dec 6 23:37:03 hqnl0246134 sshd[265928]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 23:37:05,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362625.3578134, 'message': 'Dec 6 23:37:03 hqnl0246134 sshd[265928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 23:37:05,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362625.3580892, 'message': 'Dec 6 23:37:05 hqnl0246134 sshd[265928]: Failed password for root from 61.177.173.18 port 43141 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 23:37:07,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362627.3580117, 'message': 'Dec 6 23:37:05 hqnl0246134 sshd[265928]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 23:37:09,382] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362629.3624635, 'message': 'Dec 6 23:37:08 hqnl0246134 sshd[265928]: Failed password for root from 61.177.173.18 port 43141 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0193 seconds
WARNING [2022-12-06 23:37:11,043] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:37:11,063] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0275 seconds
INFO [2022-12-06 23:37:11,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362631.3641574, 'message': 'Dec 6 23:37:10 hqnl0246134 sshd[265928]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-06 23:37:11,392] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362631.3643978, 'message': 'Dec 6 23:37:10 hqnl0246134 sshd[265954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-06 23:37:13,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362633.3660693, 'message': 'Dec 6 23:37:12 hqnl0246134 sshd[265928]: Failed password for root from 61.177.173.18 port 43141 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 23:37:13,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362633.366252, 'message': 'Dec 6 23:37:12 hqnl0246134 sshd[265954]: Failed password for root from 165.227.166.207 port 34846 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 23:37:15,081] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:37:15,082] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:37:15,089] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:37:15,102] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-06 23:37:17,874] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:37:17,875] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:37:17,886] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:37:17,900] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0245 seconds
INFO [2022-12-06 23:37:19,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.255.60.194', 'timestamp': 1670362639.3742502, 'message': 'Dec 6 23:37:17 hqnl0246134 sshd[265961]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.255.60.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 23:37:19,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.255.60.194', 'timestamp': 1670362639.3747084, 'message': 'Dec 6 23:37:17 hqnl0246134 sshd[265961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.255.60.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:37:20,524] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:37:20,524] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:37:20,533] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:37:20,546] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 23:37:21,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.255.60.194', 'timestamp': 1670362641.373821, 'message': 'Dec 6 23:37:20 hqnl0246134 sshd[265961]: Failed password for root from 20.255.60.194 port 41038 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 23:37:49,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362669.4092927, 'message': 'Dec 6 23:37:49 hqnl0246134 sshd[265999]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-06 23:37:49,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362669.4100022, 'message': 'Dec 6 23:37:49 hqnl0246134 sshd[265999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
WARNING [2022-12-06 23:37:49,678] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:37:49,679] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:37:51,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362671.4103167, 'message': 'Dec 6 23:37:50 hqnl0246134 sshd[265999]: Failed password for root from 61.177.173.18 port 56180 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 23:37:53,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362673.4133832, 'message': 'Dec 6 23:37:51 hqnl0246134 sshd[265999]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 23:37:55,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362675.4164555, 'message': 'Dec 6 23:37:54 hqnl0246134 sshd[265999]: Failed password for root from 61.177.173.18 port 56180 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 23:37:57,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362677.4190059, 'message': 'Dec 6 23:37:55 hqnl0246134 sshd[265999]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-06 23:37:59,654] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362679.604053, 'message': 'Dec 6 23:37:57 hqnl0246134 sshd[265999]: Failed password for root from 61.177.173.18 port 56180 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0399 seconds
WARNING [2022-12-06 23:38:11,047] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:38:11,072] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0326 seconds
INFO [2022-12-06 23:38:17,957] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:38:17,957] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:38:17,968] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:38:17,980] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 23:38:20,600] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:38:20,601] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:38:20,612] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:38:20,629] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0270 seconds
INFO [2022-12-06 23:38:37,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362717.4619164, 'message': 'Dec 6 23:38:35 hqnl0246134 sshd[266036]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 23:38:37,509] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362717.4622576, 'message': 'Dec 6 23:38:35 hqnl0246134 sshd[266036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 23:38:37,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362717.4624982, 'message': 'Dec 6 23:38:37 hqnl0246134 sshd[266036]: Failed password for root from 61.177.173.18 port 24422 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-06 23:38:39,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362719.4616091, 'message': 'Dec 6 23:38:37 hqnl0246134 sshd[266036]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 23:38:41,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362721.4657714, 'message': 'Dec 6 23:38:39 hqnl0246134 sshd[266036]: Failed password for root from 61.177.173.18 port 24422 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 23:38:41,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362721.4659543, 'message': 'Dec 6 23:38:40 hqnl0246134 sshd[266036]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 23:38:43,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362723.4682512, 'message': 'Dec 6 23:38:42 hqnl0246134 sshd[266038]: Invalid user www from 104.131.40.97 port 37484', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-06 23:38:43,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362723.4684534, 'message': 'Dec 6 23:38:42 hqnl0246134 sshd[266036]: Failed password for root from 61.177.173.18 port 24422 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-06 23:38:43,515] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362723.468589, 'message': 'Dec 6 23:38:42 hqnl0246134 sshd[266038]: pam_imunify(sshd:auth): [IM360_RBL] The IP 104.131.40.97 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 23:38:43,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362723.4687145, 'message': 'Dec 6 23:38:42 hqnl0246134 sshd[266038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.40.97 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 23:38:45,493] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362725.4708848, 'message': 'Dec 6 23:38:44 hqnl0246134 sshd[266038]: Failed password for invalid user www from 104.131.40.97 port 37484 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 23:38:46,822] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:38:46,822] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:38:46,829] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:38:46,840] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-06 23:38:47,578] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362727.475523, 'message': 'Dec 6 23:38:46 hqnl0246134 sshd[266038]: Disconnected from invalid user www 104.131.40.97 port 37484 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1019 seconds
WARNING [2022-12-06 23:38:49,681] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:38:49,682] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:38:59,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362739.4876387, 'message': 'Dec 6 23:38:57 hqnl0246134 sshd[266054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-06 23:39:01,515] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362741.4891875, 'message': 'Dec 6 23:38:59 hqnl0246134 sshd[266054]: Failed password for root from 165.227.166.207 port 45140 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0257 seconds
WARNING [2022-12-06 23:39:11,055] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:39:11,080] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0359 seconds
INFO [2022-12-06 23:39:19,424] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:39:19,425] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:39:19,440] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:39:19,465] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0379 seconds
INFO [2022-12-06 23:39:19,531] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362759.50868, 'message': 'Dec 6 23:39:17 hqnl0246134 sshd[266190]: Invalid user support from 137.184.183.214 port 35748', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 23:39:19,552] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362759.5089455, 'message': 'Dec 6 23:39:17 hqnl0246134 sshd[266190]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.183.214 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 23:39:19,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362759.509138, 'message': 'Dec 6 23:39:17 hqnl0246134 sshd[266190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.183.214 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 23:39:21,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362761.5098426, 'message': 'Dec 6 23:39:20 hqnl0246134 sshd[266190]: Failed password for invalid user support from 137.184.183.214 port 35748 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-06 23:39:21,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362761.5100439, 'message': 'Dec 6 23:39:21 hqnl0246134 sshd[266206]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-06 23:39:21,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362761.5101674, 'message': 'Dec 6 23:39:21 hqnl0246134 sshd[266206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-06 23:39:22,796] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:39:22,796] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:39:22,824] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:39:22,847] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0372 seconds
INFO [2022-12-06 23:39:23,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362763.5113804, 'message': 'Dec 6 23:39:21 hqnl0246134 sshd[266190]: Disconnected from invalid user support 137.184.183.214 port 35748 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.2276 seconds
INFO [2022-12-06 23:39:23,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362763.5115736, 'message': 'Dec 6 23:39:22 hqnl0246134 sshd[266206]: Failed password for root from 61.177.173.18 port 45023 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.2285 seconds
INFO [2022-12-06 23:39:23,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362763.5117443, 'message': 'Dec 6 23:39:23 hqnl0246134 sshd[266206]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1012 seconds
INFO [2022-12-06 23:39:27,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362767.5140316, 'message': 'Dec 6 23:39:26 hqnl0246134 sshd[266206]: Failed password for root from 61.177.173.18 port 45023 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0562 seconds
INFO [2022-12-06 23:39:29,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362769.5163085, 'message': 'Dec 6 23:39:27 hqnl0246134 sshd[266206]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 23:39:31,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362771.5191915, 'message': 'Dec 6 23:39:29 hqnl0246134 sshd[266206]: Failed password for root from 61.177.173.18 port 45023 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 23:39:49,686] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:39:49,687] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:40:07,597] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362807.5704472, 'message': 'Dec 6 23:40:06 hqnl0246134 sshd[266258]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-06 23:40:07,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362807.571127, 'message': 'Dec 6 23:40:06 hqnl0246134 sshd[266258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-06 23:40:09,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362809.5791285, 'message': 'Dec 6 23:40:08 hqnl0246134 sshd[266258]: Failed password for root from 61.177.173.18 port 56768 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 23:40:09,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362809.5794165, 'message': 'Dec 6 23:40:08 hqnl0246134 sshd[266258]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-06 23:40:11,063] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:40:11,085] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0339 seconds
INFO [2022-12-06 23:40:11,606] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362811.587588, 'message': 'Dec 6 23:40:10 hqnl0246134 sshd[266258]: Failed password for root from 61.177.173.18 port 56768 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 23:40:11,628] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362811.587827, 'message': 'Dec 6 23:40:10 hqnl0246134 sshd[266258]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 23:40:13,615] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362813.5961733, 'message': 'Dec 6 23:40:13 hqnl0246134 sshd[266258]: Failed password for root from 61.177.173.18 port 56768 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:40:18,104] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:40:18,105] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 23:40:18,233] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:40:18,233] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:40:18,325] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:40:18,355] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:40:18,389] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.2804 seconds
INFO [2022-12-06 23:40:18,390] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1527 seconds
INFO [2022-12-06 23:40:21,065] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:40:21,065] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:40:21,074] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:40:21,086] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 23:40:45,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362845.6662145, 'message': 'Dec 6 23:40:45 hqnl0246134 sshd[266299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-06 23:40:47,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362847.6736176, 'message': 'Dec 6 23:40:47 hqnl0246134 sshd[266299]: Failed password for root from 165.227.166.207 port 55418 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-06 23:40:49,689] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:40:49,691] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:40:53,713] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362853.6906207, 'message': 'Dec 6 23:40:52 hqnl0246134 sshd[266310]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-06 23:40:53,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362853.6909637, 'message': 'Dec 6 23:40:52 hqnl0246134 sshd[266310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:40:55,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362855.6937623, 'message': 'Dec 6 23:40:54 hqnl0246134 sshd[266310]: Failed password for root from 61.177.173.18 port 19078 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 23:40:57,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362857.7018464, 'message': 'Dec 6 23:40:56 hqnl0246134 sshd[266310]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 23:40:59,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362859.7059586, 'message': 'Dec 6 23:40:58 hqnl0246134 sshd[266310]: Failed password for root from 61.177.173.18 port 19078 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 23:40:59,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362859.706202, 'message': 'Dec 6 23:40:59 hqnl0246134 sshd[266310]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-06 23:41:01,727] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362861.7094944, 'message': 'Dec 6 23:41:01 hqnl0246134 sshd[266310]: Failed password for root from 61.177.173.18 port 19078 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-06 23:41:11,062] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:41:11,083] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0286 seconds
INFO [2022-12-06 23:41:13,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362873.7230346, 'message': 'Dec 6 23:41:12 hqnl0246134 sshd[266349]: pam_imunify(sshd:auth): [IM360_RBL] The IP 104.131.40.97 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 23:41:13,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362873.7232985, 'message': 'Dec 6 23:41:12 hqnl0246134 sshd[266349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.40.97 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 23:41:15,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '104.131.40.97', 'timestamp': 1670362875.7255423, 'message': 'Dec 6 23:41:15 hqnl0246134 sshd[266349]: Failed password for root from 104.131.40.97 port 54282 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-06 23:41:18,321] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:41:18,322] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:41:18,335] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:41:18,358] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0347 seconds
INFO [2022-12-06 23:41:19,615] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:41:19,616] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:41:19,625] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:41:19,637] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-06 23:41:21,110] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:41:21,111] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:41:21,119] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:41:21,130] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-06 23:41:27,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.255.60.194', 'timestamp': 1670362887.7385485, 'message': 'Dec 6 23:41:27 hqnl0246134 sshd[266378]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.255.60.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 23:41:29,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.255.60.194', 'timestamp': 1670362889.7390673, 'message': 'Dec 6 23:41:27 hqnl0246134 sshd[266378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.255.60.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:41:31,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.255.60.194', 'timestamp': 1670362891.7421296, 'message': 'Dec 6 23:41:29 hqnl0246134 sshd[266378]: Failed password for root from 20.255.60.194 port 44362 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-06 23:41:41,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362901.7578342, 'message': 'Dec 6 23:41:41 hqnl0246134 sshd[266385]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-06 23:41:41,799] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362901.7580585, 'message': 'Dec 6 23:41:41 hqnl0246134 sshd[266385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 23:41:43,778] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362903.7580717, 'message': 'Dec 6 23:41:43 hqnl0246134 sshd[266385]: Failed password for root from 61.177.173.18 port 52055 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 23:41:44,914] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 23:41:44,986] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 23:41:44,986] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 23:41:44,987] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 23:41:44,987] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 23:41:44,987] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 23:41:45,002] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 23:41:45,031] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0429 seconds
WARNING [2022-12-06 23:41:45,044] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:41:45,049] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:41:45,073] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0524 seconds
INFO [2022-12-06 23:41:45,075] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0474 seconds
INFO [2022-12-06 23:41:47,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362907.7676795, 'message': 'Dec 6 23:41:45 hqnl0246134 sshd[266385]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 23:41:47,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362907.767931, 'message': 'Dec 6 23:41:47 hqnl0246134 sshd[266385]: Failed password for root from 61.177.173.18 port 52055 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 23:41:49,695] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:41:49,696] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:41:49,793] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362909.769799, 'message': 'Dec 6 23:41:48 hqnl0246134 sshd[266385]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 23:41:51,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362911.7719865, 'message': 'Dec 6 23:41:50 hqnl0246134 sshd[266385]: Failed password for root from 61.177.173.18 port 52055 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 23:41:54,062] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-06 23:42:11,073] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:42:11,099] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0382 seconds
INFO [2022-12-06 23:42:15,114] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 23:42:15,115] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 23:42:15,116] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-06 23:42:17,824] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:42:17,825] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:42:17,833] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:42:17,845] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 23:42:19,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362939.8089232, 'message': 'Dec 6 23:42:18 hqnl0246134 sshd[266415]: Invalid user vd from 137.184.183.214 port 35920', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 23:42:19,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362939.8092716, 'message': 'Dec 6 23:42:18 hqnl0246134 sshd[266415]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.183.214 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 23:42:19,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362939.809433, 'message': 'Dec 6 23:42:18 hqnl0246134 sshd[266415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.183.214 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 23:42:20,745] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:42:20,745] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:42:20,756] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:42:20,792] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0456 seconds
INFO [2022-12-06 23:42:21,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362941.8105803, 'message': 'Dec 6 23:42:20 hqnl0246134 sshd[266415]: Failed password for invalid user vd from 137.184.183.214 port 35920 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-06 23:42:21,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.183.214', 'timestamp': 1670362941.810882, 'message': 'Dec 6 23:42:21 hqnl0246134 sshd[266415]: Disconnected from invalid user vd 137.184.183.214 port 35920 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-06 23:42:29,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362949.8232265, 'message': 'Dec 6 23:42:28 hqnl0246134 sshd[266435]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-06 23:42:29,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362949.8237221, 'message': 'Dec 6 23:42:28 hqnl0246134 sshd[266435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-06 23:42:31,849] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362951.828339, 'message': 'Dec 6 23:42:31 hqnl0246134 sshd[266435]: Failed password for root from 61.177.173.18 port 13015 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 23:42:33,852] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362953.8306756, 'message': 'Dec 6 23:42:33 hqnl0246134 sshd[266435]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 23:42:35,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362955.8358078, 'message': 'Dec 6 23:42:34 hqnl0246134 sshd[266438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-06 23:42:35,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362955.836062, 'message': 'Dec 6 23:42:35 hqnl0246134 sshd[266435]: Failed password for root from 61.177.173.18 port 13015 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-06 23:42:37,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670362957.8413136, 'message': 'Dec 6 23:42:36 hqnl0246134 sshd[266438]: Failed password for root from 165.227.166.207 port 37484 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-06 23:42:37,876] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362957.8415222, 'message': 'Dec 6 23:42:37 hqnl0246134 sshd[266435]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-06 23:42:39,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362959.8449385, 'message': 'Dec 6 23:42:39 hqnl0246134 sshd[266435]: Failed password for root from 61.177.173.18 port 13015 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 23:42:40,888] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:42:40,889] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:42:40,896] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:42:40,907] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
WARNING [2022-12-06 23:42:49,704] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:42:49,705] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-06 23:43:11,077] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:43:11,102] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0366 seconds
INFO [2022-12-06 23:43:17,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362997.9033144, 'message': 'Dec 6 23:43:16 hqnl0246134 sshd[266471]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 23:43:18,004] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:43:18,005] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:43:18,016] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:43:18,027] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362997.90527, 'message': 'Dec 6 23:43:16 hqnl0246134 sshd[266471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1015 seconds
INFO [2022-12-06 23:43:18,033] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0276 seconds
INFO [2022-12-06 23:43:19,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362999.9071465, 'message': 'Dec 6 23:43:18 hqnl0246134 sshd[266471]: Failed password for root from 61.177.173.18 port 29622 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 23:43:19,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670362999.9075341, 'message': 'Dec 6 23:43:18 hqnl0246134 sshd[266471]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:43:20,593] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:43:20,594] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:43:20,603] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:43:20,614] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 23:43:21,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363001.9087405, 'message': 'Dec 6 23:43:21 hqnl0246134 sshd[266471]: Failed password for root from 61.177.173.18 port 29622 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-06 23:43:23,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363003.9114847, 'message': 'Dec 6 23:43:22 hqnl0246134 sshd[266471]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 23:43:25,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363005.920487, 'message': 'Dec 6 23:43:25 hqnl0246134 sshd[266471]: Failed password for root from 61.177.173.18 port 29622 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-06 23:43:49,708] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:43:49,709] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:44:04,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363044.0111163, 'message': 'Dec 6 23:44:02 hqnl0246134 sshd[266503]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 23:44:04,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363044.0116818, 'message': 'Dec 6 23:44:02 hqnl0246134 sshd[266503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 23:44:06,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363046.012824, 'message': 'Dec 6 23:44:04 hqnl0246134 sshd[266503]: Failed password for root from 61.177.173.18 port 45121 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-06 23:44:06,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363046.0130568, 'message': 'Dec 6 23:44:04 hqnl0246134 sshd[266503]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:44:08,051] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363048.0158846, 'message': 'Dec 6 23:44:06 hqnl0246134 sshd[266503]: Failed password for root from 61.177.173.18 port 45121 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 23:44:08,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363048.0162387, 'message': 'Dec 6 23:44:06 hqnl0246134 sshd[266503]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:44:10,037] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363050.017715, 'message': 'Dec 6 23:44:09 hqnl0246134 sshd[266503]: Failed password for root from 61.177.173.18 port 45121 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-06 23:44:11,079] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:44:11,108] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0380 seconds
INFO [2022-12-06 23:44:13,836] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:44:13,836] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:44:13,847] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:44:13,864] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0267 seconds
INFO [2022-12-06 23:44:17,963] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:44:17,964] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:44:17,971] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:44:17,984] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-06 23:44:20,776] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:44:20,776] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:44:20,786] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:44:20,799] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-06 23:44:24,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363064.034629, 'message': 'Dec 6 23:44:23 hqnl0246134 sshd[266564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-06 23:44:26,057] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363066.037985, 'message': 'Dec 6 23:44:25 hqnl0246134 sshd[266564]: Failed password for root from 165.227.166.207 port 47760 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-06 23:44:49,713] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:44:49,714] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:44:50,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363090.077997, 'message': 'Dec 6 23:44:48 hqnl0246134 sshd[266568]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-06 23:44:50,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363090.0784082, 'message': 'Dec 6 23:44:48 hqnl0246134 sshd[266568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-06 23:44:52,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363092.084898, 'message': 'Dec 6 23:44:51 hqnl0246134 sshd[266568]: Failed password for root from 61.177.173.18 port 12953 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 23:44:54,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363094.0907319, 'message': 'Dec 6 23:44:53 hqnl0246134 sshd[266568]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 23:44:54,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '191.17.116.8', 'timestamp': 1670363094.0910091, 'message': 'Dec 6 23:44:53 hqnl0246134 sshd[266566]: Invalid user openhab from 191.17.116.8 port 47650', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-06 23:44:54,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '191.17.116.8', 'timestamp': 1670363094.0911486, 'message': 'Dec 6 23:44:53 hqnl0246134 sshd[266566]: pam_imunify(sshd:auth): [IM360_RBL] The IP 191.17.116.8 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:44:54,159] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '191.17.116.8', 'timestamp': 1670363094.0912702, 'message': 'Dec 6 23:44:53 hqnl0246134 sshd[266566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.17.116.8 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 23:44:56,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363096.094228, 'message': 'Dec 6 23:44:55 hqnl0246134 sshd[266568]: Failed password for root from 61.177.173.18 port 12953 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-06 23:44:56,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '191.17.116.8', 'timestamp': 1670363096.0947332, 'message': 'Dec 6 23:44:55 hqnl0246134 sshd[266566]: Failed password for invalid user openhab from 191.17.116.8 port 47650 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-06 23:44:56,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363096.0945277, 'message': 'Dec 6 23:44:55 hqnl0246134 sshd[266568]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:44:58,125] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '191.17.116.8', 'timestamp': 1670363098.09432, 'message': 'Dec 6 23:44:57 hqnl0246134 sshd[266566]: Disconnected from invalid user openhab 191.17.116.8 port 47650 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 23:44:58,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363098.0945494, 'message': 'Dec 6 23:44:57 hqnl0246134 sshd[266568]: Failed password for root from 61.177.173.18 port 12953 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
WARNING [2022-12-06 23:45:11,086] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:45:11,112] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0383 seconds
INFO [2022-12-06 23:45:14,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.183.214', 'timestamp': 1670363114.1208043, 'message': 'Dec 6 23:45:12 hqnl0246134 sshd[266604]: Invalid user kumar from 137.184.183.214 port 36088', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 23:45:14,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.183.214', 'timestamp': 1670363114.1210396, 'message': 'Dec 6 23:45:12 hqnl0246134 sshd[266604]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.183.214 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 23:45:14,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.183.214', 'timestamp': 1670363114.1211603, 'message': 'Dec 6 23:45:12 hqnl0246134 sshd[266604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.183.214 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 23:45:16,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.183.214', 'timestamp': 1670363116.1233406, 'message': 'Dec 6 23:45:14 hqnl0246134 sshd[266604]: Failed password for invalid user kumar from 137.184.183.214 port 36088 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-06 23:45:16,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.183.214', 'timestamp': 1670363116.1235301, 'message': 'Dec 6 23:45:14 hqnl0246134 sshd[266604]: Disconnected from invalid user kumar 137.184.183.214 port 36088 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 23:45:17,778] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:45:17,779] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:45:17,786] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:45:17,798] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 23:45:18,504] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:45:18,504] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:45:18,518] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:45:18,538] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0319 seconds
INFO [2022-12-06 23:45:20,825] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:45:20,826] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:45:20,838] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:45:20,855] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0289 seconds
INFO [2022-12-06 23:45:36,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363136.1538978, 'message': 'Dec 6 23:45:34 hqnl0246134 sshd[266639]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 23:45:36,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363136.154184, 'message': 'Dec 6 23:45:34 hqnl0246134 sshd[266639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 23:45:38,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363138.1639924, 'message': 'Dec 6 23:45:36 hqnl0246134 sshd[266639]: Failed password for root from 61.177.173.18 port 29916 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 23:45:38,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363138.1642864, 'message': 'Dec 6 23:45:37 hqnl0246134 sshd[266639]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 23:45:40,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363140.1659489, 'message': 'Dec 6 23:45:38 hqnl0246134 sshd[266639]: Failed password for root from 61.177.173.18 port 29916 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-06 23:45:40,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363140.1661675, 'message': 'Dec 6 23:45:39 hqnl0246134 sshd[266639]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 23:45:42,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363142.1750054, 'message': 'Dec 6 23:45:41 hqnl0246134 sshd[266639]: Failed password for root from 61.177.173.18 port 29916 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 23:45:48,208] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.255.60.194', 'timestamp': 1670363148.189075, 'message': 'Dec 6 23:45:46 hqnl0246134 sshd[266648]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.255.60.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 23:45:48,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.255.60.194', 'timestamp': 1670363148.189329, 'message': 'Dec 6 23:45:46 hqnl0246134 sshd[266648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.255.60.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
WARNING [2022-12-06 23:45:49,716] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:45:49,717] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:45:50,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.255.60.194', 'timestamp': 1670363150.1951487, 'message': 'Dec 6 23:45:48 hqnl0246134 sshd[266648]: Failed password for root from 20.255.60.194 port 38300 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 23:46:02,770] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 23:46:02,839] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 23:46:02,840] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 23:46:02,840] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 23:46:02,840] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 23:46:02,841] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 23:46:02,853] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 23:46:02,873] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0317 seconds
WARNING [2022-12-06 23:46:02,882] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:46:02,885] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:46:02,909] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0420 seconds
INFO [2022-12-06 23:46:02,911] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0405 seconds
WARNING [2022-12-06 23:46:11,087] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:46:11,109] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0314 seconds
INFO [2022-12-06 23:46:12,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363172.2293034, 'message': 'Dec 6 23:46:10 hqnl0246134 sshd[266673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 23:46:14,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363174.2298453, 'message': 'Dec 6 23:46:12 hqnl0246134 sshd[266673]: Failed password for root from 165.227.166.207 port 58062 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 23:46:17,923] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:46:17,923] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:46:17,933] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:46:17,944] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 23:46:20,263] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363180.2383578, 'message': 'Dec 6 23:46:20 hqnl0246134 sshd[266682]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-06 23:46:20,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363180.2410207, 'message': 'Dec 6 23:46:20 hqnl0246134 sshd[266682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 23:46:20,715] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:46:20,716] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:46:20,724] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:46:20,736] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-06 23:46:22,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363182.2428353, 'message': 'Dec 6 23:46:21 hqnl0246134 sshd[266682]: Failed password for root from 61.177.173.18 port 47581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-06 23:46:24,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363184.2471378, 'message': 'Dec 6 23:46:22 hqnl0246134 sshd[266682]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-06 23:46:26,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363186.251948, 'message': 'Dec 6 23:46:24 hqnl0246134 sshd[266682]: Failed password for root from 61.177.173.18 port 47581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 23:46:28,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363188.2567728, 'message': 'Dec 6 23:46:26 hqnl0246134 sshd[266682]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 23:46:30,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363190.2608366, 'message': 'Dec 6 23:46:28 hqnl0246134 sshd[266682]: Failed password for root from 61.177.173.18 port 47581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 23:46:32,968] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 23:46:32,969] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 23:46:32,970] im360.plugins.client360: Waiting 2 minutes before retry...
WARNING [2022-12-06 23:46:49,734] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:46:49,735] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:47:08,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363228.3526227, 'message': 'Dec 6 23:47:06 hqnl0246134 sshd[266722]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-06 23:47:08,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363228.3545065, 'message': 'Dec 6 23:47:06 hqnl0246134 sshd[266722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 23:47:10,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363230.3565886, 'message': 'Dec 6 23:47:09 hqnl0246134 sshd[266722]: Failed password for root from 61.177.173.18 port 14343 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
WARNING [2022-12-06 23:47:11,091] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:47:11,110] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0260 seconds
INFO [2022-12-06 23:47:12,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363232.3612897, 'message': 'Dec 6 23:47:11 hqnl0246134 sshd[266722]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-06 23:47:14,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363234.367147, 'message': 'Dec 6 23:47:13 hqnl0246134 sshd[266722]: Failed password for root from 61.177.173.18 port 14343 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 23:47:16,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363236.3694818, 'message': 'Dec 6 23:47:15 hqnl0246134 sshd[266722]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 23:47:17,863] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:47:17,863] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:47:17,871] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:47:17,883] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-06 23:47:18,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363238.3715725, 'message': 'Dec 6 23:47:17 hqnl0246134 sshd[266722]: Failed password for root from 61.177.173.18 port 14343 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 23:47:20,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '81.182.248.193', 'timestamp': 1670363240.3740366, 'message': 'Dec 6 23:47:19 hqnl0246134 sshd[266725]: Invalid user user11 from 81.182.248.193 port 55734', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0403 seconds
INFO [2022-12-06 23:47:20,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '81.182.248.193', 'timestamp': 1670363240.3744779, 'message': 'Dec 6 23:47:20 hqnl0246134 sshd[266725]: pam_imunify(sshd:auth): [IM360_RBL] The IP 81.182.248.193 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-06 23:47:20,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '81.182.248.193', 'timestamp': 1670363240.3770084, 'message': 'Dec 6 23:47:20 hqnl0246134 sshd[266725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.182.248.193 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-06 23:47:20,668] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:47:20,669] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-06 23:47:20,872] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:47:20,873] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:47:20,919] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:47:20,921] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:47:21,204] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.5272 seconds
INFO [2022-12-06 23:47:21,205] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.3232 seconds
INFO [2022-12-06 23:47:22,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '81.182.248.193', 'timestamp': 1670363242.3811252, 'message': 'Dec 6 23:47:21 hqnl0246134 sshd[266725]: Failed password for invalid user user11 from 81.182.248.193 port 55734 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 23:47:22,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '81.182.248.193', 'timestamp': 1670363242.381434, 'message': 'Dec 6 23:47:22 hqnl0246134 sshd[266725]: Disconnected from invalid user user11 81.182.248.193 port 55734 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0164 seconds
WARNING [2022-12-06 23:47:49,738] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:47:49,739] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:47:54,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363274.459672, 'message': 'Dec 6 23:47:53 hqnl0246134 sshd[266764]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 23:47:54,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363274.4601097, 'message': 'Dec 6 23:47:53 hqnl0246134 sshd[266764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:47:56,490] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363276.4628468, 'message': 'Dec 6 23:47:55 hqnl0246134 sshd[266764]: Failed password for root from 61.177.173.18 port 30354 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-06 23:47:58,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363278.4641702, 'message': 'Dec 6 23:47:57 hqnl0246134 sshd[266767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-06 23:47:58,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363278.4643843, 'message': 'Dec 6 23:47:57 hqnl0246134 sshd[266764]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 23:48:00,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363280.4666214, 'message': 'Dec 6 23:47:59 hqnl0246134 sshd[266767]: Failed password for root from 165.227.166.207 port 40160 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-06 23:48:00,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363280.466844, 'message': 'Dec 6 23:47:59 hqnl0246134 sshd[266764]: Failed password for root from 61.177.173.18 port 30354 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 23:48:00,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363280.4677086, 'message': 'Dec 6 23:48:00 hqnl0246134 sshd[266764]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-06 23:48:02,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363282.472464, 'message': 'Dec 6 23:48:02 hqnl0246134 sshd[266764]: Failed password for root from 61.177.173.18 port 30354 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0354 seconds
WARNING [2022-12-06 23:48:11,099] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:48:11,120] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0280 seconds
INFO [2022-12-06 23:48:17,907] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:48:17,907] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:48:17,917] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:48:17,935] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0259 seconds
INFO [2022-12-06 23:48:21,446] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:48:21,447] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:48:21,455] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:48:21,468] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-06 23:48:42,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363322.5583303, 'message': 'Dec 6 23:48:41 hqnl0246134 sshd[266827]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-06 23:48:42,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363322.5587904, 'message': 'Dec 6 23:48:41 hqnl0246134 sshd[266827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-06 23:48:44,592] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363324.5605125, 'message': 'Dec 6 23:48:43 hqnl0246134 sshd[266827]: Failed password for root from 61.177.173.18 port 54673 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-06 23:48:46,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363326.563015, 'message': 'Dec 6 23:48:45 hqnl0246134 sshd[266827]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-06 23:48:48,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363328.5657032, 'message': 'Dec 6 23:48:47 hqnl0246134 sshd[266827]: Failed password for root from 61.177.173.18 port 54673 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 23:48:48,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363328.5659153, 'message': 'Dec 6 23:48:47 hqnl0246134 sshd[266827]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-06 23:48:49,741] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:48:49,742] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:48:50,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363330.5688283, 'message': 'Dec 6 23:48:50 hqnl0246134 sshd[266827]: Failed password for root from 61.177.173.18 port 54673 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-06 23:48:54,754] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:48:54,755] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:48:54,763] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:48:54,775] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
WARNING [2022-12-06 23:49:11,103] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:49:11,121] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0252 seconds
INFO [2022-12-06 23:49:17,806] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:49:17,807] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:49:17,813] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:49:17,824] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0163 seconds
INFO [2022-12-06 23:49:20,535] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:49:20,535] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:49:20,544] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:49:20,558] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0211 seconds
INFO [2022-12-06 23:49:28,240] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 23:49:28,308] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 23:49:28,309] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 23:49:28,309] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 23:49:28,309] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 23:49:28,309] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 23:49:28,320] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 23:49:28,342] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0316 seconds
WARNING [2022-12-06 23:49:28,351] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:49:28,353] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:49:28,372] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0399 seconds
INFO [2022-12-06 23:49:28,373] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0357 seconds
INFO [2022-12-06 23:49:28,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363368.6388252, 'message': 'Dec 6 23:49:27 hqnl0246134 sshd[266870]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-06 23:49:28,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363368.6390529, 'message': 'Dec 6 23:49:27 hqnl0246134 sshd[266870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-06 23:49:30,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363370.6399143, 'message': 'Dec 6 23:49:29 hqnl0246134 sshd[266870]: Failed password for root from 61.177.173.18 port 64238 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:49:32,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363372.6473792, 'message': 'Dec 6 23:49:31 hqnl0246134 sshd[266870]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 23:49:34,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363374.6508677, 'message': 'Dec 6 23:49:33 hqnl0246134 sshd[266870]: Failed password for root from 61.177.173.18 port 64238 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-06 23:49:34,693] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363374.651105, 'message': 'Dec 6 23:49:33 hqnl0246134 sshd[266870]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-06 23:49:36,688] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363376.6600175, 'message': 'Dec 6 23:49:35 hqnl0246134 sshd[266870]: Failed password for root from 61.177.173.18 port 64238 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
WARNING [2022-12-06 23:49:49,747] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:49:49,747] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:49:50,724] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363390.6962006, 'message': 'Dec 6 23:49:49 hqnl0246134 sshd[266875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-06 23:49:52,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363392.6990826, 'message': 'Dec 6 23:49:51 hqnl0246134 sshd[266875]: Failed password for root from 165.227.166.207 port 50400 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 23:49:55,705] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:49:55,705] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:49:55,712] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:49:55,724] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-06 23:49:58,439] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 23:49:58,440] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 23:49:58,441] im360.plugins.client360: Waiting 7 minutes before retry...
WARNING [2022-12-06 23:50:11,114] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:50:11,140] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0338 seconds
INFO [2022-12-06 23:50:14,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363414.7180643, 'message': 'Dec 6 23:50:14 hqnl0246134 sshd[266918]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:50:14,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363414.7182832, 'message': 'Dec 6 23:50:14 hqnl0246134 sshd[266918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-06 23:50:16,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363416.719916, 'message': 'Dec 6 23:50:15 hqnl0246134 sshd[266918]: Failed password for root from 61.177.173.18 port 33646 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-06 23:50:16,758] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363416.7200885, 'message': 'Dec 6 23:50:16 hqnl0246134 sshd[266918]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-06 23:50:18,073] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:50:18,073] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:50:18,080] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:50:18,092] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-06 23:50:18,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363418.7220628, 'message': 'Dec 6 23:50:17 hqnl0246134 sshd[266918]: Failed password for root from 61.177.173.18 port 33646 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-06 23:50:18,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363418.7222645, 'message': 'Dec 6 23:50:18 hqnl0246134 sshd[266918]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0395 seconds
INFO [2022-12-06 23:50:20,741] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:50:20,742] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:50:20,750] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:50:20,764] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 23:50:22,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363422.7301345, 'message': 'Dec 6 23:50:20 hqnl0246134 sshd[266918]: Failed password for root from 61.177.173.18 port 33646 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-06 23:50:49,752] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:50:49,753] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:51:02,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363462.7964225, 'message': 'Dec 6 23:51:02 hqnl0246134 sshd[266955]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-06 23:51:02,849] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363462.7970872, 'message': 'Dec 6 23:51:02 hqnl0246134 sshd[266955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-06 23:51:04,819] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363464.7989485, 'message': 'Dec 6 23:51:03 hqnl0246134 sshd[266955]: Failed password for root from 61.177.173.18 port 60291 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 23:51:04,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363464.7992406, 'message': 'Dec 6 23:51:04 hqnl0246134 sshd[266955]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 23:51:06,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363466.8043923, 'message': 'Dec 6 23:51:06 hqnl0246134 sshd[266955]: Failed password for root from 61.177.173.18 port 60291 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:51:06,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363466.8047097, 'message': 'Dec 6 23:51:06 hqnl0246134 sshd[266955]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-06 23:51:10,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363470.8140538, 'message': 'Dec 6 23:51:08 hqnl0246134 sshd[266955]: Failed password for root from 61.177.173.18 port 60291 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
WARNING [2022-12-06 23:51:11,117] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:51:11,138] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0286 seconds
INFO [2022-12-06 23:51:17,845] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:51:17,846] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:51:17,854] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:51:17,866] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 23:51:22,513] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:51:22,514] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:51:22,524] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:51:22,539] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0226 seconds
INFO [2022-12-06 23:51:36,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363496.8487945, 'message': 'Dec 6 23:51:35 hqnl0246134 sshd[266986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 23:51:38,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363498.850326, 'message': 'Dec 6 23:51:37 hqnl0246134 sshd[266986]: Failed password for root from 165.227.166.207 port 60692 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-06 23:51:40,119] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-06 23:51:40,122] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-06 23:51:41,125] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-06 23:51:42,561] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:51:42,561] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:51:42,571] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:51:42,584] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-06 23:51:48,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363508.859377, 'message': 'Dec 6 23:51:47 hqnl0246134 sshd[267005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:51:48,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363508.8596714, 'message': 'Dec 6 23:51:47 hqnl0246134 sshd[267005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
WARNING [2022-12-06 23:51:49,757] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:51:49,757] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:51:51,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363510.8986156, 'message': 'Dec 6 23:51:49 hqnl0246134 sshd[267005]: Failed password for root from 61.177.173.18 port 16693 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.1227 seconds
INFO [2022-12-06 23:51:51,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363510.898974, 'message': 'Dec 6 23:51:49 hqnl0246134 sshd[267005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-06 23:51:52,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363512.8625503, 'message': 'Dec 6 23:51:51 hqnl0246134 sshd[267005]: Failed password for root from 61.177.173.18 port 16693 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0674 seconds
WARNING [2022-12-06 23:51:54,067] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-06 23:51:54,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363514.8639705, 'message': 'Dec 6 23:51:53 hqnl0246134 sshd[267005]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:51:56,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363516.8665752, 'message': 'Dec 6 23:51:55 hqnl0246134 sshd[267005]: Failed password for root from 61.177.173.18 port 16693 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0336 seconds
WARNING [2022-12-06 23:52:11,134] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:52:11,165] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0490 seconds
INFO [2022-12-06 23:52:17,981] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:52:17,982] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:52:17,991] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:52:18,004] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-06 23:52:20,545] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:52:20,545] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:52:20,552] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:52:20,563] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-06 23:52:34,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363554.9131455, 'message': 'Dec 6 23:52:33 hqnl0246134 sshd[267083]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-06 23:52:34,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363554.9137244, 'message': 'Dec 6 23:52:33 hqnl0246134 sshd[267083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 23:52:36,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363556.9170232, 'message': 'Dec 6 23:52:35 hqnl0246134 sshd[267083]: Failed password for root from 61.177.173.18 port 37530 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-06 23:52:36,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363556.9172275, 'message': 'Dec 6 23:52:35 hqnl0246134 sshd[267083]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-06 23:52:38,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363558.9262424, 'message': 'Dec 6 23:52:37 hqnl0246134 sshd[267083]: Failed password for root from 61.177.173.18 port 37530 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 23:52:38,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363558.926415, 'message': 'Dec 6 23:52:38 hqnl0246134 sshd[267083]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-06 23:52:40,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363560.932657, 'message': 'Dec 6 23:52:39 hqnl0246134 sshd[267083]: Failed password for root from 61.177.173.18 port 37530 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
WARNING [2022-12-06 23:52:49,761] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:52:49,761] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:53:09,018] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '191.17.116.8', 'timestamp': 1670363588.9977791, 'message': 'Dec 6 23:53:07 hqnl0246134 sshd[267095]: pam_imunify(sshd:auth): [IM360_RBL] The IP 191.17.116.8 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-06 23:53:09,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '191.17.116.8', 'timestamp': 1670363589.0049365, 'message': 'Dec 6 23:53:07 hqnl0246134 sshd[267095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.17.116.8 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-06 23:53:11,016] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '191.17.116.8', 'timestamp': 1670363590.9978614, 'message': 'Dec 6 23:53:10 hqnl0246134 sshd[267095]: Failed password for root from 191.17.116.8 port 36822 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-06 23:53:11,126] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:53:11,146] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0267 seconds
INFO [2022-12-06 23:53:14,776] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:53:14,777] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:53:14,789] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:53:14,800] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0224 seconds
INFO [2022-12-06 23:53:17,773] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:53:17,774] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:53:17,787] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:53:17,808] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0324 seconds
INFO [2022-12-06 23:53:20,417] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:53:20,418] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:53:20,428] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:53:20,441] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-06 23:53:21,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363601.0166147, 'message': 'Dec 6 23:53:20 hqnl0246134 sshd[267120]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 23:53:21,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363601.0168428, 'message': 'Dec 6 23:53:20 hqnl0246134 sshd[267120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 23:53:23,060] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363603.0211785, 'message': 'Dec 6 23:53:21 hqnl0246134 sshd[267125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-06 23:53:23,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363603.0218265, 'message': 'Dec 6 23:53:21 hqnl0246134 sshd[267120]: Failed password for root from 61.177.173.18 port 61263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-06 23:53:23,082] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363603.0220225, 'message': 'Dec 6 23:53:22 hqnl0246134 sshd[267120]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-06 23:53:25,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363605.021563, 'message': 'Dec 6 23:53:23 hqnl0246134 sshd[267125]: Failed password for root from 165.227.166.207 port 42748 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-06 23:53:27,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363607.0244498, 'message': 'Dec 6 23:53:25 hqnl0246134 sshd[267120]: Failed password for root from 61.177.173.18 port 61263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-06 23:53:29,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363609.0260248, 'message': 'Dec 6 23:53:27 hqnl0246134 sshd[267120]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0522 seconds
INFO [2022-12-06 23:53:29,128] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363609.0262637, 'message': 'Dec 6 23:53:28 hqnl0246134 sshd[267120]: Failed password for root from 61.177.173.18 port 61263 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0490 seconds
WARNING [2022-12-06 23:53:49,765] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:53:49,766] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:54:07,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363647.1009684, 'message': 'Dec 6 23:54:06 hqnl0246134 sshd[267159]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1099 seconds
INFO [2022-12-06 23:54:07,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363647.1016107, 'message': 'Dec 6 23:54:06 hqnl0246134 sshd[267159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0792 seconds
INFO [2022-12-06 23:54:09,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363649.1017969, 'message': 'Dec 6 23:54:08 hqnl0246134 sshd[267159]: Failed password for root from 61.177.173.18 port 15611 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
WARNING [2022-12-06 23:54:11,131] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:54:11,133] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363651.1069899, 'message': 'Dec 6 23:54:10 hqnl0246134 sshd[267159]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-06 23:54:11,152] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0312 seconds
INFO [2022-12-06 23:54:13,129] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363653.1099858, 'message': 'Dec 6 23:54:12 hqnl0246134 sshd[267159]: Failed password for root from 61.177.173.18 port 15611 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-06 23:54:15,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363655.113388, 'message': 'Dec 6 23:54:13 hqnl0246134 sshd[267159]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 23:54:17,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363657.1169746, 'message': 'Dec 6 23:54:15 hqnl0246134 sshd[267159]: Failed password for root from 61.177.173.18 port 15611 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 23:54:17,849] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:54:17,849] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:54:17,858] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:54:17,871] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-06 23:54:20,634] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:54:20,634] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:54:20,642] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:54:20,662] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0264 seconds
WARNING [2022-12-06 23:54:49,770] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:54:49,773] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:54:55,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363695.2063472, 'message': 'Dec 6 23:54:54 hqnl0246134 sshd[267201]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-06 23:54:55,256] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363695.2071428, 'message': 'Dec 6 23:54:54 hqnl0246134 sshd[267201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-06 23:54:57,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363697.2076566, 'message': 'Dec 6 23:54:57 hqnl0246134 sshd[267201]: Failed password for root from 61.177.173.18 port 41052 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-06 23:54:59,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363699.2107267, 'message': 'Dec 6 23:54:57 hqnl0246134 sshd[267201]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:54:59,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363699.2109375, 'message': 'Dec 6 23:54:59 hqnl0246134 sshd[267201]: Failed password for root from 61.177.173.18 port 41052 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-06 23:55:01,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363701.2136345, 'message': 'Dec 6 23:54:59 hqnl0246134 sshd[267201]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 23:55:03,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363703.217535, 'message': 'Dec 6 23:55:01 hqnl0246134 sshd[267201]: Failed password for root from 61.177.173.18 port 41052 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-06 23:55:05,500] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:55:05,500] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:55:05,508] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:55:05,520] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-06 23:55:07,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363707.2280483, 'message': 'Dec 6 23:55:06 hqnl0246134 sshd[267251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-06 23:55:09,277] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363709.232748, 'message': 'Dec 6 23:55:08 hqnl0246134 sshd[267251]: Failed password for root from 165.227.166.207 port 53046 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0437 seconds
WARNING [2022-12-06 23:55:11,135] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:55:11,156] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0289 seconds
INFO [2022-12-06 23:55:17,881] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:55:17,881] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:55:17,889] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:55:17,901] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 23:55:20,682] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:55:20,683] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:55:20,689] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:55:20,701] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-06 23:55:43,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363743.3034058, 'message': 'Dec 6 23:55:42 hqnl0246134 sshd[267289]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 23:55:43,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363743.3045392, 'message': 'Dec 6 23:55:42 hqnl0246134 sshd[267289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-06 23:55:45,324] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363745.3062594, 'message': 'Dec 6 23:55:44 hqnl0246134 sshd[267289]: Failed password for root from 61.177.173.18 port 61165 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 23:55:47,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363747.3092327, 'message': 'Dec 6 23:55:46 hqnl0246134 sshd[267289]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 23:55:49,344] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363749.317305, 'message': 'Dec 6 23:55:48 hqnl0246134 sshd[267289]: Failed password for root from 61.177.173.18 port 61165 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-06 23:55:49,361] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363749.3175988, 'message': 'Dec 6 23:55:48 hqnl0246134 sshd[267289]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-06 23:55:49,778] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:55:49,779] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:55:53,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363753.3267407, 'message': 'Dec 6 23:55:51 hqnl0246134 sshd[267289]: Failed password for root from 61.177.173.18 port 61165 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0452 seconds
WARNING [2022-12-06 23:56:11,138] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:56:11,157] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0280 seconds
INFO [2022-12-06 23:56:17,820] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:56:17,820] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:56:17,830] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:56:17,843] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-06 23:56:20,738] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:56:20,739] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:56:20,747] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:56:20,758] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-06 23:56:29,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363789.3756928, 'message': 'Dec 6 23:56:28 hqnl0246134 sshd[267330]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-06 23:56:29,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '81.182.248.193', 'timestamp': 1670363789.3764002, 'message': 'Dec 6 23:56:29 hqnl0246134 sshd[267316]: pam_imunify(sshd:auth): [IM360_RBL] The IP 81.182.248.193 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-06 23:56:29,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363789.3761637, 'message': 'Dec 6 23:56:28 hqnl0246134 sshd[267330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-06 23:56:29,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '81.182.248.193', 'timestamp': 1670363789.376555, 'message': 'Dec 6 23:56:29 hqnl0246134 sshd[267316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.182.248.193 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-06 23:56:31,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363791.3775198, 'message': 'Dec 6 23:56:30 hqnl0246134 sshd[267330]: Failed password for root from 61.177.173.18 port 16481 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-06 23:56:31,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '81.182.248.193', 'timestamp': 1670363791.3780496, 'message': 'Dec 6 23:56:31 hqnl0246134 sshd[267316]: Failed password for root from 81.182.248.193 port 45056 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-06 23:56:31,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363791.377848, 'message': 'Dec 6 23:56:31 hqnl0246134 sshd[267330]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-06 23:56:33,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363793.3795176, 'message': 'Dec 6 23:56:33 hqnl0246134 sshd[267330]: Failed password for root from 61.177.173.18 port 16481 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:56:33,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363793.3797345, 'message': 'Dec 6 23:56:33 hqnl0246134 sshd[267330]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 23:56:33,938] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:56:33,939] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:56:33,948] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:56:33,969] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0289 seconds
INFO [2022-12-06 23:56:35,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363795.3824446, 'message': 'Dec 6 23:56:34 hqnl0246134 sshd[267330]: Failed password for root from 61.177.173.18 port 16481 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
WARNING [2022-12-06 23:56:49,782] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:56:49,783] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:56:53,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363813.4167593, 'message': 'Dec 6 23:56:52 hqnl0246134 sshd[267338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-06 23:56:55,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363815.4191263, 'message': 'Dec 6 23:56:53 hqnl0246134 sshd[267338]: Failed password for root from 165.227.166.207 port 35034 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-06 23:57:11,143] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:57:11,167] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0342 seconds
INFO [2022-12-06 23:57:12,290] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-06 23:57:12,357] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-06 23:57:12,358] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-06 23:57:12,358] im360.plugins.client360: await _sink_future...
INFO [2022-12-06 23:57:12,358] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-06 23:57:12,359] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-06 23:57:12,368] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-06 23:57:12,384] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0253 seconds
WARNING [2022-12-06 23:57:12,391] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-06 23:57:12,394] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:57:12,411] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0327 seconds
INFO [2022-12-06 23:57:12,414] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0316 seconds
INFO [2022-12-06 23:57:17,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363837.4582722, 'message': 'Dec 6 23:57:16 hqnl0246134 sshd[267364]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-06 23:57:17,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363837.4585295, 'message': 'Dec 6 23:57:16 hqnl0246134 sshd[267364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-06 23:57:17,821] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:57:17,822] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:57:17,829] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:57:17,840] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 23:57:19,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363839.4604092, 'message': 'Dec 6 23:57:17 hqnl0246134 sshd[267364]: Failed password for root from 61.177.173.18 port 42016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:57:19,496] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363839.4606352, 'message': 'Dec 6 23:57:18 hqnl0246134 sshd[267364]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-06 23:57:20,531] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:57:20,532] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:57:20,539] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:57:20,550] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-06 23:57:21,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363841.4654925, 'message': 'Dec 6 23:57:20 hqnl0246134 sshd[267364]: Failed password for root from 61.177.173.18 port 42016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-06 23:57:21,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363841.4658055, 'message': 'Dec 6 23:57:20 hqnl0246134 sshd[267364]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-06 23:57:23,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363843.4692738, 'message': 'Dec 6 23:57:22 hqnl0246134 sshd[267364]: Failed password for root from 61.177.173.18 port 42016 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-06 23:57:48,213] im360.plugins.client360: Server connection closed
WARNING [2022-12-06 23:57:48,214] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-06 23:57:48,215] im360.plugins.client360: Waiting 2 minutes before retry...
WARNING [2022-12-06 23:57:49,787] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:57:49,788] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:58:01,552] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363881.527045, 'message': 'Dec 6 23:58:00 hqnl0246134 sshd[267405]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-06 23:58:01,571] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363881.527682, 'message': 'Dec 6 23:58:00 hqnl0246134 sshd[267405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-06 23:58:03,549] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363883.5309274, 'message': 'Dec 6 23:58:02 hqnl0246134 sshd[267405]: Failed password for root from 61.177.173.18 port 54499 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-06 23:58:03,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363883.5311198, 'message': 'Dec 6 23:58:03 hqnl0246134 sshd[267405]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-06 23:58:05,554] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363885.5346801, 'message': 'Dec 6 23:58:04 hqnl0246134 sshd[267405]: Failed password for root from 61.177.173.18 port 54499 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-06 23:58:05,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363885.5348508, 'message': 'Dec 6 23:58:05 hqnl0246134 sshd[267405]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-06 23:58:07,561] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363887.543338, 'message': 'Dec 6 23:58:06 hqnl0246134 sshd[267405]: Failed password for root from 61.177.173.18 port 54499 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-06 23:58:10,090] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:58:10,091] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:58:10,100] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:58:10,112] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
WARNING [2022-12-06 23:58:11,146] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:58:11,165] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0258 seconds
INFO [2022-12-06 23:58:15,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670363895.568609, 'message': 'Dec 6 23:58:14 hqnl0246134 sshd[267426]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-06 23:58:15,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670363895.5691073, 'message': 'Dec 6 23:58:14 hqnl0246134 sshd[267426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-06 23:58:17,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '152.89.196.220', 'timestamp': 1670363897.5698166, 'message': 'Dec 6 23:58:16 hqnl0246134 sshd[267426]: Failed password for root from 152.89.196.220 port 60522 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-06 23:58:17,836] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:58:17,836] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:58:17,847] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:58:17,864] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0272 seconds
INFO [2022-12-06 23:58:20,469] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:58:20,469] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:58:20,477] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:58:20,488] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-06 23:58:39,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363919.6172442, 'message': 'Dec 6 23:58:38 hqnl0246134 sshd[267452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-06 23:58:41,637] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670363921.6179953, 'message': 'Dec 6 23:58:39 hqnl0246134 sshd[267452]: Failed password for root from 165.227.166.207 port 45392 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:58:47,644] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363927.6265757, 'message': 'Dec 6 23:58:47 hqnl0246134 sshd[267455]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:58:47,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363927.6267776, 'message': 'Dec 6 23:58:47 hqnl0246134 sshd[267455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-06 23:58:49,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363929.6320279, 'message': 'Dec 6 23:58:49 hqnl0246134 sshd[267455]: Failed password for root from 61.177.173.18 port 22575 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
WARNING [2022-12-06 23:58:49,791] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:58:49,792] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-06 23:58:51,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363931.6331663, 'message': 'Dec 6 23:58:49 hqnl0246134 sshd[267455]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-06 23:58:53,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363933.64036, 'message': 'Dec 6 23:58:52 hqnl0246134 sshd[267455]: Failed password for root from 61.177.173.18 port 22575 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-06 23:58:55,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363935.6480744, 'message': 'Dec 6 23:58:54 hqnl0246134 sshd[267455]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-06 23:58:57,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363937.651075, 'message': 'Dec 6 23:58:56 hqnl0246134 sshd[267455]: Failed password for root from 61.177.173.18 port 22575 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-06 23:59:11,149] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:59:11,173] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0310 seconds
INFO [2022-12-06 23:59:17,880] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:59:17,880] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:59:17,888] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:59:17,900] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-06 23:59:20,619] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:59:20,619] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:59:20,627] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:59:20,640] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-06 23:59:22,943] defence360agent.files: Updating all files
INFO [2022-12-06 23:59:23,266] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-06 23:59:23,266] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-06 23:59:23,610] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-06 23:59:23,610] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-06 23:59:23,878] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-06 23:59:23,878] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-06 23:59:24,208] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-06 23:59:24,208] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-06 23:59:24,208] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-06 23:59:24,518] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 21:59:24 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E532CFCE1DDE9'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-06 23:59:24,520] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-06 23:59:24,521] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-06 23:59:25,090] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-06 23:59:25,090] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-06 23:59:25,342] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-06 23:59:25,343] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-06 23:59:25,657] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-06 23:59:25,657] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-06 23:59:26,050] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-06 23:59:26,051] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-06 23:59:26,486] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-06 23:59:26,488] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-06 23:59:33,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363973.742527, 'message': 'Dec 6 23:59:33 hqnl0246134 sshd[267517]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-06 23:59:33,786] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363973.7429419, 'message': 'Dec 6 23:59:33 hqnl0246134 sshd[267517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-06 23:59:35,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363975.744233, 'message': 'Dec 6 23:59:35 hqnl0246134 sshd[267517]: Failed password for root from 61.177.173.18 port 42744 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-06 23:59:37,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363977.7456746, 'message': 'Dec 6 23:59:35 hqnl0246134 sshd[267517]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-06 23:59:39,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363979.753677, 'message': 'Dec 6 23:59:38 hqnl0246134 sshd[267517]: Failed password for root from 61.177.173.18 port 42744 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-06 23:59:41,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363981.7578506, 'message': 'Dec 6 23:59:40 hqnl0246134 sshd[267517]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-06 23:59:43,792] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670363983.7737622, 'message': 'Dec 6 23:59:42 hqnl0246134 sshd[267517]: Failed password for root from 61.177.173.18 port 42744 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-06 23:59:44,996] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-06 23:59:44,997] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-06 23:59:45,008] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-06 23:59:45,032] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0324 seconds
WARNING [2022-12-06 23:59:49,794] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-06 23:59:49,795] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 00:00:11,156] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:00:11,209] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0640 seconds
INFO [2022-12-07 00:00:18,787] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:00:18,788] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:00:18,819] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:00:18,863] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0653 seconds
INFO [2022-12-07 00:00:21,978] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:00:21,979] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:00:22,004] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:00:22,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364021.8391807, 'message': 'Dec 7 00:00:20 hqnl0246134 sshd[267774]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1736 seconds
INFO [2022-12-07 00:00:22,031] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0456 seconds
INFO [2022-12-07 00:00:22,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364021.8396904, 'message': 'Dec 7 00:00:20 hqnl0246134 sshd[267774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-07 00:00:23,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364023.8401756, 'message': 'Dec 7 00:00:22 hqnl0246134 sshd[267774]: Failed password for root from 61.177.173.18 port 62157 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 00:00:25,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364025.8422492, 'message': 'Dec 7 00:00:24 hqnl0246134 sshd[267774]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 00:00:27,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364027.8453856, 'message': 'Dec 7 00:00:26 hqnl0246134 sshd[267810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0434 seconds
INFO [2022-12-07 00:00:27,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364027.845869, 'message': 'Dec 7 00:00:26 hqnl0246134 sshd[267774]: Failed password for root from 61.177.173.18 port 62157 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0436 seconds
INFO [2022-12-07 00:00:27,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364027.8461912, 'message': 'Dec 7 00:00:26 hqnl0246134 sshd[267774]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 00:00:29,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364029.848008, 'message': 'Dec 7 00:00:28 hqnl0246134 sshd[267810]: Failed password for root from 165.227.166.207 port 55672 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 00:00:29,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364029.848319, 'message': 'Dec 7 00:00:28 hqnl0246134 sshd[267774]: Failed password for root from 61.177.173.18 port 62157 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-07 00:00:40,783] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 00:00:40,858] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 00:00:40,859] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 00:00:40,859] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 00:00:40,859] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 00:00:40,860] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 00:00:40,870] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 00:00:40,890] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0296 seconds
WARNING [2022-12-07 00:00:40,898] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 00:00:40,901] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:00:40,918] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0360 seconds
INFO [2022-12-07 00:00:40,920] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0323 seconds
WARNING [2022-12-07 00:00:49,799] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:00:49,799] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:00:53,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '191.17.116.8', 'timestamp': 1670364053.8794081, 'message': 'Dec 7 00:00:52 hqnl0246134 sshd[267836]: Invalid user ts3srv from 191.17.116.8 port 54171', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-07 00:00:53,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '191.17.116.8', 'timestamp': 1670364053.8797684, 'message': 'Dec 7 00:00:52 hqnl0246134 sshd[267836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.17.116.8 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 00:00:55,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '191.17.116.8', 'timestamp': 1670364055.88277, 'message': 'Dec 7 00:00:54 hqnl0246134 sshd[267836]: Failed password for invalid user ts3srv from 191.17.116.8 port 54171 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-07 00:00:55,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '191.17.116.8', 'timestamp': 1670364055.882992, 'message': 'Dec 7 00:00:55 hqnl0246134 sshd[267836]: Disconnected from invalid user ts3srv 191.17.116.8 port 54171 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:00:59,755] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:00:59,756] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:00:59,764] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:00:59,776] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-07 00:01:09,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364069.9020908, 'message': 'Dec 7 00:01:08 hqnl0246134 sshd[267878]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-07 00:01:09,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364069.9024296, 'message': 'Dec 7 00:01:08 hqnl0246134 sshd[267878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0292 seconds
WARNING [2022-12-07 00:01:11,162] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:01:11,189] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0368 seconds
INFO [2022-12-07 00:01:11,577] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 00:01:11,578] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 00:01:11,579] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-07 00:01:11,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364071.9030483, 'message': 'Dec 7 00:01:10 hqnl0246134 sshd[267878]: Failed password for root from 61.177.173.18 port 30873 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-07 00:01:11,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364071.9032285, 'message': 'Dec 7 00:01:10 hqnl0246134 sshd[267878]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 00:01:13,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364073.9066532, 'message': 'Dec 7 00:01:12 hqnl0246134 sshd[267878]: Failed password for root from 61.177.173.18 port 30873 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-07 00:01:15,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364075.9091952, 'message': 'Dec 7 00:01:14 hqnl0246134 sshd[267878]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 00:01:17,918] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:01:17,919] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:01:17,931] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:01:17,950] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0299 seconds
INFO [2022-12-07 00:01:17,950] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364077.920734, 'message': 'Dec 7 00:01:16 hqnl0246134 sshd[267878]: Failed password for root from 61.177.173.18 port 30873 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-07 00:01:21,076] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:01:21,076] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:01:21,084] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:01:21,095] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-07 00:01:27,958] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.240.206.206', 'timestamp': 1670364087.9343178, 'message': 'Dec 7 00:01:27 hqnl0246134 sshd[267903]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.240.206.206 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-07 00:01:27,977] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.240.206.206', 'timestamp': 1670364087.93474, 'message': 'Dec 7 00:01:27 hqnl0246134 sshd[267903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.240.206.206 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 00:01:29,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '115.240.206.206', 'timestamp': 1670364089.9398835, 'message': 'Dec 7 00:01:29 hqnl0246134 sshd[267903]: Failed password for root from 115.240.206.206 port 16417 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-07 00:01:41,995] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.218.109.19', 'timestamp': 1670364101.973871, 'message': 'Dec 7 00:01:41 hqnl0246134 sshd[267909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.218.109.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 00:01:44,005] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.218.109.19', 'timestamp': 1670364103.9805539, 'message': 'Dec 7 00:01:43 hqnl0246134 sshd[267909]: Failed password for root from 20.218.109.19 port 38048 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0238 seconds
WARNING [2022-12-07 00:01:49,803] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:01:49,803] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 00:01:54,070] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-07 00:01:56,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364116.0067692, 'message': 'Dec 7 00:01:54 hqnl0246134 sshd[267924]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-07 00:01:56,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364116.007196, 'message': 'Dec 7 00:01:54 hqnl0246134 sshd[267924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 00:01:58,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364118.0084116, 'message': 'Dec 7 00:01:56 hqnl0246134 sshd[267924]: Failed password for root from 61.177.173.18 port 42214 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 00:02:00,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364120.011728, 'message': 'Dec 7 00:01:58 hqnl0246134 sshd[267924]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-07 00:02:02,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364122.0139773, 'message': 'Dec 7 00:02:00 hqnl0246134 sshd[267924]: Failed password for root from 61.177.173.18 port 42214 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-07 00:02:02,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364122.0145092, 'message': 'Dec 7 00:02:01 hqnl0246134 sshd[267924]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 00:02:04,134] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364124.1154556, 'message': 'Dec 7 00:02:03 hqnl0246134 sshd[267924]: Failed password for root from 61.177.173.18 port 42214 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-07 00:02:11,171] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:02:11,208] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0508 seconds
INFO [2022-12-07 00:02:14,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364134.0381112, 'message': 'Dec 7 00:02:13 hqnl0246134 sshd[267947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 00:02:18,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364138.0408907, 'message': 'Dec 7 00:02:16 hqnl0246134 sshd[267947]: Failed password for root from 165.227.166.207 port 37742 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:02:19,838] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:02:19,839] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:02:19,846] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:02:19,858] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 00:02:20,203] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:02:20,203] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:02:20,210] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:02:20,221] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-07 00:02:22,544] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:02:22,544] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:02:22,551] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:02:22,562] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-07 00:02:44,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364164.1047509, 'message': 'Dec 7 00:02:42 hqnl0246134 sshd[267975]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 00:02:44,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364164.1051025, 'message': 'Dec 7 00:02:42 hqnl0246134 sshd[267975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 00:02:46,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364166.108792, 'message': 'Dec 7 00:02:44 hqnl0246134 sshd[267975]: Failed password for root from 61.177.173.18 port 64595 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-07 00:02:48,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364168.110852, 'message': 'Dec 7 00:02:46 hqnl0246134 sshd[267979]: Invalid user zhang from 43.153.30.50 port 36332', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0537 seconds
INFO [2022-12-07 00:02:48,167] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364168.1113102, 'message': 'Dec 7 00:02:46 hqnl0246134 sshd[267975]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0539 seconds
INFO [2022-12-07 00:02:48,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364168.1115582, 'message': 'Dec 7 00:02:46 hqnl0246134 sshd[267979]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.30.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-07 00:02:48,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364168.111753, 'message': 'Dec 7 00:02:46 hqnl0246134 sshd[267979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.30.50 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-07 00:02:49,806] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:02:49,807] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:02:50,153] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364170.1167672, 'message': 'Dec 7 00:02:48 hqnl0246134 sshd[267975]: Failed password for root from 61.177.173.18 port 64595 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-07 00:02:50,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364170.1171172, 'message': 'Dec 7 00:02:48 hqnl0246134 sshd[267979]: Failed password for invalid user zhang from 43.153.30.50 port 36332 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-07 00:02:50,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364170.117321, 'message': 'Dec 7 00:02:48 hqnl0246134 sshd[267975]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 00:02:52,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364172.117953, 'message': 'Dec 7 00:02:50 hqnl0246134 sshd[267979]: Disconnected from invalid user zhang 43.153.30.50 port 36332 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-07 00:02:52,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364172.1181908, 'message': 'Dec 7 00:02:51 hqnl0246134 sshd[267975]: Failed password for root from 61.177.173.18 port 64595 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
WARNING [2022-12-07 00:03:11,175] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:03:11,202] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0371 seconds
INFO [2022-12-07 00:03:18,226] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:03:18,226] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:03:18,234] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:03:18,246] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-07 00:03:21,101] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:03:21,102] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:03:21,114] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:03:21,136] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0326 seconds
INFO [2022-12-07 00:03:30,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364210.187932, 'message': 'Dec 7 00:03:29 hqnl0246134 sshd[268045]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 00:03:30,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364210.188365, 'message': 'Dec 7 00:03:29 hqnl0246134 sshd[268045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-07 00:03:32,209] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364212.1897423, 'message': 'Dec 7 00:03:31 hqnl0246134 sshd[268045]: Failed password for root from 61.177.173.18 port 34845 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 00:03:32,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364212.189916, 'message': 'Dec 7 00:03:32 hqnl0246134 sshd[268045]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 00:03:34,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364214.1918588, 'message': 'Dec 7 00:03:33 hqnl0246134 sshd[268045]: Failed password for root from 61.177.173.18 port 34845 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:03:36,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364216.196405, 'message': 'Dec 7 00:03:34 hqnl0246134 sshd[268045]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.18 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-07 00:03:36,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364216.1966565, 'message': 'Dec 7 00:03:36 hqnl0246134 sshd[268045]: Failed password for root from 61.177.173.18 port 34845 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
WARNING [2022-12-07 00:03:49,811] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:03:49,811] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:03:56,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364236.2302392, 'message': 'Dec 7 00:03:54 hqnl0246134 sshd[268062]: Invalid user production from 51.178.139.28 port 51068', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0745 seconds
INFO [2022-12-07 00:03:56,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364236.2309878, 'message': 'Dec 7 00:03:54 hqnl0246134 sshd[268062]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.178.139.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0744 seconds
INFO [2022-12-07 00:03:56,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364236.2312458, 'message': 'Dec 7 00:03:54 hqnl0246134 sshd[268062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.139.28 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-07 00:03:58,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364238.2309372, 'message': 'Dec 7 00:03:56 hqnl0246134 sshd[268062]: Failed password for invalid user production from 51.178.139.28 port 51068 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0514 seconds
INFO [2022-12-07 00:03:58,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364238.2312722, 'message': 'Dec 7 00:03:57 hqnl0246134 sshd[268062]: Disconnected from invalid user production 51.178.139.28 port 51068 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-07 00:04:01,187] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:04:01,188] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:04:01,244] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:04:01,305] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0993 seconds
INFO [2022-12-07 00:04:10,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364250.2468352, 'message': 'Dec 7 00:04:08 hqnl0246134 sshd[268087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0267 seconds
WARNING [2022-12-07 00:04:11,188] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:04:11,221] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0465 seconds
INFO [2022-12-07 00:04:12,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364252.2543771, 'message': 'Dec 7 00:04:10 hqnl0246134 sshd[268087]: Failed password for root from 165.227.166.207 port 48038 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:04:18,108] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:04:18,109] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:04:18,118] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:04:18,132] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0226 seconds
INFO [2022-12-07 00:04:18,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364258.2649527, 'message': 'Dec 7 00:04:17 hqnl0246134 sshd[268091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-07 00:04:20,285] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364260.2661245, 'message': 'Dec 7 00:04:18 hqnl0246134 sshd[268091]: Failed password for root from 61.177.173.18 port 60356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 00:04:20,991] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:04:20,991] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:04:20,998] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:04:21,010] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-07 00:04:22,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364262.271871, 'message': 'Dec 7 00:04:21 hqnl0246134 sshd[268091]: Failed password for root from 61.177.173.18 port 60356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-07 00:04:28,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364268.2856836, 'message': 'Dec 7 00:04:25 hqnl0246134 sshd[268091]: Failed password for root from 61.177.173.18 port 60356 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0258 seconds
WARNING [2022-12-07 00:04:49,816] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:04:49,817] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:05:04,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364304.3438675, 'message': 'Dec 7 00:05:02 hqnl0246134 sshd[268146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0615 seconds
INFO [2022-12-07 00:05:06,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364306.3442452, 'message': 'Dec 7 00:05:05 hqnl0246134 sshd[268146]: Failed password for root from 61.177.173.18 port 19840 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0362 seconds
WARNING [2022-12-07 00:05:11,190] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:05:11,211] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0328 seconds
INFO [2022-12-07 00:05:16,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '81.182.248.193', 'timestamp': 1670364316.36115, 'message': 'Dec 7 00:05:15 hqnl0246134 sshd[268153]: Invalid user elsearch from 81.182.248.193 port 34400', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-07 00:05:16,478] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:05:16,478] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:05:16,492] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:05:16,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '81.182.248.193', 'timestamp': 1670364316.3615017, 'message': 'Dec 7 00:05:15 hqnl0246134 sshd[268153]: pam_imunify(sshd:auth): [IM360_RBL] The IP 81.182.248.193 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1129 seconds
INFO [2022-12-07 00:05:16,517] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0356 seconds
INFO [2022-12-07 00:05:16,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '81.182.248.193', 'timestamp': 1670364316.3616717, 'message': 'Dec 7 00:05:15 hqnl0246134 sshd[268153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.182.248.193 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 00:05:18,232] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:05:18,233] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:05:18,243] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:05:18,255] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-07 00:05:18,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '81.182.248.193', 'timestamp': 1670364318.362278, 'message': 'Dec 7 00:05:16 hqnl0246134 sshd[268153]: Failed password for invalid user elsearch from 81.182.248.193 port 34400 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-07 00:05:18,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '81.182.248.193', 'timestamp': 1670364318.3625948, 'message': 'Dec 7 00:05:17 hqnl0246134 sshd[268153]: Disconnected from invalid user elsearch 81.182.248.193 port 34400 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 00:05:21,009] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:05:21,010] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:05:21,025] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:05:21,048] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0367 seconds
INFO [2022-12-07 00:05:28,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.217.131.233', 'timestamp': 1670364328.3732662, 'message': 'Dec 7 00:05:27 hqnl0246134 sshd[268191]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.217.131.233 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-07 00:05:28,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.217.131.233', 'timestamp': 1670364328.3739257, 'message': 'Dec 7 00:05:27 hqnl0246134 sshd[268191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.217.131.233 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:05:30,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '206.217.131.233', 'timestamp': 1670364330.378165, 'message': 'Dec 7 00:05:28 hqnl0246134 sshd[268191]: Failed password for root from 206.217.131.233 port 60882 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 00:05:48,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.240.206.206', 'timestamp': 1670364348.3989007, 'message': 'Dec 7 00:05:47 hqnl0246134 sshd[268196]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.240.206.206 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 00:05:48,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.240.206.206', 'timestamp': 1670364348.3991265, 'message': 'Dec 7 00:05:47 hqnl0246134 sshd[268196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.240.206.206 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-07 00:05:49,820] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:05:49,820] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:05:50,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '115.240.206.206', 'timestamp': 1670364350.4024975, 'message': 'Dec 7 00:05:49 hqnl0246134 sshd[268196]: Failed password for root from 115.240.206.206 port 49440 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-07 00:05:50,444] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364350.4028528, 'message': 'Dec 7 00:05:49 hqnl0246134 sshd[268198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0406 seconds
INFO [2022-12-07 00:05:52,428] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364352.406416, 'message': 'Dec 7 00:05:51 hqnl0246134 sshd[268198]: Failed password for root from 61.177.173.18 port 40231 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-07 00:06:06,448] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364366.4212627, 'message': 'Dec 7 00:06:05 hqnl0246134 sshd[268218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-07 00:06:08,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364368.4227302, 'message': 'Dec 7 00:06:07 hqnl0246134 sshd[268218]: Failed password for root from 165.227.166.207 port 58320 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-07 00:06:11,196] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:06:11,226] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0432 seconds
INFO [2022-12-07 00:06:17,999] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:06:18,001] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:06:18,012] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:06:18,025] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0222 seconds
INFO [2022-12-07 00:06:20,697] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:06:20,698] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:06:20,708] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:06:20,720] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-07 00:06:38,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364398.470505, 'message': 'Dec 7 00:06:37 hqnl0246134 sshd[268243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-07 00:06:40,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364400.4768023, 'message': 'Dec 7 00:06:39 hqnl0246134 sshd[268243]: Failed password for root from 61.177.173.18 port 64652 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-07 00:06:49,824] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:06:49,825] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:06:53,149] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:06:53,150] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:06:53,157] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:06:53,168] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
WARNING [2022-12-07 00:07:11,206] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:07:11,224] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0293 seconds
INFO [2022-12-07 00:07:17,915] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:07:17,916] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:07:17,927] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:07:17,939] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-07 00:07:20,926] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:07:20,927] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:07:20,934] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:07:20,945] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-07 00:07:22,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.39.194', 'timestamp': 1670364442.5426488, 'message': 'Dec 7 00:07:22 hqnl0246134 sshd[268294]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.39.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-07 00:07:22,591] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.39.194', 'timestamp': 1670364442.5429292, 'message': 'Dec 7 00:07:22 hqnl0246134 sshd[268294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.39.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-07 00:07:24,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '143.198.39.194', 'timestamp': 1670364444.5447292, 'message': 'Dec 7 00:07:24 hqnl0246134 sshd[268294]: Failed password for root from 143.198.39.194 port 46362 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 00:07:26,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364446.548065, 'message': 'Dec 7 00:07:25 hqnl0246134 sshd[268297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-07 00:07:28,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364448.5503294, 'message': 'Dec 7 00:07:27 hqnl0246134 sshd[268297]: Failed password for root from 61.177.173.18 port 18236 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 00:07:32,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364452.5689845, 'message': 'Dec 7 00:07:31 hqnl0246134 sshd[268297]: Failed password for root from 61.177.173.18 port 18236 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 00:07:38,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364458.5775182, 'message': 'Dec 7 00:07:35 hqnl0246134 sshd[268297]: Failed password for root from 61.177.173.18 port 18236 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0361 seconds
WARNING [2022-12-07 00:07:49,829] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:07:49,830] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:07:56,750] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 00:07:56,817] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 00:07:56,818] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 00:07:56,818] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 00:07:56,819] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 00:07:56,819] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 00:07:56,831] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 00:07:56,850] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0307 seconds
WARNING [2022-12-07 00:07:56,859] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 00:07:56,861] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:07:56,889] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0445 seconds
INFO [2022-12-07 00:07:56,891] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0434 seconds
INFO [2022-12-07 00:08:04,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364484.6152234, 'message': 'Dec 7 00:08:03 hqnl0246134 sshd[268349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 00:08:06,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364486.6163874, 'message': 'Dec 7 00:08:05 hqnl0246134 sshd[268349]: Failed password for root from 165.227.166.207 port 40380 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 00:08:08,195] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:08:08,195] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:08:08,207] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:08:08,226] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0297 seconds
WARNING [2022-12-07 00:08:11,213] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:08:11,236] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0357 seconds
INFO [2022-12-07 00:08:14,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364494.625429, 'message': 'Dec 7 00:08:12 hqnl0246134 sshd[268358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-07 00:08:14,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364494.6256816, 'message': 'Dec 7 00:08:14 hqnl0246134 sshd[268358]: Failed password for root from 61.177.173.18 port 34575 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 00:08:17,972] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:08:17,973] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:08:17,987] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:08:18,010] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0354 seconds
INFO [2022-12-07 00:08:18,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364498.6282203, 'message': 'Dec 7 00:08:16 hqnl0246134 sshd[268358]: Failed password for root from 61.177.173.18 port 34575 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0533 seconds
INFO [2022-12-07 00:08:18,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.8.68.56', 'timestamp': 1670364498.6285694, 'message': 'Dec 7 00:08:16 hqnl0246134 sshd[268361]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.8.68.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0551 seconds
INFO [2022-12-07 00:08:18,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.8.68.56', 'timestamp': 1670364498.628695, 'message': 'Dec 7 00:08:16 hqnl0246134 sshd[268361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.8.68.56 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-07 00:08:20,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364500.629964, 'message': 'Dec 7 00:08:19 hqnl0246134 sshd[268358]: Failed password for root from 61.177.173.18 port 34575 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-07 00:08:20,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '189.8.68.56', 'timestamp': 1670364500.6302242, 'message': 'Dec 7 00:08:19 hqnl0246134 sshd[268361]: Failed password for root from 189.8.68.56 port 47868 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-07 00:08:20,846] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:08:20,846] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:08:20,853] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:08:20,865] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-07 00:08:28,797] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 00:08:28,798] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 00:08:28,800] im360.plugins.client360: Waiting 3 minutes before retry...
WARNING [2022-12-07 00:08:49,834] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:08:49,836] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:09:00,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364540.6861684, 'message': 'Dec 7 00:08:59 hqnl0246134 sshd[268401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-07 00:09:02,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364542.687365, 'message': 'Dec 7 00:09:01 hqnl0246134 sshd[268401]: Failed password for root from 61.177.173.18 port 47764 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 00:09:06,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364546.6904645, 'message': 'Dec 7 00:09:06 hqnl0246134 sshd[268401]: Failed password for root from 61.177.173.18 port 47764 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
WARNING [2022-12-07 00:09:11,774] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:09:11,795] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.5899 seconds
INFO [2022-12-07 00:09:12,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364552.70565, 'message': 'Dec 7 00:09:10 hqnl0246134 sshd[268401]: Failed password for root from 61.177.173.18 port 47764 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-07 00:09:18,092] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:09:18,093] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:09:18,108] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:09:18,139] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0379 seconds
INFO [2022-12-07 00:09:21,087] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:09:21,088] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:09:21,096] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:09:21,108] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-07 00:09:48,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364588.7676144, 'message': 'Dec 7 00:09:47 hqnl0246134 sshd[268575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0213 seconds
WARNING [2022-12-07 00:09:49,839] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:09:49,840] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:09:50,793] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364590.7741072, 'message': 'Dec 7 00:09:49 hqnl0246134 sshd[268575]: Failed password for root from 61.177.173.18 port 16256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:09:52,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364592.7769005, 'message': 'Dec 7 00:09:51 hqnl0246134 sshd[268575]: Failed password for root from 61.177.173.18 port 16256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 00:09:52,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.240.88.36', 'timestamp': 1670364592.777171, 'message': 'Dec 7 00:09:51 hqnl0246134 sshd[268579]: Invalid user centos from 45.240.88.36 port 33700', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 00:09:52,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.240.88.36', 'timestamp': 1670364592.781176, 'message': 'Dec 7 00:09:51 hqnl0246134 sshd[268579]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.240.88.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 00:09:52,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.240.88.36', 'timestamp': 1670364592.7813272, 'message': 'Dec 7 00:09:51 hqnl0246134 sshd[268579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.36 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 00:09:54,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364594.7781563, 'message': 'Dec 7 00:09:53 hqnl0246134 sshd[268575]: Failed password for root from 61.177.173.18 port 16256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-07 00:09:54,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.240.88.36', 'timestamp': 1670364594.7784545, 'message': 'Dec 7 00:09:53 hqnl0246134 sshd[268579]: Failed password for invalid user centos from 45.240.88.36 port 33700 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-07 00:09:54,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.240.88.36', 'timestamp': 1670364594.7786531, 'message': 'Dec 7 00:09:54 hqnl0246134 sshd[268579]: Disconnected from invalid user centos 45.240.88.36 port 33700 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-07 00:09:57,167] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:09:57,168] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:09:57,178] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:09:57,192] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0234 seconds
INFO [2022-12-07 00:09:58,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.240.206.206', 'timestamp': 1670364598.782274, 'message': 'Dec 7 00:09:58 hqnl0246134 sshd[268597]: Invalid user testing from 115.240.206.206 port 56005', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-07 00:09:58,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '115.240.206.206', 'timestamp': 1670364598.7825317, 'message': 'Dec 7 00:09:58 hqnl0246134 sshd[268597]: pam_imunify(sshd:auth): [IM360_RBL] The IP 115.240.206.206 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-07 00:09:58,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '115.240.206.206', 'timestamp': 1670364598.7826886, 'message': 'Dec 7 00:09:58 hqnl0246134 sshd[268597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.240.206.206 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-07 00:10:00,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.240.206.206', 'timestamp': 1670364600.784676, 'message': 'Dec 7 00:10:00 hqnl0246134 sshd[268597]: Failed password for invalid user testing from 115.240.206.206 port 56005 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 00:10:04,897] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364604.7957103, 'message': 'Dec 7 00:10:02 hqnl0246134 sshd[268620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1009 seconds
INFO [2022-12-07 00:10:04,899] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '115.240.206.206', 'timestamp': 1670364604.7961006, 'message': 'Dec 7 00:10:03 hqnl0246134 sshd[268597]: Disconnected from invalid user testing 115.240.206.206 port 56005 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1013 seconds
INFO [2022-12-07 00:10:06,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364606.7962687, 'message': 'Dec 7 00:10:05 hqnl0246134 sshd[268620]: Failed password for root from 165.227.166.207 port 50660 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0255 seconds
WARNING [2022-12-07 00:10:11,222] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:10:11,253] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0435 seconds
INFO [2022-12-07 00:10:17,980] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:10:17,981] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:10:17,991] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:10:18,003] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-07 00:10:20,561] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:10:20,561] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:10:20,569] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:10:20,580] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-07 00:10:32,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364632.8477404, 'message': 'Dec 7 00:10:32 hqnl0246134 sshd[268655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-07 00:10:34,884] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364634.849732, 'message': 'Dec 7 00:10:34 hqnl0246134 sshd[268655]: Failed password for root from 61.177.173.18 port 25225 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-07 00:10:48,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '93.153.192.254', 'timestamp': 1670364648.8843296, 'message': 'Dec 7 00:10:48 hqnl0246134 sshd[268660]: pam_imunify(sshd:auth): [IM360_RBL] The IP 93.153.192.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 00:10:48,923] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '93.153.192.254', 'timestamp': 1670364648.8846202, 'message': 'Dec 7 00:10:48 hqnl0246134 sshd[268660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.153.192.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-07 00:10:49,843] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:10:49,844] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:10:50,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '93.153.192.254', 'timestamp': 1670364650.8892713, 'message': 'Dec 7 00:10:50 hqnl0246134 sshd[268660]: Failed password for root from 93.153.192.254 port 56336 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-07 00:11:11,228] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:11:11,259] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0436 seconds
INFO [2022-12-07 00:11:17,922] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:11:17,923] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:11:17,931] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:11:17,947] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
INFO [2022-12-07 00:11:18,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364678.9419575, 'message': 'Dec 7 00:11:18 hqnl0246134 sshd[268686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 00:11:20,822] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:11:20,823] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:11:20,832] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:11:20,844] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-07 00:11:20,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364680.944123, 'message': 'Dec 7 00:11:20 hqnl0246134 sshd[268686]: Failed password for root from 61.177.173.18 port 49526 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 00:11:24,976] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364684.9534814, 'message': 'Dec 7 00:11:23 hqnl0246134 sshd[268686]: Failed password for root from 61.177.173.18 port 49526 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-07 00:11:28,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364688.966582, 'message': 'Dec 7 00:11:25 hqnl0246134 sshd[268686]: Failed password for root from 61.177.173.18 port 49526 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-07 00:11:30,270] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:11:30,270] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:11:30,285] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:11:30,304] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0329 seconds
WARNING [2022-12-07 00:11:49,846] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:11:49,847] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 00:11:54,074] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-07 00:11:57,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364717.0268638, 'message': 'Dec 7 00:11:56 hqnl0246134 sshd[268720]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.30.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-07 00:11:57,071] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364717.0273871, 'message': 'Dec 7 00:11:56 hqnl0246134 sshd[268720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.30.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 00:11:59,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364719.03128, 'message': 'Dec 7 00:11:58 hqnl0246134 sshd[268720]: Failed password for root from 43.153.30.50 port 51690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 00:12:01,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364721.0361786, 'message': 'Dec 7 00:11:59 hqnl0246134 sshd[268722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1074 seconds
INFO [2022-12-07 00:12:01,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364721.0364578, 'message': 'Dec 7 00:11:59 hqnl0246134 sshd[268724]: Invalid user anjana from 51.178.139.28 port 43198', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1079 seconds
INFO [2022-12-07 00:12:01,169] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364721.0365732, 'message': 'Dec 7 00:11:59 hqnl0246134 sshd[268724]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.178.139.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-07 00:12:01,189] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364721.0366793, 'message': 'Dec 7 00:11:59 hqnl0246134 sshd[268724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.139.28 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 00:12:03,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364723.0394192, 'message': 'Dec 7 00:12:01 hqnl0246134 sshd[268722]: Failed password for root from 165.227.166.207 port 60968 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 00:12:03,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364723.0397089, 'message': 'Dec 7 00:12:01 hqnl0246134 sshd[268724]: Failed password for invalid user anjana from 51.178.139.28 port 43198 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 00:12:03,088] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364723.0398357, 'message': 'Dec 7 00:12:02 hqnl0246134 sshd[268724]: Disconnected from invalid user anjana 51.178.139.28 port 43198 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 00:12:05,275] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 00:12:05,343] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 00:12:05,343] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 00:12:05,344] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 00:12:05,344] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 00:12:05,344] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 00:12:05,358] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 00:12:05,375] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0305 seconds
WARNING [2022-12-07 00:12:05,384] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 00:12:05,386] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:12:05,405] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0348 seconds
INFO [2022-12-07 00:12:05,406] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0335 seconds
INFO [2022-12-07 00:12:07,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364727.0441434, 'message': 'Dec 7 00:12:05 hqnl0246134 sshd[268742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-07 00:12:09,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364729.0489485, 'message': 'Dec 7 00:12:07 hqnl0246134 sshd[268742]: Failed password for root from 61.177.173.18 port 14072 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0506 seconds
INFO [2022-12-07 00:12:09,101] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.147.235', 'timestamp': 1670364729.0491548, 'message': 'Dec 7 00:12:08 hqnl0246134 sshd[268745]: Invalid user cam from 138.197.147.235 port 42922', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0508 seconds
INFO [2022-12-07 00:12:09,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.147.235', 'timestamp': 1670364729.0492764, 'message': 'Dec 7 00:12:08 hqnl0246134 sshd[268745]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.147.235 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 00:12:09,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.147.235', 'timestamp': 1670364729.0494409, 'message': 'Dec 7 00:12:08 hqnl0246134 sshd[268745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.235 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 00:12:11,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.147.235', 'timestamp': 1670364731.050111, 'message': 'Dec 7 00:12:10 hqnl0246134 sshd[268745]: Failed password for invalid user cam from 138.197.147.235 port 42922 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-07 00:12:11,227] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:12:11,254] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0356 seconds
INFO [2022-12-07 00:12:13,082] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.147.235', 'timestamp': 1670364733.0541546, 'message': 'Dec 7 00:12:11 hqnl0246134 sshd[268745]: Disconnected from invalid user cam 138.197.147.235 port 42922 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-07 00:12:13,083] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364733.0544922, 'message': 'Dec 7 00:12:11 hqnl0246134 sshd[268742]: Failed password for root from 61.177.173.18 port 14072 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-07 00:12:17,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364737.058173, 'message': 'Dec 7 00:12:15 hqnl0246134 sshd[268742]: Failed password for root from 61.177.173.18 port 14072 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 00:12:17,886] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:12:17,886] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:12:17,895] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:12:17,906] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-07 00:12:20,500] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:12:20,500] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:12:20,509] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:12:20,520] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 00:12:21,083] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.68.156.60', 'timestamp': 1670364741.0647504, 'message': 'Dec 7 00:12:19 hqnl0246134 sshd[268774]: Invalid user monitoring from 189.68.156.60 port 23398', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 00:12:21,101] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.68.156.60', 'timestamp': 1670364741.0649765, 'message': 'Dec 7 00:12:19 hqnl0246134 sshd[268774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.68.156.60 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 00:12:23,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.68.156.60', 'timestamp': 1670364743.0691645, 'message': 'Dec 7 00:12:21 hqnl0246134 sshd[268774]: Failed password for invalid user monitoring from 189.68.156.60 port 23398 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 00:12:25,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.68.156.60', 'timestamp': 1670364745.074112, 'message': 'Dec 7 00:12:23 hqnl0246134 sshd[268774]: Disconnected from invalid user monitoring 189.68.156.60 port 23398 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 00:12:33,110] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.8.68.56', 'timestamp': 1670364753.0858626, 'message': 'Dec 7 00:12:31 hqnl0246134 sshd[268791]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.8.68.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-07 00:12:33,140] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.8.68.56', 'timestamp': 1670364753.0863786, 'message': 'Dec 7 00:12:31 hqnl0246134 sshd[268791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.8.68.56 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-07 00:12:35,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '189.8.68.56', 'timestamp': 1670364755.0883517, 'message': 'Dec 7 00:12:33 hqnl0246134 sshd[268791]: Failed password for root from 189.8.68.56 port 42258 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-07 00:12:38,128] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:12:38,129] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:12:38,141] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:12:38,156] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0250 seconds
INFO [2022-12-07 00:12:40,519] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 00:12:40,520] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 00:12:40,521] im360.plugins.client360: Waiting 5 minutes before retry...
WARNING [2022-12-07 00:12:49,850] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:12:49,851] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:12:53,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364773.1127021, 'message': 'Dec 7 00:12:53 hqnl0246134 sshd[268802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 00:12:57,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364777.1182647, 'message': 'Dec 7 00:12:55 hqnl0246134 sshd[268802]: Failed password for root from 61.177.173.18 port 40477 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-07 00:13:02,296] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-07 00:13:02,303] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:13:02,314] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0172 seconds
INFO [2022-12-07 00:13:03,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364783.1247685, 'message': 'Dec 7 00:12:59 hqnl0246134 sshd[268802]: Failed password for root from 61.177.173.18 port 40477 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1094 seconds
INFO [2022-12-07 00:13:03,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364783.1249545, 'message': 'Dec 7 00:13:01 hqnl0246134 sshd[268802]: Failed password for root from 61.177.173.18 port 40477 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-07 00:13:11,230] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:13:11,250] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0269 seconds
INFO [2022-12-07 00:13:13,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.217.131.233', 'timestamp': 1670364793.1403706, 'message': 'Dec 7 00:13:12 hqnl0246134 sshd[268832]: Invalid user admin from 206.217.131.233 port 40568', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-07 00:13:13,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.217.131.233', 'timestamp': 1670364793.1407945, 'message': 'Dec 7 00:13:12 hqnl0246134 sshd[268832]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.217.131.233 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 00:13:13,208] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.217.131.233', 'timestamp': 1670364793.1410167, 'message': 'Dec 7 00:13:12 hqnl0246134 sshd[268832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.217.131.233 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-07 00:13:15,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.217.131.233', 'timestamp': 1670364795.1421962, 'message': 'Dec 7 00:13:13 hqnl0246134 sshd[268832]: Failed password for invalid user admin from 206.217.131.233 port 40568 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-07 00:13:15,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.40.81.0', 'timestamp': 1670364795.1432357, 'message': 'Dec 7 00:13:15 hqnl0246134 sshd[268834]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.40.81.0 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-07 00:13:15,209] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '206.217.131.233', 'timestamp': 1670364795.14312, 'message': 'Dec 7 00:13:14 hqnl0246134 sshd[268832]: Disconnected from invalid user admin 206.217.131.233 port 40568 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-07 00:13:15,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.40.81.0', 'timestamp': 1670364795.143368, 'message': 'Dec 7 00:13:15 hqnl0246134 sshd[268834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.40.81.0 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-07 00:13:17,738] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:13:17,739] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:13:17,746] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:13:17,758] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-07 00:13:19,172] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.40.81.0', 'timestamp': 1670364799.14867, 'message': 'Dec 7 00:13:17 hqnl0246134 sshd[268834]: Failed password for root from 20.40.81.0 port 57706 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-07 00:13:20,368] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:13:20,368] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:13:20,375] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:13:20,386] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-07 00:13:41,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364821.1961076, 'message': 'Dec 7 00:13:40 hqnl0246134 sshd[268856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-07 00:13:43,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364823.2141638, 'message': 'Dec 7 00:13:42 hqnl0246134 sshd[268856]: Failed password for root from 61.177.173.18 port 59662 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-07 00:13:49,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364829.2212803, 'message': 'Dec 7 00:13:46 hqnl0246134 sshd[268856]: Failed password for root from 61.177.173.18 port 59662 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-07 00:13:49,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364829.221572, 'message': 'Dec 7 00:13:49 hqnl0246134 sshd[268859]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 00:13:49,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364829.2217433, 'message': 'Dec 7 00:13:49 hqnl0246134 sshd[268859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
WARNING [2022-12-07 00:13:49,854] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:13:49,855] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:13:51,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364831.2264655, 'message': 'Dec 7 00:13:50 hqnl0246134 sshd[268856]: Failed password for root from 61.177.173.18 port 59662 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-07 00:13:51,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364831.2289324, 'message': 'Dec 7 00:13:51 hqnl0246134 sshd[268859]: Failed password for root from 61.177.173.50 port 37826 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-07 00:13:53,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364833.22846, 'message': 'Dec 7 00:13:53 hqnl0246134 sshd[268859]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 00:13:55,250] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364835.2319307, 'message': 'Dec 7 00:13:55 hqnl0246134 sshd[268864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 00:13:57,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364837.2342157, 'message': 'Dec 7 00:13:55 hqnl0246134 sshd[268859]: Failed password for root from 61.177.173.50 port 37826 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-07 00:13:57,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364837.2346509, 'message': 'Dec 7 00:13:56 hqnl0246134 sshd[268864]: Failed password for root from 165.227.166.207 port 43028 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-07 00:13:59,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364839.2371614, 'message': 'Dec 7 00:13:57 hqnl0246134 sshd[268859]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 00:14:01,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364841.2420738, 'message': 'Dec 7 00:13:59 hqnl0246134 sshd[268859]: Failed password for root from 61.177.173.50 port 37826 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 00:14:05,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.39.194', 'timestamp': 1670364845.2469327, 'message': 'Dec 7 00:14:04 hqnl0246134 sshd[268882]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.39.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-07 00:14:05,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.39.194', 'timestamp': 1670364845.2474685, 'message': 'Dec 7 00:14:04 hqnl0246134 sshd[268882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.39.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-07 00:14:07,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '143.198.39.194', 'timestamp': 1670364847.2489078, 'message': 'Dec 7 00:14:06 hqnl0246134 sshd[268882]: Failed password for root from 143.198.39.194 port 44034 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-07 00:14:09,285] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364849.2508774, 'message': 'Dec 7 00:14:08 hqnl0246134 sshd[268887]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-07 00:14:09,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364849.2512128, 'message': 'Dec 7 00:14:08 hqnl0246134 sshd[268887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-07 00:14:11,088] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:14:11,089] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:14:11,096] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:14:11,111] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
WARNING [2022-12-07 00:14:11,234] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:14:11,273] defence360agent.internals.the_sink: SensorIncidentList(<16 item(s)>) processed in 0.0477 seconds
INFO [2022-12-07 00:14:11,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364851.2576776, 'message': 'Dec 7 00:14:10 hqnl0246134 sshd[268887]: Failed password for root from 61.177.173.50 port 14239 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-07 00:14:13,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364853.2590666, 'message': 'Dec 7 00:14:12 hqnl0246134 sshd[268887]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 00:14:15,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364855.2634997, 'message': 'Dec 7 00:14:14 hqnl0246134 sshd[268887]: Failed password for root from 61.177.173.50 port 14239 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 00:14:17,295] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364857.266942, 'message': 'Dec 7 00:14:15 hqnl0246134 sshd[268887]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-07 00:14:17,772] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:14:17,772] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:14:17,779] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:14:17,790] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-07 00:14:19,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670364859.2731037, 'message': 'Dec 7 00:14:17 hqnl0246134 sshd[268887]: Failed password for root from 61.177.173.50 port 14239 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 00:14:20,422] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:14:20,422] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:14:20,429] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:14:20,440] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-07 00:14:25,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364865.2852068, 'message': 'Dec 7 00:14:24 hqnl0246134 sshd[268904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 00:14:25,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364865.28553, 'message': 'Dec 7 00:14:24 hqnl0246134 sshd[268904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 00:14:27,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364867.2865357, 'message': 'Dec 7 00:14:26 hqnl0246134 sshd[268904]: Failed password for root from 61.177.173.36 port 34735 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-07 00:14:27,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364867.2870467, 'message': 'Dec 7 00:14:26 hqnl0246134 sshd[268904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-07 00:14:29,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364869.2885942, 'message': 'Dec 7 00:14:27 hqnl0246134 sshd[268914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-07 00:14:29,321] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364869.2887945, 'message': 'Dec 7 00:14:28 hqnl0246134 sshd[268904]: Failed password for root from 61.177.173.36 port 34735 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-07 00:14:31,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364871.2901585, 'message': 'Dec 7 00:14:29 hqnl0246134 sshd[268914]: Failed password for root from 61.177.173.18 port 27572 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-07 00:14:31,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364871.2904842, 'message': 'Dec 7 00:14:30 hqnl0246134 sshd[268904]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-07 00:14:33,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364873.2919743, 'message': 'Dec 7 00:14:31 hqnl0246134 sshd[268914]: Failed password for root from 61.177.173.18 port 27572 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-07 00:14:33,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364873.2922318, 'message': 'Dec 7 00:14:32 hqnl0246134 sshd[268904]: Failed password for root from 61.177.173.36 port 34735 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0408 seconds
INFO [2022-12-07 00:14:35,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364875.2964895, 'message': 'Dec 7 00:14:34 hqnl0246134 sshd[268914]: Failed password for root from 61.177.173.18 port 27572 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0568 seconds
INFO [2022-12-07 00:14:35,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '93.153.192.254', 'timestamp': 1670364875.2968028, 'message': 'Dec 7 00:14:34 hqnl0246134 sshd[268918]: Invalid user admin from 93.153.192.254 port 55504', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0566 seconds
INFO [2022-12-07 00:14:35,372] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '93.153.192.254', 'timestamp': 1670364875.2969933, 'message': 'Dec 7 00:14:34 hqnl0246134 sshd[268918]: pam_imunify(sshd:auth): [IM360_RBL] The IP 93.153.192.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 00:14:35,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '93.153.192.254', 'timestamp': 1670364875.2972486, 'message': 'Dec 7 00:14:34 hqnl0246134 sshd[268918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.153.192.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 00:14:37,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '93.153.192.254', 'timestamp': 1670364877.3010848, 'message': 'Dec 7 00:14:36 hqnl0246134 sshd[268918]: Failed password for invalid user admin from 93.153.192.254 port 55504 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-07 00:14:37,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364877.3013968, 'message': 'Dec 7 00:14:36 hqnl0246134 sshd[268920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-07 00:14:37,357] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364877.301629, 'message': 'Dec 7 00:14:36 hqnl0246134 sshd[268920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 00:14:39,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364879.3054266, 'message': 'Dec 7 00:14:38 hqnl0246134 sshd[268920]: Failed password for root from 61.177.173.36 port 53910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-07 00:14:39,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '93.153.192.254', 'timestamp': 1670364879.305617, 'message': 'Dec 7 00:14:38 hqnl0246134 sshd[268918]: Disconnected from invalid user admin 93.153.192.254 port 55504 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-07 00:14:39,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364879.3057327, 'message': 'Dec 7 00:14:38 hqnl0246134 sshd[268920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 00:14:41,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364881.3110654, 'message': 'Dec 7 00:14:41 hqnl0246134 sshd[268920]: Failed password for root from 61.177.173.36 port 53910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-07 00:14:43,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.240.88.36', 'timestamp': 1670364883.3127599, 'message': 'Dec 7 00:14:43 hqnl0246134 sshd[268922]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.240.88.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 00:14:43,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364883.3131, 'message': 'Dec 7 00:14:43 hqnl0246134 sshd[268920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-07 00:14:43,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.240.88.36', 'timestamp': 1670364883.312945, 'message': 'Dec 7 00:14:43 hqnl0246134 sshd[268922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 00:14:45,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364885.3176405, 'message': 'Dec 7 00:14:44 hqnl0246134 sshd[268926]: Invalid user felix from 43.153.30.50 port 59302', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-07 00:14:45,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.240.88.36', 'timestamp': 1670364885.3180165, 'message': 'Dec 7 00:14:45 hqnl0246134 sshd[268922]: Failed password for root from 45.240.88.36 port 44344 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-07 00:14:45,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364885.3186553, 'message': 'Dec 7 00:14:45 hqnl0246134 sshd[268920]: Failed password for root from 61.177.173.36 port 53910 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0466 seconds
INFO [2022-12-07 00:14:45,392] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364885.3183, 'message': 'Dec 7 00:14:45 hqnl0246134 sshd[268926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.30.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-07 00:14:45,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364885.318488, 'message': 'Dec 7 00:14:45 hqnl0246134 sshd[268926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.30.50 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-07 00:14:47,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364887.3180227, 'message': 'Dec 7 00:14:47 hqnl0246134 sshd[268928]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-07 00:14:47,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364887.3183734, 'message': 'Dec 7 00:14:47 hqnl0246134 sshd[268926]: Failed password for invalid user felix from 43.153.30.50 port 59302 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-07 00:14:47,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364887.318212, 'message': 'Dec 7 00:14:47 hqnl0246134 sshd[268928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 00:14:49,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.218.109.19', 'timestamp': 1670364889.3203256, 'message': 'Dec 7 00:14:47 hqnl0246134 sshd[268924]: Invalid user software from 20.218.109.19 port 54856', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-07 00:14:49,361] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.50', 'timestamp': 1670364889.3207695, 'message': 'Dec 7 00:14:48 hqnl0246134 sshd[268926]: Disconnected from invalid user felix 43.153.30.50 port 59302 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0391 seconds
INFO [2022-12-07 00:14:49,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.218.109.19', 'timestamp': 1670364889.3205047, 'message': 'Dec 7 00:14:47 hqnl0246134 sshd[268924]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.218.109.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 00:14:49,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.218.109.19', 'timestamp': 1670364889.3206167, 'message': 'Dec 7 00:14:47 hqnl0246134 sshd[268924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.218.109.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-07 00:14:49,857] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:14:49,857] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:14:51,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364891.3223987, 'message': 'Dec 7 00:14:49 hqnl0246134 sshd[268928]: Failed password for root from 61.177.173.36 port 12944 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0445 seconds
INFO [2022-12-07 00:14:51,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.218.109.19', 'timestamp': 1670364891.3226595, 'message': 'Dec 7 00:14:50 hqnl0246134 sshd[268924]: Failed password for invalid user software from 20.218.109.19 port 54856 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0448 seconds
INFO [2022-12-07 00:14:51,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364891.3228607, 'message': 'Dec 7 00:14:50 hqnl0246134 sshd[268933]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.178.139.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-07 00:14:51,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.218.109.19', 'timestamp': 1670364891.3231332, 'message': 'Dec 7 00:14:51 hqnl0246134 sshd[268924]: Disconnected from invalid user software 20.218.109.19 port 54856 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-07 00:14:51,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364891.3230145, 'message': 'Dec 7 00:14:50 hqnl0246134 sshd[268933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.139.28 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-07 00:14:53,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364893.3251615, 'message': 'Dec 7 00:14:51 hqnl0246134 sshd[268928]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0704 seconds
INFO [2022-12-07 00:14:53,405] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.178.139.28', 'timestamp': 1670364893.325565, 'message': 'Dec 7 00:14:53 hqnl0246134 sshd[268933]: Failed password for root from 51.178.139.28 port 33010 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0782 seconds
INFO [2022-12-07 00:14:53,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364893.325403, 'message': 'Dec 7 00:14:53 hqnl0246134 sshd[268928]: Failed password for root from 61.177.173.36 port 12944 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 00:14:55,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364895.32799, 'message': 'Dec 7 00:14:53 hqnl0246134 sshd[268928]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 00:14:55,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670364895.328428, 'message': 'Dec 7 00:14:55 hqnl0246134 sshd[268928]: Failed password for root from 61.177.173.36 port 12944 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 00:15:07,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.8.68.56', 'timestamp': 1670364907.35, 'message': 'Dec 7 00:15:06 hqnl0246134 sshd[268967]: Invalid user deployer from 189.8.68.56 port 46856', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-07 00:15:07,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.8.68.56', 'timestamp': 1670364907.350549, 'message': 'Dec 7 00:15:06 hqnl0246134 sshd[268967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.8.68.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 00:15:07,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.8.68.56', 'timestamp': 1670364907.3507106, 'message': 'Dec 7 00:15:06 hqnl0246134 sshd[268967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.8.68.56 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0162 seconds
INFO [2022-12-07 00:15:09,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.8.68.56', 'timestamp': 1670364909.350119, 'message': 'Dec 7 00:15:08 hqnl0246134 sshd[268967]: Failed password for invalid user deployer from 189.8.68.56 port 46856 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
WARNING [2022-12-07 00:15:11,239] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:15:11,271] defence360agent.internals.the_sink: SensorIncidentList(<25 item(s)>) processed in 0.0394 seconds
INFO [2022-12-07 00:15:11,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.8.68.56', 'timestamp': 1670364911.352952, 'message': 'Dec 7 00:15:09 hqnl0246134 sshd[268967]: Disconnected from invalid user deployer 189.8.68.56 port 46856 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 00:15:15,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364915.3569329, 'message': 'Dec 7 00:15:14 hqnl0246134 sshd[268977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 00:15:17,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364917.3576696, 'message': 'Dec 7 00:15:15 hqnl0246134 sshd[268977]: Failed password for root from 61.177.173.18 port 46313 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 00:15:18,020] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:15:18,021] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:15:18,028] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:15:18,039] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-07 00:15:19,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364919.360868, 'message': 'Dec 7 00:15:18 hqnl0246134 sshd[268977]: Failed password for root from 61.177.173.18 port 46313 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 00:15:20,720] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:15:20,721] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:15:20,727] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:15:20,738] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-07 00:15:23,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364923.3652349, 'message': 'Dec 7 00:15:23 hqnl0246134 sshd[268977]: Failed password for root from 61.177.173.18 port 46313 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-07 00:15:27,557] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:15:27,558] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:15:27,568] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:15:27,581] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
WARNING [2022-12-07 00:15:49,863] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:15:49,864] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:15:51,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.217.131.233', 'timestamp': 1670364951.3946922, 'message': 'Dec 7 00:15:49 hqnl0246134 sshd[269032]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.217.131.233 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-07 00:15:51,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.217.131.233', 'timestamp': 1670364951.3950055, 'message': 'Dec 7 00:15:49 hqnl0246134 sshd[269032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.217.131.233 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-07 00:15:51,474] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '206.217.131.233', 'timestamp': 1670364951.3952382, 'message': 'Dec 7 00:15:50 hqnl0246134 sshd[269032]: Failed password for root from 206.217.131.233 port 57754 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-07 00:15:53,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364953.3968525, 'message': 'Dec 7 00:15:51 hqnl0246134 sshd[269034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 00:15:55,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670364955.3976128, 'message': 'Dec 7 00:15:53 hqnl0246134 sshd[269034]: Failed password for root from 165.227.166.207 port 53316 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-07 00:16:01,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364961.4057422, 'message': 'Dec 7 00:15:59 hqnl0246134 sshd[269048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-07 00:16:03,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670364963.4089975, 'message': 'Dec 7 00:16:01 hqnl0246134 sshd[269048]: Failed password for root from 61.177.173.18 port 57768 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-07 00:16:11,244] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:16:11,269] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0339 seconds
INFO [2022-12-07 00:16:18,020] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:16:18,021] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:16:18,029] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:16:18,042] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-07 00:16:21,431] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:16:21,431] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:16:21,439] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:16:21,452] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-07 00:16:37,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.157.26.210', 'timestamp': 1670364997.4604335, 'message': 'Dec 7 00:16:37 hqnl0246134 sshd[269085]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.157.26.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-07 00:16:37,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.157.26.210', 'timestamp': 1670364997.4608002, 'message': 'Dec 7 00:16:37 hqnl0246134 sshd[269085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.210 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 00:16:39,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.157.26.210', 'timestamp': 1670364999.4618292, 'message': 'Dec 7 00:16:38 hqnl0246134 sshd[269085]: Failed password for root from 43.157.26.210 port 42170 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:16:41,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.39.194', 'timestamp': 1670365001.4641347, 'message': 'Dec 7 00:16:40 hqnl0246134 sshd[269089]: Invalid user test from 143.198.39.194 port 52182', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 00:16:41,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.198.39.194', 'timestamp': 1670365001.4643865, 'message': 'Dec 7 00:16:40 hqnl0246134 sshd[269089]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.198.39.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 00:16:41,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.39.194', 'timestamp': 1670365001.464504, 'message': 'Dec 7 00:16:40 hqnl0246134 sshd[269089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.39.194 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 00:16:41,693] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:16:41,693] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:16:41,702] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:16:41,714] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-07 00:16:45,506] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.39.194', 'timestamp': 1670365005.4866452, 'message': 'Dec 7 00:16:43 hqnl0246134 sshd[269089]: Failed password for invalid user test from 143.198.39.194 port 52182 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 00:16:47,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.198.39.194', 'timestamp': 1670365007.4980326, 'message': 'Dec 7 00:16:45 hqnl0246134 sshd[269089]: Disconnected from invalid user test 143.198.39.194 port 52182 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-07 00:16:47,537] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365007.498943, 'message': 'Dec 7 00:16:46 hqnl0246134 sshd[269095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-07 00:16:49,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365009.5084727, 'message': 'Dec 7 00:16:48 hqnl0246134 sshd[269095]: Failed password for root from 61.177.173.18 port 30602 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-07 00:16:49,866] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:16:49,867] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 00:17:11,250] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:17:11,276] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0374 seconds
INFO [2022-12-07 00:17:15,585] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '93.153.192.254', 'timestamp': 1670365035.5608768, 'message': 'Dec 7 00:17:13 hqnl0246134 sshd[269128]: pam_imunify(sshd:auth): [IM360_RBL] The IP 93.153.192.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-07 00:17:15,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '93.153.192.254', 'timestamp': 1670365035.5611997, 'message': 'Dec 7 00:17:13 hqnl0246134 sshd[269128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.153.192.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 00:17:15,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '93.153.192.254', 'timestamp': 1670365035.5614276, 'message': 'Dec 7 00:17:15 hqnl0246134 sshd[269128]: Failed password for root from 93.153.192.254 port 44168 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 00:17:17,990] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:17:17,991] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:17:17,998] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:17:18,011] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-07 00:17:20,640] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:17:20,640] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:17:20,647] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:17:20,658] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-07 00:17:25,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.50', 'timestamp': 1670365045.5988393, 'message': 'Dec 7 00:17:25 hqnl0246134 sshd[269140]: Invalid user glenn from 43.153.30.50 port 55662', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-07 00:17:25,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.153.30.50', 'timestamp': 1670365045.5990937, 'message': 'Dec 7 00:17:25 hqnl0246134 sshd[269140]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.153.30.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 00:17:25,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.153.30.50', 'timestamp': 1670365045.599336, 'message': 'Dec 7 00:17:25 hqnl0246134 sshd[269140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.30.50 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 00:17:27,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.240.88.36', 'timestamp': 1670365047.6015267, 'message': 'Dec 7 00:17:25 hqnl0246134 sshd[269142]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.240.88.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-07 00:17:27,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.50', 'timestamp': 1670365047.6020458, 'message': 'Dec 7 00:17:27 hqnl0246134 sshd[269140]: Failed password for invalid user glenn from 43.153.30.50 port 55662 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-07 00:17:27,660] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.240.88.36', 'timestamp': 1670365047.6019073, 'message': 'Dec 7 00:17:25 hqnl0246134 sshd[269142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 00:17:27,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.240.88.36', 'timestamp': 1670365047.6021698, 'message': 'Dec 7 00:17:27 hqnl0246134 sshd[269142]: Failed password for root from 45.240.88.36 port 33184 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 00:17:29,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.153.30.50', 'timestamp': 1670365049.607222, 'message': 'Dec 7 00:17:28 hqnl0246134 sshd[269140]: Disconnected from invalid user glenn 43.153.30.50 port 55662 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-07 00:17:33,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365053.619801, 'message': 'Dec 7 00:17:32 hqnl0246134 sshd[269153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-07 00:17:35,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365055.6226335, 'message': 'Dec 7 00:17:34 hqnl0246134 sshd[269153]: Failed password for root from 61.177.173.18 port 42295 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0460 seconds
INFO [2022-12-07 00:17:35,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.139.28', 'timestamp': 1670365055.622851, 'message': 'Dec 7 00:17:34 hqnl0246134 sshd[269158]: Invalid user lx from 51.178.139.28 port 51042', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0472 seconds
INFO [2022-12-07 00:17:35,673] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.8.68.56', 'timestamp': 1670365055.6232433, 'message': 'Dec 7 00:17:34 hqnl0246134 sshd[269156]: Invalid user admin from 189.8.68.56 port 51460', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0471 seconds
INFO [2022-12-07 00:17:35,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.178.139.28', 'timestamp': 1670365055.6229796, 'message': 'Dec 7 00:17:34 hqnl0246134 sshd[269158]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.178.139.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-07 00:17:35,713] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.8.68.56', 'timestamp': 1670365055.6233792, 'message': 'Dec 7 00:17:34 hqnl0246134 sshd[269156]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.8.68.56 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0396 seconds
INFO [2022-12-07 00:17:35,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.178.139.28', 'timestamp': 1670365055.6231232, 'message': 'Dec 7 00:17:34 hqnl0246134 sshd[269158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.139.28 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-07 00:17:35,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.8.68.56', 'timestamp': 1670365055.6234927, 'message': 'Dec 7 00:17:34 hqnl0246134 sshd[269156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.8.68.56 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-07 00:17:37,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.139.28', 'timestamp': 1670365057.6248786, 'message': 'Dec 7 00:17:36 hqnl0246134 sshd[269158]: Failed password for invalid user lx from 51.178.139.28 port 51042 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0587 seconds
INFO [2022-12-07 00:17:37,685] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.8.68.56', 'timestamp': 1670365057.6251502, 'message': 'Dec 7 00:17:36 hqnl0246134 sshd[269156]: Failed password for invalid user admin from 189.8.68.56 port 51460 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0591 seconds
INFO [2022-12-07 00:17:37,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365057.625552, 'message': 'Dec 7 00:17:36 hqnl0246134 sshd[269153]: Failed password for root from 61.177.173.18 port 42295 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0582 seconds
INFO [2022-12-07 00:17:37,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '51.178.139.28', 'timestamp': 1670365057.6253445, 'message': 'Dec 7 00:17:36 hqnl0246134 sshd[269158]: Disconnected from invalid user lx 51.178.139.28 port 51042 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 00:17:39,664] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.8.68.56', 'timestamp': 1670365059.627177, 'message': 'Dec 7 00:17:38 hqnl0246134 sshd[269156]: Disconnected from invalid user admin 189.8.68.56 port 51460 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-07 00:17:39,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365059.6274576, 'message': 'Dec 7 00:17:39 hqnl0246134 sshd[269153]: Failed password for root from 61.177.173.18 port 42295 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-07 00:17:41,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365061.6297452, 'message': 'Dec 7 00:17:41 hqnl0246134 sshd[269162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 00:17:43,651] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365063.6325104, 'message': 'Dec 7 00:17:42 hqnl0246134 sshd[269162]: Failed password for root from 165.227.166.207 port 35362 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-07 00:17:49,877] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:17:49,877] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:17:53,244] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 00:17:53,310] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 00:17:53,311] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 00:17:53,311] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 00:17:53,311] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 00:17:53,312] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 00:17:53,321] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 00:17:53,335] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0231 seconds
WARNING [2022-12-07 00:17:53,342] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 00:17:53,346] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:17:53,363] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0335 seconds
INFO [2022-12-07 00:17:53,365] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0320 seconds
WARNING [2022-12-07 00:18:11,253] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:18:11,284] defence360agent.internals.the_sink: SensorIncidentList(<19 item(s)>) processed in 0.0406 seconds
INFO [2022-12-07 00:18:13,698] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365093.6770737, 'message': 'Dec 7 00:18:13 hqnl0246134 sshd[269187]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.225.255.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 00:18:13,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365093.677438, 'message': 'Dec 7 00:18:13 hqnl0246134 sshd[269187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.255.28 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 00:18:15,697] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365095.6779146, 'message': 'Dec 7 00:18:15 hqnl0246134 sshd[269187]: Failed password for root from 14.225.255.28 port 52176 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:18:17,987] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:18:17,987] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:18:17,996] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:18:18,012] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0234 seconds
INFO [2022-12-07 00:18:19,792] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:18:19,792] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
INFO [2022-12-07 00:18:19,809] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365099.6832457, 'message': 'Dec 7 00:18:18 hqnl0246134 sshd[269191]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1252 seconds
INFO [2022-12-07 00:18:19,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '206.217.131.233', 'timestamp': 1670365099.6836665, 'message': 'Dec 7 00:18:19 hqnl0246134 sshd[269202]: pam_imunify(sshd:auth): [IM360_RBL] The IP 206.217.131.233 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1269 seconds
INFO [2022-12-07 00:18:19,814] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365099.6839235, 'message': 'Dec 7 00:18:19 hqnl0246134 sshd[269198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1278 seconds
WARNING [2022-12-07 00:18:19,833] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:18:19,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365099.6835203, 'message': 'Dec 7 00:18:18 hqnl0246134 sshd[269191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0598 seconds
INFO [2022-12-07 00:18:19,871] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0598 seconds
INFO [2022-12-07 00:18:19,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '206.217.131.233', 'timestamp': 1670365099.683773, 'message': 'Dec 7 00:18:19 hqnl0246134 sshd[269202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.217.131.233 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0591 seconds
INFO [2022-12-07 00:18:20,587] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:18:20,587] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:18:20,593] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:18:20,604] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0166 seconds
INFO [2022-12-07 00:18:21,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365101.685564, 'message': 'Dec 7 00:18:20 hqnl0246134 sshd[269191]: Failed password for root from 61.177.173.37 port 36930 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0456 seconds
INFO [2022-12-07 00:18:21,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '206.217.131.233', 'timestamp': 1670365101.6866713, 'message': 'Dec 7 00:18:20 hqnl0246134 sshd[269202]: Failed password for root from 206.217.131.233 port 46686 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0457 seconds
INFO [2022-12-07 00:18:21,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365101.6868305, 'message': 'Dec 7 00:18:20 hqnl0246134 sshd[269198]: Failed password for root from 61.177.173.18 port 62470 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0455 seconds
INFO [2022-12-07 00:18:23,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365103.687827, 'message': 'Dec 7 00:18:22 hqnl0246134 sshd[269191]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-07 00:18:23,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365103.6880383, 'message': 'Dec 7 00:18:23 hqnl0246134 sshd[269198]: Failed password for root from 61.177.173.18 port 62470 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-07 00:18:25,710] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365105.690437, 'message': 'Dec 7 00:18:24 hqnl0246134 sshd[269191]: Failed password for root from 61.177.173.37 port 36930 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 00:18:26,294] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 00:18:26,295] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 00:18:26,296] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-07 00:18:27,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365107.6932194, 'message': 'Dec 7 00:18:26 hqnl0246134 sshd[269191]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-07 00:18:27,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365107.6936433, 'message': 'Dec 7 00:18:27 hqnl0246134 sshd[269198]: Failed password for root from 61.177.173.18 port 62470 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0363 seconds
INFO [2022-12-07 00:18:29,714] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365109.696084, 'message': 'Dec 7 00:18:28 hqnl0246134 sshd[269191]: Failed password for root from 61.177.173.37 port 36930 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 00:18:31,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365111.69858, 'message': 'Dec 7 00:18:30 hqnl0246134 sshd[269219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 00:18:31,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365111.6987987, 'message': 'Dec 7 00:18:30 hqnl0246134 sshd[269219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 00:18:33,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365113.7004218, 'message': 'Dec 7 00:18:32 hqnl0246134 sshd[269219]: Failed password for root from 61.177.173.37 port 31322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 00:18:35,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365115.7029417, 'message': 'Dec 7 00:18:34 hqnl0246134 sshd[269219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-07 00:18:37,725] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365117.7069542, 'message': 'Dec 7 00:18:36 hqnl0246134 sshd[269219]: Failed password for root from 61.177.173.37 port 31322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 00:18:37,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365117.7071292, 'message': 'Dec 7 00:18:37 hqnl0246134 sshd[269219]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 00:18:39,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365119.7107062, 'message': 'Dec 7 00:18:38 hqnl0246134 sshd[269219]: Failed password for root from 61.177.173.37 port 31322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 00:18:41,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365121.7132902, 'message': 'Dec 7 00:18:40 hqnl0246134 sshd[269223]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 00:18:41,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365121.7134902, 'message': 'Dec 7 00:18:40 hqnl0246134 sshd[269223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-07 00:18:43,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365123.715778, 'message': 'Dec 7 00:18:43 hqnl0246134 sshd[269223]: Failed password for root from 61.177.173.37 port 53947 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 00:18:45,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365125.719465, 'message': 'Dec 7 00:18:45 hqnl0246134 sshd[269223]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 00:18:47,752] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365127.7221513, 'message': 'Dec 7 00:18:47 hqnl0246134 sshd[269223]: Failed password for root from 61.177.173.37 port 53947 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-07 00:18:49,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365129.7242408, 'message': 'Dec 7 00:18:49 hqnl0246134 sshd[269223]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-07 00:18:49,882] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:18:49,883] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:18:51,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365131.7291052, 'message': 'Dec 7 00:18:51 hqnl0246134 sshd[269223]: Failed password for root from 61.177.173.37 port 53947 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 00:18:53,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365133.73107, 'message': 'Dec 7 00:18:53 hqnl0246134 sshd[269226]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 00:18:53,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365133.7312856, 'message': 'Dec 7 00:18:53 hqnl0246134 sshd[269226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 00:18:55,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365135.7329266, 'message': 'Dec 7 00:18:55 hqnl0246134 sshd[269226]: Failed password for root from 61.177.173.37 port 37753 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 00:18:57,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365137.7355154, 'message': 'Dec 7 00:18:57 hqnl0246134 sshd[269226]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 00:18:59,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365139.7358468, 'message': 'Dec 7 00:18:59 hqnl0246134 sshd[269226]: Failed password for root from 61.177.173.37 port 37753 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:19:03,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365143.7421608, 'message': 'Dec 7 00:19:01 hqnl0246134 sshd[269226]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 00:19:03,776] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365143.7423675, 'message': 'Dec 7 00:19:03 hqnl0246134 sshd[269226]: Failed password for root from 61.177.173.37 port 37753 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-07 00:19:05,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365145.7451434, 'message': 'Dec 7 00:19:05 hqnl0246134 sshd[269245]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 00:19:05,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365145.7453806, 'message': 'Dec 7 00:19:05 hqnl0246134 sshd[269245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0161 seconds
INFO [2022-12-07 00:19:07,785] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365147.7501001, 'message': 'Dec 7 00:19:05 hqnl0246134 sshd[269247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-07 00:19:07,786] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365147.75034, 'message': 'Dec 7 00:19:07 hqnl0246134 sshd[269245]: Failed password for root from 61.177.173.37 port 24175 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-07 00:19:09,786] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365149.7551758, 'message': 'Dec 7 00:19:08 hqnl0246134 sshd[269247]: Failed password for root from 61.177.173.18 port 23944 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-07 00:19:09,787] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365149.755368, 'message': 'Dec 7 00:19:09 hqnl0246134 sshd[269245]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
WARNING [2022-12-07 00:19:11,254] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:19:11,275] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0286 seconds
INFO [2022-12-07 00:19:11,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365151.7587233, 'message': 'Dec 7 00:19:11 hqnl0246134 sshd[269245]: Failed password for root from 61.177.173.37 port 24175 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-07 00:19:13,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365153.761721, 'message': 'Dec 7 00:19:11 hqnl0246134 sshd[269245]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-07 00:19:13,797] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365153.762247, 'message': 'Dec 7 00:19:12 hqnl0246134 sshd[269247]: Failed password for root from 61.177.173.18 port 23944 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-07 00:19:15,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670365155.7633553, 'message': 'Dec 7 00:19:14 hqnl0246134 sshd[269245]: Failed password for root from 61.177.173.37 port 24175 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1028 seconds
INFO [2022-12-07 00:19:15,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365155.7638798, 'message': 'Dec 7 00:19:14 hqnl0246134 sshd[269247]: Failed password for root from 61.177.173.18 port 23944 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1021 seconds
INFO [2022-12-07 00:19:17,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.198.39.194', 'timestamp': 1670365157.76595, 'message': 'Dec 7 00:19:16 hqnl0246134 sshd[269279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.39.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-07 00:19:18,813] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:19:18,814] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:19:18,823] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:19:18,834] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 00:19:19,806] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '143.198.39.194', 'timestamp': 1670365159.767126, 'message': 'Dec 7 00:19:19 hqnl0246134 sshd[269279]: Failed password for root from 143.198.39.194 port 46890 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-07 00:19:21,691] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:19:21,692] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:19:21,698] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:19:21,709] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-07 00:19:29,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365169.78006, 'message': 'Dec 7 00:19:28 hqnl0246134 sshd[269298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0402 seconds
INFO [2022-12-07 00:19:31,802] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365171.7817855, 'message': 'Dec 7 00:19:30 hqnl0246134 sshd[269298]: Failed password for root from 165.227.166.207 port 45666 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 00:19:35,211] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:19:35,211] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:19:35,219] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:19:35,230] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
WARNING [2022-12-07 00:19:49,885] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:19:49,887] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:19:55,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365195.80823, 'message': 'Dec 7 00:19:53 hqnl0246134 sshd[269308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-07 00:19:57,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365197.8069456, 'message': 'Dec 7 00:19:56 hqnl0246134 sshd[269308]: Failed password for root from 61.177.173.18 port 42825 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-07 00:19:57,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '93.153.192.254', 'timestamp': 1670365197.8072808, 'message': 'Dec 7 00:19:57 hqnl0246134 sshd[269312]: Invalid user sonar from 93.153.192.254 port 32840', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-07 00:19:57,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '93.153.192.254', 'timestamp': 1670365197.8074522, 'message': 'Dec 7 00:19:57 hqnl0246134 sshd[269312]: pam_imunify(sshd:auth): [IM360_RBL] The IP 93.153.192.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 00:19:57,876] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '93.153.192.254', 'timestamp': 1670365197.8075807, 'message': 'Dec 7 00:19:57 hqnl0246134 sshd[269312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.153.192.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 00:19:59,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '93.153.192.254', 'timestamp': 1670365199.8075187, 'message': 'Dec 7 00:19:59 hqnl0246134 sshd[269312]: Failed password for invalid user sonar from 93.153.192.254 port 32840 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-07 00:20:01,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365201.8124342, 'message': 'Dec 7 00:20:00 hqnl0246134 sshd[269308]: Failed password for root from 61.177.173.18 port 42825 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1122 seconds
INFO [2022-12-07 00:20:01,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '93.153.192.254', 'timestamp': 1670365201.812807, 'message': 'Dec 7 00:20:01 hqnl0246134 sshd[269312]: Disconnected from invalid user sonar 93.153.192.254 port 32840 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1125 seconds
INFO [2022-12-07 00:20:05,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365205.8189952, 'message': 'Dec 7 00:20:04 hqnl0246134 sshd[269308]: Failed password for root from 61.177.173.18 port 42825 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
WARNING [2022-12-07 00:20:11,267] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:20:11,308] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0538 seconds
INFO [2022-12-07 00:20:13,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.240.88.36', 'timestamp': 1670365213.8322453, 'message': 'Dec 7 00:20:13 hqnl0246134 sshd[269349]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.240.88.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 00:20:13,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.240.88.36', 'timestamp': 1670365213.8325398, 'message': 'Dec 7 00:20:13 hqnl0246134 sshd[269349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 00:20:15,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.240.88.36', 'timestamp': 1670365215.8369498, 'message': 'Dec 7 00:20:15 hqnl0246134 sshd[269349]: Failed password for root from 45.240.88.36 port 50258 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 00:20:17,766] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:20:17,766] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:20:17,776] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:20:17,788] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-07 00:20:17,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.147.235', 'timestamp': 1670365217.839821, 'message': 'Dec 7 00:20:16 hqnl0246134 sshd[269353]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.147.235 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 00:20:17,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.147.235', 'timestamp': 1670365217.8400066, 'message': 'Dec 7 00:20:16 hqnl0246134 sshd[269353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.235 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 00:20:19,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.197.147.235', 'timestamp': 1670365219.8417697, 'message': 'Dec 7 00:20:19 hqnl0246134 sshd[269353]: Failed password for root from 138.197.147.235 port 59280 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:20:20,312] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:20:20,313] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:20:20,320] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:20:20,331] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-07 00:20:43,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365243.8833063, 'message': 'Dec 7 00:20:42 hqnl0246134 sshd[269375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-07 00:20:45,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365245.8846722, 'message': 'Dec 7 00:20:44 hqnl0246134 sshd[269375]: Failed password for root from 61.177.173.18 port 64036 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-07 00:20:49,891] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:20:49,892] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 00:21:11,266] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:21:11,298] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0407 seconds
INFO [2022-12-07 00:21:17,938] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:21:17,939] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:21:17,948] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:21:17,959] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-07 00:21:20,558] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:21:20,559] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:21:20,567] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:21:20,579] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-07 00:21:25,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365285.9312038, 'message': 'Dec 7 00:21:24 hqnl0246134 sshd[269413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 00:21:27,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365287.933224, 'message': 'Dec 7 00:21:26 hqnl0246134 sshd[269413]: Failed password for root from 165.227.166.207 port 55954 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-07 00:21:30,557] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:21:30,557] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:21:30,567] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:21:30,579] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-07 00:21:31,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365291.9360468, 'message': 'Dec 7 00:21:30 hqnl0246134 sshd[269427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-07 00:21:33,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365293.9404988, 'message': 'Dec 7 00:21:32 hqnl0246134 sshd[269427]: Failed password for root from 61.177.173.18 port 25296 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0499 seconds
INFO [2022-12-07 00:21:33,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.218.109.19', 'timestamp': 1670365293.94073, 'message': 'Dec 7 00:21:33 hqnl0246134 sshd[269423]: Invalid user epg from 20.218.109.19 port 47506', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0503 seconds
INFO [2022-12-07 00:21:33,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670365293.9411876, 'message': 'Dec 7 00:21:33 hqnl0246134 sshd[269432]: Invalid user install from 20.40.81.0 port 41570', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0490 seconds
INFO [2022-12-07 00:21:34,027] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.218.109.19', 'timestamp': 1670365293.9408915, 'message': 'Dec 7 00:21:33 hqnl0246134 sshd[269423]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.218.109.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-07 00:21:34,029] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.40.81.0', 'timestamp': 1670365293.9413722, 'message': 'Dec 7 00:21:33 hqnl0246134 sshd[269432]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.40.81.0 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-07 00:21:34,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.218.109.19', 'timestamp': 1670365293.9410179, 'message': 'Dec 7 00:21:33 hqnl0246134 sshd[269423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.218.109.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-07 00:21:34,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.40.81.0', 'timestamp': 1670365293.9415076, 'message': 'Dec 7 00:21:33 hqnl0246134 sshd[269432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.40.81.0 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-07 00:21:35,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.218.109.19', 'timestamp': 1670365295.942958, 'message': 'Dec 7 00:21:35 hqnl0246134 sshd[269423]: Failed password for invalid user epg from 20.218.109.19 port 47506 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 00:21:38,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670365297.9597375, 'message': 'Dec 7 00:21:36 hqnl0246134 sshd[269432]: Failed password for invalid user install from 20.40.81.0 port 41570 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1051 seconds
INFO [2022-12-07 00:21:38,067] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365297.9598997, 'message': 'Dec 7 00:21:36 hqnl0246134 sshd[269427]: Failed password for root from 61.177.173.18 port 25296 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1064 seconds
INFO [2022-12-07 00:21:38,068] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.218.109.19', 'timestamp': 1670365297.9600377, 'message': 'Dec 7 00:21:37 hqnl0246134 sshd[269423]: Disconnected from invalid user epg 20.218.109.19 port 47506 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1070 seconds
INFO [2022-12-07 00:21:38,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.68.156.60', 'timestamp': 1670365297.9601521, 'message': 'Dec 7 00:21:37 hqnl0246134 sshd[269435]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.68.156.60 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1069 seconds
INFO [2022-12-07 00:21:38,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.68.156.60', 'timestamp': 1670365297.9602509, 'message': 'Dec 7 00:21:37 hqnl0246134 sshd[269435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.68.156.60 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-07 00:21:39,990] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.40.81.0', 'timestamp': 1670365299.9574556, 'message': 'Dec 7 00:21:38 hqnl0246134 sshd[269432]: Disconnected from invalid user install 20.40.81.0 port 41570 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-07 00:21:39,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '189.68.156.60', 'timestamp': 1670365299.957999, 'message': 'Dec 7 00:21:39 hqnl0246134 sshd[269435]: Failed password for root from 189.68.156.60 port 51081 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-07 00:21:41,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365301.965265, 'message': 'Dec 7 00:21:40 hqnl0246134 sshd[269427]: Failed password for root from 61.177.173.18 port 25296 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-07 00:21:49,896] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:21:49,897] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 00:21:54,080] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-07 00:22:11,268] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:22:11,293] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0327 seconds
INFO [2022-12-07 00:22:16,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365336.0281096, 'message': 'Dec 7 00:22:15 hqnl0246134 sshd[269465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 00:22:17,943] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:22:17,944] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:22:17,952] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:22:17,965] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-07 00:22:18,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365338.0289354, 'message': 'Dec 7 00:22:17 hqnl0246134 sshd[269465]: Failed password for root from 61.177.173.18 port 34667 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-07 00:22:20,709] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:22:20,710] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:22:20,719] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:22:20,733] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-07 00:22:22,071] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365342.0407417, 'message': 'Dec 7 00:22:20 hqnl0246134 sshd[269465]: Failed password for root from 61.177.173.18 port 34667 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-07 00:22:22,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365342.040943, 'message': 'Dec 7 00:22:21 hqnl0246134 sshd[269475]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 00:22:22,092] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365342.0411232, 'message': 'Dec 7 00:22:21 hqnl0246134 sshd[269475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.53 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 00:22:24,068] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365344.0474846, 'message': 'Dec 7 00:22:23 hqnl0246134 sshd[269475]: Failed password for root from 61.177.173.53 port 44089 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-07 00:22:26,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365346.0505788, 'message': 'Dec 7 00:22:25 hqnl0246134 sshd[269465]: Failed password for root from 61.177.173.18 port 34667 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 00:22:26,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365346.0507722, 'message': 'Dec 7 00:22:25 hqnl0246134 sshd[269475]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-07 00:22:28,090] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365348.0652874, 'message': 'Dec 7 00:22:26 hqnl0246134 sshd[269475]: Failed password for root from 61.177.173.53 port 44089 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-07 00:22:28,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365348.0657022, 'message': 'Dec 7 00:22:27 hqnl0246134 sshd[269475]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 00:22:30,098] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365350.0667999, 'message': 'Dec 7 00:22:29 hqnl0246134 sshd[269475]: Failed password for root from 61.177.173.53 port 44089 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-07 00:22:30,098] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.157.26.210', 'timestamp': 1670365350.0670946, 'message': 'Dec 7 00:22:29 hqnl0246134 sshd[269490]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.157.26.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 00:22:30,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.157.26.210', 'timestamp': 1670365350.0672903, 'message': 'Dec 7 00:22:29 hqnl0246134 sshd[269490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.210 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 00:22:32,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.157.26.210', 'timestamp': 1670365352.075306, 'message': 'Dec 7 00:22:31 hqnl0246134 sshd[269490]: Failed password for root from 43.157.26.210 port 51980 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 00:22:32,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365352.0755334, 'message': 'Dec 7 00:22:31 hqnl0246134 sshd[269492]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-07 00:22:32,128] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365352.0756707, 'message': 'Dec 7 00:22:31 hqnl0246134 sshd[269492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.53 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-07 00:22:34,101] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365354.0775902, 'message': 'Dec 7 00:22:33 hqnl0246134 sshd[269492]: Failed password for root from 61.177.173.53 port 63234 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-07 00:22:36,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365356.0810716, 'message': 'Dec 7 00:22:35 hqnl0246134 sshd[269492]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-07 00:22:38,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365358.1689568, 'message': 'Dec 7 00:22:37 hqnl0246134 sshd[269492]: Failed password for root from 61.177.173.53 port 63234 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:22:38,208] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365358.1691692, 'message': 'Dec 7 00:22:37 hqnl0246134 sshd[269492]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 00:22:40,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670365360.0952816, 'message': 'Dec 7 00:22:39 hqnl0246134 sshd[269492]: Failed password for root from 61.177.173.53 port 63234 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 00:22:42,598] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:22:42,598] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:22:42,606] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:22:42,617] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
WARNING [2022-12-07 00:22:49,905] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:22:49,907] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:23:04,211] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.147.235', 'timestamp': 1670365384.1406624, 'message': 'Dec 7 00:23:03 hqnl0246134 sshd[269523]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.147.235 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0684 seconds
INFO [2022-12-07 00:23:04,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365384.1418736, 'message': 'Dec 7 00:23:03 hqnl0246134 sshd[269521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0686 seconds
INFO [2022-12-07 00:23:04,245] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.147.235', 'timestamp': 1670365384.1415427, 'message': 'Dec 7 00:23:03 hqnl0246134 sshd[269523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.235 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-07 00:23:06,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.197.147.235', 'timestamp': 1670365386.141443, 'message': 'Dec 7 00:23:05 hqnl0246134 sshd[269523]: Failed password for root from 138.197.147.235 port 42578 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0490 seconds
INFO [2022-12-07 00:23:06,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365386.1417718, 'message': 'Dec 7 00:23:05 hqnl0246134 sshd[269521]: Failed password for root from 61.177.173.18 port 63214 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0494 seconds
INFO [2022-12-07 00:23:08,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365388.2864904, 'message': 'Dec 7 00:23:08 hqnl0246134 sshd[269521]: Failed password for root from 61.177.173.18 port 63214 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-07 00:23:11,271] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:23:11,295] defence360agent.internals.the_sink: SensorIncidentList(<12 item(s)>) processed in 0.0323 seconds
INFO [2022-12-07 00:23:14,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365394.147792, 'message': 'Dec 7 00:23:12 hqnl0246134 sshd[269521]: Failed password for root from 61.177.173.18 port 63214 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 00:23:16,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365396.1501935, 'message': 'Dec 7 00:23:14 hqnl0246134 sshd[269548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 00:23:17,990] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:23:17,990] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:23:18,001] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:23:18,019] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0282 seconds
INFO [2022-12-07 00:23:18,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365398.1523192, 'message': 'Dec 7 00:23:16 hqnl0246134 sshd[269548]: Failed password for root from 165.227.166.207 port 38006 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-07 00:23:20,821] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:23:20,822] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:23:20,830] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:23:20,842] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
WARNING [2022-12-07 00:23:49,909] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:23:49,910] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:23:50,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365430.232821, 'message': 'Dec 7 00:23:49 hqnl0246134 sshd[269570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-07 00:23:50,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365430.2335095, 'message': 'Dec 7 00:23:49 hqnl0246134 sshd[269572]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.225.255.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-07 00:23:50,294] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365430.23375, 'message': 'Dec 7 00:23:49 hqnl0246134 sshd[269572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.255.28 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 00:23:52,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365432.2345395, 'message': 'Dec 7 00:23:50 hqnl0246134 sshd[269570]: Failed password for root from 61.177.173.18 port 21040 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1304 seconds
INFO [2022-12-07 00:23:52,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365432.2348297, 'message': 'Dec 7 00:23:51 hqnl0246134 sshd[269572]: Failed password for root from 14.225.255.28 port 34868 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1306 seconds
INFO [2022-12-07 00:23:54,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365434.2364564, 'message': 'Dec 7 00:23:53 hqnl0246134 sshd[269570]: Failed password for root from 61.177.173.18 port 21040 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-07 00:23:54,759] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:23:54,759] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:23:54,766] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:23:54,779] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 00:23:58,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365438.2409105, 'message': 'Dec 7 00:23:57 hqnl0246134 sshd[269570]: Failed password for root from 61.177.173.18 port 21040 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
WARNING [2022-12-07 00:24:11,282] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:24:11,320] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0517 seconds
INFO [2022-12-07 00:24:18,136] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:24:18,137] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:24:18,144] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:24:18,156] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-07 00:24:20,840] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:24:20,841] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:24:20,851] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:24:20,864] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-07 00:24:36,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365476.2807689, 'message': 'Dec 7 00:24:35 hqnl0246134 sshd[269623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-07 00:24:38,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365478.2816188, 'message': 'Dec 7 00:24:37 hqnl0246134 sshd[269623]: Failed password for root from 61.177.173.18 port 43509 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 00:24:46,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.40.81.0', 'timestamp': 1670365486.288742, 'message': 'Dec 7 00:24:44 hqnl0246134 sshd[269627]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.40.81.0 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 00:24:46,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.40.81.0', 'timestamp': 1670365486.2889671, 'message': 'Dec 7 00:24:44 hqnl0246134 sshd[269627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.40.81.0 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 00:24:46,357] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.40.81.0', 'timestamp': 1670365486.2891774, 'message': 'Dec 7 00:24:46 hqnl0246134 sshd[269627]: Failed password for root from 20.40.81.0 port 33734 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0255 seconds
WARNING [2022-12-07 00:24:49,913] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:24:49,914] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:24:54,300] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 00:24:54,373] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 00:24:54,374] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 00:24:54,374] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 00:24:54,374] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 00:24:54,375] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 00:24:54,390] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 00:24:54,419] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0437 seconds
WARNING [2022-12-07 00:24:54,432] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 00:24:54,436] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:24:54,458] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0489 seconds
INFO [2022-12-07 00:24:54,459] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0445 seconds
INFO [2022-12-07 00:25:04,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.157.26.210', 'timestamp': 1670365504.3061223, 'message': 'Dec 7 00:25:03 hqnl0246134 sshd[269659]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.157.26.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 00:25:04,359] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.157.26.210', 'timestamp': 1670365504.306928, 'message': 'Dec 7 00:25:03 hqnl0246134 sshd[269659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.210 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 00:25:06,337] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.157.26.210', 'timestamp': 1670365506.3064845, 'message': 'Dec 7 00:25:05 hqnl0246134 sshd[269659]: Failed password for root from 43.157.26.210 port 40906 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-07 00:25:06,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.68.156.60', 'timestamp': 1670365506.306775, 'message': 'Dec 7 00:25:06 hqnl0246134 sshd[269661]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.68.156.60 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 00:25:06,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.68.156.60', 'timestamp': 1670365506.306974, 'message': 'Dec 7 00:25:06 hqnl0246134 sshd[269661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.68.156.60 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 00:25:08,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '189.68.156.60', 'timestamp': 1670365508.3063805, 'message': 'Dec 7 00:25:08 hqnl0246134 sshd[269661]: Failed password for root from 189.68.156.60 port 27789 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 00:25:08,471] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:25:08,472] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:25:08,479] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:25:08,491] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
WARNING [2022-12-07 00:25:11,281] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:25:11,305] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0315 seconds
INFO [2022-12-07 00:25:12,337] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365512.3197985, 'message': 'Dec 7 00:25:10 hqnl0246134 sshd[269674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 00:25:14,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365514.321814, 'message': 'Dec 7 00:25:12 hqnl0246134 sshd[269674]: Failed password for root from 165.227.166.207 port 48312 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 00:25:17,892] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:25:17,892] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:25:17,902] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:25:17,919] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0257 seconds
INFO [2022-12-07 00:25:20,562] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:25:20,562] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:25:20,571] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:25:20,583] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 00:25:24,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365524.3311663, 'message': 'Dec 7 00:25:22 hqnl0246134 sshd[269692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-07 00:25:26,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365526.3318536, 'message': 'Dec 7 00:25:24 hqnl0246134 sshd[269692]: Failed password for root from 61.177.173.18 port 10213 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-07 00:25:30,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365530.350438, 'message': 'Dec 7 00:25:27 hqnl0246134 sshd[269692]: Failed password for root from 61.177.173.18 port 10213 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 00:25:31,835] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 00:25:31,835] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 00:25:31,836] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-07 00:25:32,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365532.3530474, 'message': 'Dec 7 00:25:30 hqnl0246134 sshd[269692]: Failed password for root from 61.177.173.18 port 10213 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-07 00:25:42,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.147.235', 'timestamp': 1670365542.362382, 'message': 'Dec 7 00:25:40 hqnl0246134 sshd[269708]: Invalid user b from 138.197.147.235 port 38456', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 00:25:42,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.147.235', 'timestamp': 1670365542.3655183, 'message': 'Dec 7 00:25:40 hqnl0246134 sshd[269708]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.147.235 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 00:25:42,428] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.147.235', 'timestamp': 1670365542.3657415, 'message': 'Dec 7 00:25:40 hqnl0246134 sshd[269708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.235 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 00:25:44,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.147.235', 'timestamp': 1670365544.3675992, 'message': 'Dec 7 00:25:42 hqnl0246134 sshd[269708]: Failed password for invalid user b from 138.197.147.235 port 38456 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 00:25:44,404] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.147.235', 'timestamp': 1670365544.3677979, 'message': 'Dec 7 00:25:43 hqnl0246134 sshd[269708]: Disconnected from invalid user b 138.197.147.235 port 38456 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-07 00:25:49,917] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:25:49,918] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:26:10,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365570.4096603, 'message': 'Dec 7 00:26:09 hqnl0246134 sshd[269728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0250 seconds
WARNING [2022-12-07 00:26:11,288] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:26:11,308] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0282 seconds
INFO [2022-12-07 00:26:12,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365572.4164789, 'message': 'Dec 7 00:26:11 hqnl0246134 sshd[269728]: Failed password for root from 61.177.173.18 port 28292 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 00:26:18,027] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:26:18,028] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:26:18,036] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:26:18,048] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-07 00:26:18,755] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:26:18,756] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:26:18,762] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:26:18,773] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-07 00:26:20,897] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:26:20,897] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:26:20,909] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:26:20,932] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0341 seconds
WARNING [2022-12-07 00:26:49,921] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:26:49,922] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:26:56,496] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365616.474273, 'message': 'Dec 7 00:26:56 hqnl0246134 sshd[269757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 00:26:58,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365618.4750965, 'message': 'Dec 7 00:26:58 hqnl0246134 sshd[269757]: Failed password for root from 61.177.173.18 port 41401 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-07 00:27:04,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365624.481008, 'message': 'Dec 7 00:27:03 hqnl0246134 sshd[269757]: Failed password for root from 61.177.173.18 port 41401 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-07 00:27:10,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365630.49007, 'message': 'Dec 7 00:27:07 hqnl0246134 sshd[269757]: Failed password for root from 61.177.173.18 port 41401 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 00:27:10,520] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365630.490415, 'message': 'Dec 7 00:27:08 hqnl0246134 sshd[269783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0289 seconds
WARNING [2022-12-07 00:27:11,300] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:27:11,333] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0465 seconds
INFO [2022-12-07 00:27:12,511] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365632.4931376, 'message': 'Dec 7 00:27:10 hqnl0246134 sshd[269783]: Failed password for root from 165.227.166.207 port 58594 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 00:27:17,896] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:27:17,897] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:27:17,905] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:27:17,917] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-07 00:27:20,502] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:27:20,503] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:27:20,510] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:27:20,523] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-07 00:27:24,527] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365644.5060995, 'message': 'Dec 7 00:27:23 hqnl0246134 sshd[269797]: Invalid user webadmin from 14.225.255.28 port 52362', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 00:27:24,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365644.5064669, 'message': 'Dec 7 00:27:23 hqnl0246134 sshd[269797]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.225.255.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-07 00:27:24,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365644.5066695, 'message': 'Dec 7 00:27:23 hqnl0246134 sshd[269797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.255.28 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 00:27:26,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365646.5070062, 'message': 'Dec 7 00:27:25 hqnl0246134 sshd[269797]: Failed password for invalid user webadmin from 14.225.255.28 port 52362 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 00:27:28,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365648.509379, 'message': 'Dec 7 00:27:27 hqnl0246134 sshd[269797]: Disconnected from invalid user webadmin 14.225.255.28 port 52362 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-07 00:27:30,562] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:27:30,563] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:27:30,571] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:27:30,583] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-07 00:27:44,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365664.5330794, 'message': 'Dec 7 00:27:43 hqnl0246134 sshd[269816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 00:27:46,556] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365666.5336866, 'message': 'Dec 7 00:27:44 hqnl0246134 sshd[269816]: Failed password for root from 61.177.173.18 port 55690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-07 00:27:48,571] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365668.5378284, 'message': 'Dec 7 00:27:46 hqnl0246134 sshd[269816]: Failed password for root from 61.177.173.18 port 55690 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 00:27:48,571] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670365668.538062, 'message': 'Dec 7 00:27:47 hqnl0246134 sshd[269819]: Invalid user console from 43.157.26.210 port 58066', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-07 00:27:48,591] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.157.26.210', 'timestamp': 1670365668.5383027, 'message': 'Dec 7 00:27:47 hqnl0246134 sshd[269819]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.157.26.210 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 00:27:48,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.157.26.210', 'timestamp': 1670365668.5384881, 'message': 'Dec 7 00:27:47 hqnl0246134 sshd[269819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.210 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-07 00:27:49,926] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:27:49,927] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:27:50,567] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670365670.53819, 'message': 'Dec 7 00:27:50 hqnl0246134 sshd[269819]: Failed password for invalid user console from 43.157.26.210 port 58066 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-07 00:27:50,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365670.5384085, 'message': 'Dec 7 00:27:50 hqnl0246134 sshd[269816]: Failed password for root from 61.177.173.18 port 55690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-07 00:27:54,560] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.157.26.210', 'timestamp': 1670365674.5421786, 'message': 'Dec 7 00:27:52 hqnl0246134 sshd[269819]: Disconnected from invalid user console 43.157.26.210 port 58066 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 00:28:04,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.218.109.19', 'timestamp': 1670365684.565585, 'message': 'Dec 7 00:28:02 hqnl0246134 sshd[269861]: Invalid user composer from 20.218.109.19 port 40192', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0378 seconds
INFO [2022-12-07 00:28:04,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.218.109.19', 'timestamp': 1670365684.5662751, 'message': 'Dec 7 00:28:03 hqnl0246134 sshd[269861]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.218.109.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 00:28:04,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.218.109.19', 'timestamp': 1670365684.5666084, 'message': 'Dec 7 00:28:03 hqnl0246134 sshd[269861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.218.109.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 00:28:06,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.218.109.19', 'timestamp': 1670365686.5663917, 'message': 'Dec 7 00:28:05 hqnl0246134 sshd[269861]: Failed password for invalid user composer from 20.218.109.19 port 40192 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 00:28:06,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '20.218.109.19', 'timestamp': 1670365686.5666516, 'message': 'Dec 7 00:28:06 hqnl0246134 sshd[269861]: Disconnected from invalid user composer 20.218.109.19 port 40192 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0166 seconds
WARNING [2022-12-07 00:28:11,301] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:28:11,330] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0380 seconds
INFO [2022-12-07 00:28:12,599] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.40.81.0', 'timestamp': 1670365692.580221, 'message': 'Dec 7 00:28:10 hqnl0246134 sshd[269864]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.40.81.0 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 00:28:12,617] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.40.81.0', 'timestamp': 1670365692.580534, 'message': 'Dec 7 00:28:10 hqnl0246134 sshd[269864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.40.81.0 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 00:28:14,601] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.40.81.0', 'timestamp': 1670365694.5826714, 'message': 'Dec 7 00:28:13 hqnl0246134 sshd[269864]: Failed password for root from 20.40.81.0 port 36284 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 00:28:17,803] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:28:17,803] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:28:17,812] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:28:17,823] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-07 00:28:20,361] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:28:20,362] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:28:20,372] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:28:20,384] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-07 00:28:30,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365710.607438, 'message': 'Dec 7 00:28:30 hqnl0246134 sshd[269887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-07 00:28:32,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365712.6105313, 'message': 'Dec 7 00:28:32 hqnl0246134 sshd[269887]: Failed password for root from 61.177.173.18 port 21610 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 00:28:40,643] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.68.156.60', 'timestamp': 1670365720.6224113, 'message': 'Dec 7 00:28:38 hqnl0246134 sshd[269890]: Invalid user matteo from 189.68.156.60 port 23376', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 00:28:40,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '189.68.156.60', 'timestamp': 1670365720.622686, 'message': 'Dec 7 00:28:38 hqnl0246134 sshd[269890]: pam_imunify(sshd:auth): [IM360_RBL] The IP 189.68.156.60 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 00:28:40,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '189.68.156.60', 'timestamp': 1670365720.6230087, 'message': 'Dec 7 00:28:38 hqnl0246134 sshd[269890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.68.156.60 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 00:28:40,702] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.68.156.60', 'timestamp': 1670365720.6231987, 'message': 'Dec 7 00:28:40 hqnl0246134 sshd[269890]: Failed password for invalid user matteo from 189.68.156.60 port 23376 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 00:28:40,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '189.68.156.60', 'timestamp': 1670365720.6233723, 'message': 'Dec 7 00:28:40 hqnl0246134 sshd[269890]: Disconnected from invalid user matteo 189.68.156.60 port 23376 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-07 00:28:49,932] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:28:49,932] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:29:08,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365748.6570287, 'message': 'Dec 7 00:29:07 hqnl0246134 sshd[269910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-07 00:29:10,691] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365750.6583624, 'message': 'Dec 7 00:29:10 hqnl0246134 sshd[269910]: Failed password for root from 165.227.166.207 port 40642 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0324 seconds
WARNING [2022-12-07 00:29:11,312] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:29:11,352] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0527 seconds
INFO [2022-12-07 00:29:12,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365752.6613398, 'message': 'Dec 7 00:29:12 hqnl0246134 sshd[269912]: pam_imunify(sshd:auth): [IM360_RBL] The IP 91.240.118.172 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 00:29:12,703] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365752.6615539, 'message': 'Dec 7 00:29:12 hqnl0246134 sshd[269912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.240.118.172 user=mysql', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 00:29:14,383] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:29:14,384] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:29:14,391] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:29:14,404] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-07 00:29:14,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365754.6635745, 'message': 'Dec 7 00:29:14 hqnl0246134 sshd[269912]: Failed password for mysql from 91.240.118.172 port 26453 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 00:29:16,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365756.6677287, 'message': 'Dec 7 00:29:15 hqnl0246134 sshd[269920]: Invalid user natalia from 91.240.118.172 port 29708', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-07 00:29:16,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365756.6682494, 'message': 'Dec 7 00:29:15 hqnl0246134 sshd[269920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 91.240.118.172 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-07 00:29:16,778] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365756.668559, 'message': 'Dec 7 00:29:15 hqnl0246134 sshd[269920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.240.118.172 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-07 00:29:17,765] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:29:17,765] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:29:17,772] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:29:17,787] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-07 00:29:18,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365758.671439, 'message': 'Dec 7 00:29:17 hqnl0246134 sshd[269920]: Failed password for invalid user natalia from 91.240.118.172 port 29708 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0436 seconds
INFO [2022-12-07 00:29:18,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365758.6719384, 'message': 'Dec 7 00:29:17 hqnl0246134 sshd[269923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0437 seconds
INFO [2022-12-07 00:29:18,735] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365758.67213, 'message': 'Dec 7 00:29:18 hqnl0246134 sshd[269920]: Disconnected from invalid user natalia 91.240.118.172 port 29708 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 00:29:18,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365758.6724238, 'message': 'Dec 7 00:29:18 hqnl0246134 sshd[269930]: Invalid user peter from 91.240.118.172 port 32984', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 00:29:20,434] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:29:20,434] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:29:20,441] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:29:20,452] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-07 00:29:20,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365760.6699746, 'message': 'Dec 7 00:29:18 hqnl0246134 sshd[269930]: pam_imunify(sshd:auth): [IM360_RBL] The IP 91.240.118.172 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0655 seconds
INFO [2022-12-07 00:29:20,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365760.6703255, 'message': 'Dec 7 00:29:19 hqnl0246134 sshd[269923]: Failed password for root from 61.177.173.18 port 47139 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0668 seconds
INFO [2022-12-07 00:29:20,773] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365760.670209, 'message': 'Dec 7 00:29:18 hqnl0246134 sshd[269930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.240.118.172 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-07 00:29:22,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365762.6734214, 'message': 'Dec 7 00:29:20 hqnl0246134 sshd[269930]: Failed password for invalid user peter from 91.240.118.172 port 32984 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 00:29:22,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365762.6743782, 'message': 'Dec 7 00:29:20 hqnl0246134 sshd[269930]: Disconnected from invalid user peter 91.240.118.172 port 32984 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-07 00:29:22,732] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365762.6748652, 'message': 'Dec 7 00:29:22 hqnl0246134 sshd[269923]: Failed password for root from 61.177.173.18 port 47139 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0392 seconds
INFO [2022-12-07 00:29:22,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365762.6744852, 'message': 'Dec 7 00:29:21 hqnl0246134 sshd[269936]: Invalid user pi from 91.240.118.172 port 35542', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 00:29:22,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365762.6746254, 'message': 'Dec 7 00:29:21 hqnl0246134 sshd[269936]: pam_imunify(sshd:auth): [IM360_RBL] The IP 91.240.118.172 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 00:29:22,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365762.67475, 'message': 'Dec 7 00:29:21 hqnl0246134 sshd[269936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.240.118.172 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 00:29:24,693] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365764.6742342, 'message': 'Dec 7 00:29:23 hqnl0246134 sshd[269936]: Failed password for invalid user pi from 91.240.118.172 port 35542 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 00:29:24,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365764.6744182, 'message': 'Dec 7 00:29:23 hqnl0246134 sshd[269936]: Disconnected from invalid user pi 91.240.118.172 port 35542 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 00:29:24,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365764.6745644, 'message': 'Dec 7 00:29:23 hqnl0246134 sshd[269938]: Invalid user pi from 91.240.118.172 port 37989', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 00:29:24,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365764.6746922, 'message': 'Dec 7 00:29:24 hqnl0246134 sshd[269938]: pam_imunify(sshd:auth): [IM360_RBL] The IP 91.240.118.172 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 00:29:24,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365764.6748111, 'message': 'Dec 7 00:29:24 hqnl0246134 sshd[269938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.240.118.172 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 00:29:26,491] defence360agent.files: Updating all files
INFO [2022-12-07 00:29:26,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365766.6780052, 'message': 'Dec 7 00:29:25 hqnl0246134 sshd[269938]: Failed password for invalid user pi from 91.240.118.172 port 37989 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-07 00:29:26,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365766.6782198, 'message': 'Dec 7 00:29:26 hqnl0246134 sshd[269923]: Failed password for root from 61.177.173.18 port 47139 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-07 00:29:26,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '91.240.118.172', 'timestamp': 1670365766.6783552, 'message': 'Dec 7 00:29:26 hqnl0246134 sshd[269938]: Disconnected from invalid user pi 91.240.118.172 port 37989 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-07 00:29:26,785] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-07 00:29:26,786] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-07 00:29:27,122] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-07 00:29:27,122] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-07 00:29:27,446] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-07 00:29:27,447] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-07 00:29:27,734] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-07 00:29:27,734] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-07 00:29:27,734] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-07 00:29:27,992] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 22:29:27 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E54D0E44A831E'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-07 00:29:27,993] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-07 00:29:27,994] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-07 00:29:28,567] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-07 00:29:28,567] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-07 00:29:28,825] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-07 00:29:28,825] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-07 00:29:29,098] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-07 00:29:29,099] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-07 00:29:29,440] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-07 00:29:29,441] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-07 00:29:29,830] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-07 00:29:29,831] defence360agent.files: geo files update finished (not updated)
WARNING [2022-12-07 00:29:49,935] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:29:49,937] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:30:06,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365806.7435033, 'message': 'Dec 7 00:30:05 hqnl0246134 sshd[269982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-07 00:30:08,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365808.7472267, 'message': 'Dec 7 00:30:07 hqnl0246134 sshd[269982]: Failed password for root from 61.177.173.18 port 17671 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
WARNING [2022-12-07 00:30:11,311] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:30:11,331] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0276 seconds
INFO [2022-12-07 00:30:17,762] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:30:17,763] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:30:17,775] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:30:17,793] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0280 seconds
INFO [2022-12-07 00:30:20,533] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:30:20,534] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:30:20,540] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:30:20,552] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-07 00:30:48,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365848.8068657, 'message': 'Dec 7 00:30:48 hqnl0246134 sshd[270016]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-07 00:30:48,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365848.8073888, 'message': 'Dec 7 00:30:48 hqnl0246134 sshd[270016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0237 seconds
WARNING [2022-12-07 00:30:49,946] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:30:49,947] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:30:50,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365850.8084898, 'message': 'Dec 7 00:30:50 hqnl0246134 sshd[270018]: pam_imunify(sshd:auth): [IM360_RBL] The IP 14.225.255.28 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0565 seconds
INFO [2022-12-07 00:30:50,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365850.8088076, 'message': 'Dec 7 00:30:50 hqnl0246134 sshd[270016]: Failed password for root from 61.177.173.46 port 51082 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0575 seconds
INFO [2022-12-07 00:30:50,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365850.8089309, 'message': 'Dec 7 00:30:50 hqnl0246134 sshd[270020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0577 seconds
INFO [2022-12-07 00:30:50,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365850.8086934, 'message': 'Dec 7 00:30:50 hqnl0246134 sshd[270018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.255.28 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 00:30:52,855] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '14.225.255.28', 'timestamp': 1670365852.8112948, 'message': 'Dec 7 00:30:52 hqnl0246134 sshd[270018]: Failed password for root from 14.225.255.28 port 41600 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-07 00:30:52,856] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365852.8115175, 'message': 'Dec 7 00:30:52 hqnl0246134 sshd[270016]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-07 00:30:52,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365852.8116329, 'message': 'Dec 7 00:30:52 hqnl0246134 sshd[270020]: Failed password for root from 61.177.173.18 port 25504 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0439 seconds
INFO [2022-12-07 00:30:54,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365854.8144467, 'message': 'Dec 7 00:30:54 hqnl0246134 sshd[270016]: Failed password for root from 61.177.173.46 port 51082 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 00:30:54,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365854.8147695, 'message': 'Dec 7 00:30:54 hqnl0246134 sshd[270016]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-07 00:30:56,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365856.814299, 'message': 'Dec 7 00:30:56 hqnl0246134 sshd[270020]: Failed password for root from 61.177.173.18 port 25504 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 00:30:56,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365856.8145483, 'message': 'Dec 7 00:30:56 hqnl0246134 sshd[270016]: Failed password for root from 61.177.173.46 port 51082 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 00:30:57,092] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:30:57,093] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:30:57,100] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:30:57,113] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-07 00:30:58,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365858.8147683, 'message': 'Dec 7 00:30:58 hqnl0246134 sshd[270020]: Failed password for root from 61.177.173.18 port 25504 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-07 00:30:58,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365858.815232, 'message': 'Dec 7 00:30:58 hqnl0246134 sshd[270027]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0433 seconds
INFO [2022-12-07 00:30:58,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365858.8153617, 'message': 'Dec 7 00:30:58 hqnl0246134 sshd[270027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 00:31:00,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365860.8186233, 'message': 'Dec 7 00:31:00 hqnl0246134 sshd[270027]: Failed password for root from 61.177.173.46 port 21466 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-07 00:31:02,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365862.820977, 'message': 'Dec 7 00:31:02 hqnl0246134 sshd[270027]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-07 00:31:04,849] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365864.8221538, 'message': 'Dec 7 00:31:04 hqnl0246134 sshd[270027]: Failed password for root from 61.177.173.46 port 21466 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-07 00:31:06,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365866.8248248, 'message': 'Dec 7 00:31:05 hqnl0246134 sshd[270027]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 00:31:08,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670365868.8263004, 'message': 'Dec 7 00:31:07 hqnl0246134 sshd[270027]: Failed password for root from 61.177.173.46 port 21466 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
WARNING [2022-12-07 00:31:11,316] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:31:11,343] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0360 seconds
INFO [2022-12-07 00:31:12,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365872.833503, 'message': 'Dec 7 00:31:12 hqnl0246134 sshd[270046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 00:31:14,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365874.835341, 'message': 'Dec 7 00:31:14 hqnl0246134 sshd[270046]: Failed password for root from 165.227.166.207 port 50928 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-07 00:31:17,781] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:31:17,782] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:31:17,791] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:31:17,803] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 00:31:20,513] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:31:20,513] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:31:20,522] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:31:20,534] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-07 00:31:38,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365898.866776, 'message': 'Dec 7 00:31:36 hqnl0246134 sshd[270066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-07 00:31:38,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365898.8672059, 'message': 'Dec 7 00:31:38 hqnl0246134 sshd[270066]: Failed password for root from 61.177.173.18 port 41597 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-07 00:31:49,953] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:31:49,954] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 00:31:54,083] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-07 00:32:11,328] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:32:11,374] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0634 seconds
INFO [2022-12-07 00:32:14,654] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 00:32:14,719] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 00:32:14,720] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 00:32:14,720] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 00:32:14,720] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 00:32:14,721] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 00:32:14,729] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 00:32:14,746] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0247 seconds
WARNING [2022-12-07 00:32:14,753] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 00:32:14,755] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:32:14,772] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0318 seconds
INFO [2022-12-07 00:32:14,774] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0298 seconds
INFO [2022-12-07 00:32:17,877] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:32:17,878] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:32:17,886] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:32:17,897] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-07 00:32:21,156] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:32:21,157] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:32:21,200] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:32:21,253] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0821 seconds
INFO [2022-12-07 00:32:26,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365946.922283, 'message': 'Dec 7 00:32:24 hqnl0246134 sshd[270110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-07 00:32:28,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365948.922344, 'message': 'Dec 7 00:32:27 hqnl0246134 sshd[270110]: Failed password for root from 61.177.173.18 port 64302 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 00:32:32,953] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365952.9268425, 'message': 'Dec 7 00:32:31 hqnl0246134 sshd[270110]: Failed password for root from 61.177.173.18 port 64302 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-07 00:32:36,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365956.9304695, 'message': 'Dec 7 00:32:35 hqnl0246134 sshd[270110]: Failed password for root from 61.177.173.18 port 64302 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 00:32:38,880] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:32:38,880] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:32:38,890] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:32:38,903] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
WARNING [2022-12-07 00:32:49,958] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:32:49,959] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:32:50,985] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 00:32:50,986] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 00:32:50,986] im360.plugins.client360: Waiting 5 minutes before retry...
WARNING [2022-12-07 00:33:11,322] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:33:11,341] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0275 seconds
INFO [2022-12-07 00:33:12,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365992.9691422, 'message': 'Dec 7 00:33:12 hqnl0246134 sshd[270147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 00:33:17,002] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670365996.9730158, 'message': 'Dec 7 00:33:15 hqnl0246134 sshd[270147]: Failed password for root from 61.177.173.18 port 24954 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-07 00:33:17,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365996.9732816, 'message': 'Dec 7 00:33:15 hqnl0246134 sshd[270149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-07 00:33:17,919] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:33:17,919] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:33:17,927] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:33:17,938] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 00:33:19,013] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670365998.9743066, 'message': 'Dec 7 00:33:17 hqnl0246134 sshd[270149]: Failed password for root from 165.227.166.207 port 32996 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-07 00:33:20,557] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:33:20,557] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:33:20,565] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:33:20,578] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-07 00:33:21,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366000.9771779, 'message': 'Dec 7 00:33:19 hqnl0246134 sshd[270147]: Failed password for root from 61.177.173.18 port 24954 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-07 00:33:25,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366004.982009, 'message': 'Dec 7 00:33:23 hqnl0246134 sshd[270147]: Failed password for root from 61.177.173.18 port 24954 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-07 00:33:45,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366024.9926605, 'message': 'Dec 7 00:33:43 hqnl0246134 sshd[270195]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-07 00:33:45,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366024.9934099, 'message': 'Dec 7 00:33:43 hqnl0246134 sshd[270195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-07 00:33:47,014] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366026.9933202, 'message': 'Dec 7 00:33:46 hqnl0246134 sshd[270195]: Failed password for root from 61.177.173.36 port 64726 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 00:33:49,024] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366028.9963396, 'message': 'Dec 7 00:33:47 hqnl0246134 sshd[270195]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0277 seconds
WARNING [2022-12-07 00:33:49,962] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:33:49,963] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:33:51,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366030.9987295, 'message': 'Dec 7 00:33:49 hqnl0246134 sshd[270195]: Failed password for root from 61.177.173.36 port 64726 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-07 00:33:51,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366030.9989681, 'message': 'Dec 7 00:33:49 hqnl0246134 sshd[270195]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 00:33:53,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366033.0011191, 'message': 'Dec 7 00:33:52 hqnl0246134 sshd[270195]: Failed password for root from 61.177.173.36 port 64726 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 00:33:56,811] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:33:56,811] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:33:56,819] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:33:56,830] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-07 00:33:57,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366037.004143, 'message': 'Dec 7 00:33:55 hqnl0246134 sshd[270202]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 00:33:57,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366037.0045028, 'message': 'Dec 7 00:33:55 hqnl0246134 sshd[270202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 00:33:59,027] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366039.007164, 'message': 'Dec 7 00:33:58 hqnl0246134 sshd[270202]: Failed password for root from 61.177.173.36 port 33950 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 00:34:01,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366041.0097795, 'message': 'Dec 7 00:34:00 hqnl0246134 sshd[270202]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 00:34:03,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366043.0123243, 'message': 'Dec 7 00:34:01 hqnl0246134 sshd[270215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-07 00:34:03,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366043.012551, 'message': 'Dec 7 00:34:02 hqnl0246134 sshd[270202]: Failed password for root from 61.177.173.36 port 33950 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-07 00:34:05,049] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366045.0143094, 'message': 'Dec 7 00:34:04 hqnl0246134 sshd[270215]: Failed password for root from 61.177.173.18 port 51285 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-07 00:34:05,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366045.0145452, 'message': 'Dec 7 00:34:04 hqnl0246134 sshd[270202]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-07 00:34:07,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366047.016738, 'message': 'Dec 7 00:34:06 hqnl0246134 sshd[270202]: Failed password for root from 61.177.173.36 port 33950 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-07 00:34:09,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366049.017958, 'message': 'Dec 7 00:34:08 hqnl0246134 sshd[270215]: Failed password for root from 61.177.173.18 port 51285 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 00:34:11,038] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366051.0203226, 'message': 'Dec 7 00:34:10 hqnl0246134 sshd[270229]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 00:34:11,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366051.0205264, 'message': 'Dec 7 00:34:10 hqnl0246134 sshd[270229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
WARNING [2022-12-07 00:34:11,327] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:34:11,349] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0302 seconds
INFO [2022-12-07 00:34:13,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366053.0305896, 'message': 'Dec 7 00:34:12 hqnl0246134 sshd[270215]: Failed password for root from 61.177.173.18 port 51285 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-07 00:34:13,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366053.0308485, 'message': 'Dec 7 00:34:12 hqnl0246134 sshd[270229]: Failed password for root from 61.177.173.36 port 13784 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-07 00:34:13,077] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366053.0310357, 'message': 'Dec 7 00:34:12 hqnl0246134 sshd[270229]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 00:34:17,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366057.0325658, 'message': 'Dec 7 00:34:15 hqnl0246134 sshd[270229]: Failed password for root from 61.177.173.36 port 13784 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-07 00:34:17,855] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:34:17,856] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:34:17,863] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:34:17,875] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-07 00:34:19,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366059.0349731, 'message': 'Dec 7 00:34:17 hqnl0246134 sshd[270229]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-07 00:34:19,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670366059.0351448, 'message': 'Dec 7 00:34:18 hqnl0246134 sshd[270236]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-07 00:34:19,090] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670366059.0352597, 'message': 'Dec 7 00:34:18 hqnl0246134 sshd[270236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-07 00:34:20,547] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:34:20,548] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:34:20,558] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:34:20,570] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-07 00:34:21,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670366061.0354438, 'message': 'Dec 7 00:34:19 hqnl0246134 sshd[270229]: Failed password for root from 61.177.173.36 port 13784 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 00:34:23,078] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670366063.039598, 'message': 'Dec 7 00:34:21 hqnl0246134 sshd[270236]: Failed password for root from 61.177.173.52 port 60205 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-07 00:34:49,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366089.07534, 'message': 'Dec 7 00:34:47 hqnl0246134 sshd[270254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
WARNING [2022-12-07 00:34:49,966] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:34:49,967] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:34:51,098] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366091.076078, 'message': 'Dec 7 00:34:49 hqnl0246134 sshd[270254]: Failed password for root from 61.177.173.18 port 59668 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 00:34:59,251] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:34:59,252] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:34:59,260] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:34:59,274] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-07 00:35:03,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670366103.0915582, 'message': 'Dec 7 00:35:02 hqnl0246134 sshd[270288]: Invalid user guest from 152.89.196.220 port 28912', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-07 00:35:03,136] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670366103.0920794, 'message': 'Dec 7 00:35:02 hqnl0246134 sshd[270288]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 00:35:03,156] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670366103.0926049, 'message': 'Dec 7 00:35:02 hqnl0246134 sshd[270288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 00:35:05,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670366105.0942469, 'message': 'Dec 7 00:35:04 hqnl0246134 sshd[270288]: Failed password for invalid user guest from 152.89.196.220 port 28912 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-07 00:35:07,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670366107.0968711, 'message': 'Dec 7 00:35:05 hqnl0246134 sshd[270288]: Disconnected from invalid user guest 152.89.196.220 port 28912 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-07 00:35:11,329] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:35:11,352] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0306 seconds
INFO [2022-12-07 00:35:15,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366115.1059773, 'message': 'Dec 7 00:35:15 hqnl0246134 sshd[270301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 00:35:17,128] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366117.1083262, 'message': 'Dec 7 00:35:16 hqnl0246134 sshd[270301]: Failed password for root from 165.227.166.207 port 43278 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 00:35:17,902] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:35:17,902] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:35:17,909] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:35:17,922] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-07 00:35:20,502] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:35:20,502] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:35:20,509] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:35:20,521] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 00:35:35,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366135.1290069, 'message': 'Dec 7 00:35:34 hqnl0246134 sshd[270325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-07 00:35:37,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366137.1299274, 'message': 'Dec 7 00:35:36 hqnl0246134 sshd[270325]: Failed password for root from 61.177.173.18 port 26518 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-07 00:35:49,970] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:35:49,972] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:36:07,189] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366167.1657057, 'message': 'Dec 7 00:36:07 hqnl0246134 sshd[270343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-07 00:36:07,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366167.166222, 'message': 'Dec 7 00:36:07 hqnl0246134 sshd[270343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-07 00:36:09,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366169.166345, 'message': 'Dec 7 00:36:09 hqnl0246134 sshd[270343]: Failed password for root from 61.177.172.114 port 30400 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 00:36:11,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366171.168356, 'message': 'Dec 7 00:36:11 hqnl0246134 sshd[270343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
WARNING [2022-12-07 00:36:11,337] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:36:11,371] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0456 seconds
INFO [2022-12-07 00:36:15,208] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366175.1728153, 'message': 'Dec 7 00:36:13 hqnl0246134 sshd[270343]: Failed password for root from 61.177.172.114 port 30400 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-07 00:36:15,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366175.1731205, 'message': 'Dec 7 00:36:13 hqnl0246134 sshd[270343]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 00:36:17,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366177.1736572, 'message': 'Dec 7 00:36:15 hqnl0246134 sshd[270343]: Failed password for root from 61.177.172.114 port 30400 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-07 00:36:17,987] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:36:17,987] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:36:17,994] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:36:18,005] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-07 00:36:20,514] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:36:20,514] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:36:20,522] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:36:20,534] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-07 00:36:20,907] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:36:20,908] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:36:20,915] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:36:20,928] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-07 00:36:21,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366181.1781595, 'message': 'Dec 7 00:36:19 hqnl0246134 sshd[270354]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 00:36:21,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366181.1785321, 'message': 'Dec 7 00:36:20 hqnl0246134 sshd[270359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-07 00:36:21,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366181.1783829, 'message': 'Dec 7 00:36:19 hqnl0246134 sshd[270354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 00:36:21,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366181.1786397, 'message': 'Dec 7 00:36:21 hqnl0246134 sshd[270354]: Failed password for root from 61.177.172.114 port 23962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 00:36:23,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366183.1806173, 'message': 'Dec 7 00:36:21 hqnl0246134 sshd[270354]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-07 00:36:23,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366183.180805, 'message': 'Dec 7 00:36:22 hqnl0246134 sshd[270359]: Failed password for root from 61.177.173.18 port 42723 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-07 00:36:25,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366185.1848378, 'message': 'Dec 7 00:36:23 hqnl0246134 sshd[270354]: Failed password for root from 61.177.172.114 port 23962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-07 00:36:25,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366185.1850395, 'message': 'Dec 7 00:36:24 hqnl0246134 sshd[270359]: Failed password for root from 61.177.173.18 port 42723 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-07 00:36:27,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366187.1858282, 'message': 'Dec 7 00:36:25 hqnl0246134 sshd[270354]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-07 00:36:27,216] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366187.1860464, 'message': 'Dec 7 00:36:26 hqnl0246134 sshd[270359]: Failed password for root from 61.177.173.18 port 42723 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 00:36:29,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366189.1883593, 'message': 'Dec 7 00:36:28 hqnl0246134 sshd[270354]: Failed password for root from 61.177.172.114 port 23962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-07 00:36:33,231] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366193.1926112, 'message': 'Dec 7 00:36:31 hqnl0246134 sshd[270371]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-07 00:36:33,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366193.1931422, 'message': 'Dec 7 00:36:31 hqnl0246134 sshd[270371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-07 00:36:35,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366195.1944714, 'message': 'Dec 7 00:36:33 hqnl0246134 sshd[270371]: Failed password for root from 61.177.172.114 port 11580 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0570 seconds
INFO [2022-12-07 00:36:37,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366197.1960208, 'message': 'Dec 7 00:36:35 hqnl0246134 sshd[270371]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-07 00:36:39,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366199.198312, 'message': 'Dec 7 00:36:37 hqnl0246134 sshd[270371]: Failed password for root from 61.177.172.114 port 11580 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 00:36:39,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366199.1986613, 'message': 'Dec 7 00:36:38 hqnl0246134 sshd[270371]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-07 00:36:41,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366201.2010634, 'message': 'Dec 7 00:36:39 hqnl0246134 sshd[270371]: Failed password for root from 61.177.172.114 port 11580 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 00:36:43,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366203.2034647, 'message': 'Dec 7 00:36:41 hqnl0246134 sshd[270386]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 00:36:43,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366203.203709, 'message': 'Dec 7 00:36:41 hqnl0246134 sshd[270386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:36:45,226] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366205.2058992, 'message': 'Dec 7 00:36:43 hqnl0246134 sshd[270386]: Failed password for root from 61.177.172.114 port 25489 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 00:36:45,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366205.206144, 'message': 'Dec 7 00:36:44 hqnl0246134 sshd[270386]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 00:36:47,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366207.20857, 'message': 'Dec 7 00:36:46 hqnl0246134 sshd[270386]: Failed password for root from 61.177.172.114 port 25489 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 00:36:47,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366207.2088614, 'message': 'Dec 7 00:36:46 hqnl0246134 sshd[270386]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 00:36:49,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670366209.2100832, 'message': 'Dec 7 00:36:48 hqnl0246134 sshd[270386]: Failed password for root from 61.177.172.114 port 25489 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-07 00:36:49,975] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:36:49,975] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:37:07,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366227.2322006, 'message': 'Dec 7 00:37:06 hqnl0246134 sshd[270412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 00:37:09,255] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366229.2362585, 'message': 'Dec 7 00:37:08 hqnl0246134 sshd[270412]: Failed password for root from 61.177.173.18 port 59322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 00:37:11,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366231.2387052, 'message': 'Dec 7 00:37:10 hqnl0246134 sshd[270414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-07 00:37:11,336] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:37:11,356] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0271 seconds
INFO [2022-12-07 00:37:13,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366233.2414844, 'message': 'Dec 7 00:37:12 hqnl0246134 sshd[270412]: Failed password for root from 61.177.173.18 port 59322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-07 00:37:13,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366233.2417426, 'message': 'Dec 7 00:37:13 hqnl0246134 sshd[270414]: Failed password for root from 165.227.166.207 port 53530 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-07 00:37:17,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366237.244624, 'message': 'Dec 7 00:37:16 hqnl0246134 sshd[270412]: Failed password for root from 61.177.173.18 port 59322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-07 00:37:18,016] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:37:18,016] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:37:18,024] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:37:18,037] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-07 00:37:20,891] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:37:20,891] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:37:20,899] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:37:20,910] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
WARNING [2022-12-07 00:37:49,980] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:37:49,982] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:37:55,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366275.2873538, 'message': 'Dec 7 00:37:53 hqnl0246134 sshd[270443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 00:37:55,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366275.2881484, 'message': 'Dec 7 00:37:55 hqnl0246134 sshd[270443]: Failed password for root from 61.177.173.18 port 26426 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 00:38:02,774] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:38:02,775] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:38:02,786] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:38:02,804] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0283 seconds
WARNING [2022-12-07 00:38:11,339] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:38:11,356] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0237 seconds
INFO [2022-12-07 00:38:17,967] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:38:17,968] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:38:17,980] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:38:17,994] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0248 seconds
INFO [2022-12-07 00:38:19,384] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 00:38:19,457] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 00:38:19,457] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 00:38:19,458] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 00:38:19,458] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 00:38:19,458] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 00:38:19,467] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 00:38:19,482] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0236 seconds
WARNING [2022-12-07 00:38:19,490] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 00:38:19,492] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:38:19,510] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0334 seconds
INFO [2022-12-07 00:38:19,511] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0316 seconds
INFO [2022-12-07 00:38:20,754] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:38:20,755] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:38:20,762] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:38:20,774] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-07 00:38:43,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366323.35995, 'message': 'Dec 7 00:38:41 hqnl0246134 sshd[270488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-07 00:38:45,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366325.3647223, 'message': 'Dec 7 00:38:43 hqnl0246134 sshd[270488]: Failed password for root from 61.177.173.18 port 48451 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
WARNING [2022-12-07 00:38:49,992] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:38:49,994] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:38:56,791] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 00:38:56,792] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 00:38:56,793] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-07 00:39:09,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366349.4092135, 'message': 'Dec 7 00:39:09 hqnl0246134 sshd[270636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0252 seconds
WARNING [2022-12-07 00:39:11,345] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:39:11,363] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0277 seconds
INFO [2022-12-07 00:39:11,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366351.409576, 'message': 'Dec 7 00:39:11 hqnl0246134 sshd[270636]: Failed password for root from 165.227.166.207 port 35626 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 00:39:13,913] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:39:13,913] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:39:13,922] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:39:13,938] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0240 seconds
INFO [2022-12-07 00:39:17,758] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:39:17,759] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:39:17,766] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:39:17,777] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-07 00:39:20,416] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:39:20,417] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:39:20,424] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:39:20,435] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-07 00:39:29,448] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366369.4303951, 'message': 'Dec 7 00:39:29 hqnl0246134 sshd[270655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 00:39:33,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366373.4359188, 'message': 'Dec 7 00:39:31 hqnl0246134 sshd[270655]: Failed password for root from 61.177.173.18 port 10135 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-07 00:39:33,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366373.437642, 'message': 'Dec 7 00:39:32 hqnl0246134 sshd[270659]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-07 00:39:33,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366373.437839, 'message': 'Dec 7 00:39:32 hqnl0246134 sshd[270659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 00:39:35,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366375.439595, 'message': 'Dec 7 00:39:34 hqnl0246134 sshd[270659]: Failed password for root from 61.177.173.46 port 22314 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 00:39:35,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366375.4397788, 'message': 'Dec 7 00:39:34 hqnl0246134 sshd[270659]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 00:39:37,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366377.4435518, 'message': 'Dec 7 00:39:35 hqnl0246134 sshd[270655]: Failed password for root from 61.177.173.18 port 10135 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-07 00:39:37,474] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366377.4437468, 'message': 'Dec 7 00:39:37 hqnl0246134 sshd[270659]: Failed password for root from 61.177.173.46 port 22314 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 00:39:39,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366379.4478655, 'message': 'Dec 7 00:39:39 hqnl0246134 sshd[270659]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-07 00:39:41,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366381.4507868, 'message': 'Dec 7 00:39:40 hqnl0246134 sshd[270655]: Failed password for root from 61.177.173.18 port 10135 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-07 00:39:41,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366381.4516573, 'message': 'Dec 7 00:39:40 hqnl0246134 sshd[270659]: Failed password for root from 61.177.173.46 port 22314 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-07 00:39:43,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366383.454419, 'message': 'Dec 7 00:39:42 hqnl0246134 sshd[270670]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 00:39:43,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366383.4546542, 'message': 'Dec 7 00:39:42 hqnl0246134 sshd[270670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 00:39:45,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366385.4576523, 'message': 'Dec 7 00:39:45 hqnl0246134 sshd[270670]: Failed password for root from 61.177.173.46 port 37495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-07 00:39:47,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366387.460872, 'message': 'Dec 7 00:39:47 hqnl0246134 sshd[270670]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 00:39:49,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366389.463595, 'message': 'Dec 7 00:39:49 hqnl0246134 sshd[270670]: Failed password for root from 61.177.173.46 port 37495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
WARNING [2022-12-07 00:39:49,998] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:39:49,999] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:39:51,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366391.466235, 'message': 'Dec 7 00:39:49 hqnl0246134 sshd[270670]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 00:39:53,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670366393.468669, 'message': 'Dec 7 00:39:51 hqnl0246134 sshd[270670]: Failed password for root from 61.177.173.46 port 37495 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0324 seconds
WARNING [2022-12-07 00:40:11,360] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:40:11,396] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0532 seconds
INFO [2022-12-07 00:40:17,540] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366417.5215728, 'message': 'Dec 7 00:40:17 hqnl0246134 sshd[270715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 00:40:17,958] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:40:17,959] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:40:17,966] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:40:17,978] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 00:40:19,542] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366419.522413, 'message': 'Dec 7 00:40:19 hqnl0246134 sshd[270715]: Failed password for root from 61.177.173.18 port 31160 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 00:40:20,807] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:40:20,807] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:40:20,814] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:40:20,826] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 00:40:23,545] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366423.5255103, 'message': 'Dec 7 00:40:23 hqnl0246134 sshd[270715]: Failed password for root from 61.177.173.18 port 31160 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 00:40:27,547] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366427.5267012, 'message': 'Dec 7 00:40:25 hqnl0246134 sshd[270715]: Failed password for root from 61.177.173.18 port 31160 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
WARNING [2022-12-07 00:40:50,005] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:40:50,006] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:41:03,598] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366463.573159, 'message': 'Dec 7 00:41:03 hqnl0246134 sshd[270781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-07 00:41:05,597] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366465.5786064, 'message': 'Dec 7 00:41:05 hqnl0246134 sshd[270781]: Failed password for root from 61.177.173.18 port 39415 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-07 00:41:11,361] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:41:11,389] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0343 seconds
INFO [2022-12-07 00:41:14,787] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:41:14,788] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:41:14,795] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:41:14,807] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 00:41:15,617] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366475.5994396, 'message': 'Dec 7 00:41:14 hqnl0246134 sshd[270787]: Invalid user wangwei from 165.227.166.207 port 45914', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 00:41:15,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366475.599663, 'message': 'Dec 7 00:41:14 hqnl0246134 sshd[270787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 00:41:17,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366477.6026413, 'message': 'Dec 7 00:41:16 hqnl0246134 sshd[270787]: Failed password for invalid user wangwei from 165.227.166.207 port 45914 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-07 00:41:17,644] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366477.609264, 'message': 'Dec 7 00:41:17 hqnl0246134 sshd[270787]: Disconnected from invalid user wangwei 165.227.166.207 port 45914 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 00:41:17,847] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:41:17,848] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:41:17,863] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:41:17,885] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0356 seconds
INFO [2022-12-07 00:41:20,919] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:41:20,919] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:41:20,926] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:41:20,938] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
WARNING [2022-12-07 00:41:50,010] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:41:50,011] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:41:51,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366511.6600811, 'message': 'Dec 7 00:41:50 hqnl0246134 sshd[270816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-07 00:41:53,688] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366513.6589746, 'message': 'Dec 7 00:41:53 hqnl0246134 sshd[270816]: Failed password for root from 61.177.173.18 port 63432 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0291 seconds
WARNING [2022-12-07 00:41:54,086] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-07 00:42:11,371] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:42:11,491] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.1316 seconds
INFO [2022-12-07 00:42:17,860] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:42:17,861] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:42:17,872] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:42:17,884] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-07 00:42:20,466] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:42:20,466] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:42:20,473] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:42:20,485] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 00:42:37,752] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366557.7302904, 'message': 'Dec 7 00:42:36 hqnl0246134 sshd[270866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-07 00:42:39,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366559.730417, 'message': 'Dec 7 00:42:38 hqnl0246134 sshd[270866]: Failed password for root from 61.177.173.18 port 23220 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-07 00:42:48,175] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:42:48,175] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:42:48,184] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:42:48,196] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
WARNING [2022-12-07 00:42:50,015] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:42:50,016] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 00:43:11,374] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:43:11,395] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0303 seconds
INFO [2022-12-07 00:43:13,793] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366593.7752345, 'message': 'Dec 7 00:43:11 hqnl0246134 sshd[270893]: Invalid user grid from 165.227.166.207 port 56264', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 00:43:13,811] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366593.7754734, 'message': 'Dec 7 00:43:11 hqnl0246134 sshd[270893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 00:43:13,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366593.7756305, 'message': 'Dec 7 00:43:13 hqnl0246134 sshd[270893]: Failed password for invalid user grid from 165.227.166.207 port 56264 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 00:43:15,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366595.7773345, 'message': 'Dec 7 00:43:15 hqnl0246134 sshd[270893]: Disconnected from invalid user grid 165.227.166.207 port 56264 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 00:43:17,794] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:43:17,794] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:43:17,802] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:43:17,814] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 00:43:20,566] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:43:20,566] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:43:20,574] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:43:20,587] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-07 00:43:23,803] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366603.783756, 'message': 'Dec 7 00:43:23 hqnl0246134 sshd[270906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 00:43:25,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366605.7908475, 'message': 'Dec 7 00:43:25 hqnl0246134 sshd[270906]: Failed password for root from 61.177.173.18 port 39339 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-07 00:43:29,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366609.7947383, 'message': 'Dec 7 00:43:27 hqnl0246134 sshd[270906]: Failed password for root from 61.177.173.18 port 39339 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-07 00:43:29,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366609.7951667, 'message': 'Dec 7 00:43:29 hqnl0246134 sshd[270906]: Failed password for root from 61.177.173.18 port 39339 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 00:43:35,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366615.8067954, 'message': 'Dec 7 00:43:34 hqnl0246134 sshd[270917]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-07 00:43:35,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366615.8072472, 'message': 'Dec 7 00:43:34 hqnl0246134 sshd[270917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 00:43:37,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366617.8144023, 'message': 'Dec 7 00:43:36 hqnl0246134 sshd[270917]: Failed password for root from 61.177.173.48 port 24385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-07 00:43:37,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366617.814781, 'message': 'Dec 7 00:43:36 hqnl0246134 sshd[270917]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-07 00:43:39,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366619.8189528, 'message': 'Dec 7 00:43:39 hqnl0246134 sshd[270917]: Failed password for root from 61.177.173.48 port 24385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 00:43:41,856] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366621.8258245, 'message': 'Dec 7 00:43:41 hqnl0246134 sshd[270917]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-07 00:43:43,852] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366623.834191, 'message': 'Dec 7 00:43:43 hqnl0246134 sshd[270917]: Failed password for root from 61.177.173.48 port 24385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 00:43:45,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366625.8384275, 'message': 'Dec 7 00:43:44 hqnl0246134 sshd[270919]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 00:43:45,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366625.8386662, 'message': 'Dec 7 00:43:44 hqnl0246134 sshd[270919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 00:43:47,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366627.8422585, 'message': 'Dec 7 00:43:47 hqnl0246134 sshd[270919]: Failed password for root from 61.177.173.48 port 53458 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 00:43:49,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366629.8458478, 'message': 'Dec 7 00:43:49 hqnl0246134 sshd[270919]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
WARNING [2022-12-07 00:43:50,018] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:43:50,019] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:43:51,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366631.848278, 'message': 'Dec 7 00:43:51 hqnl0246134 sshd[270919]: Failed password for root from 61.177.173.48 port 53458 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-07 00:43:51,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366631.848497, 'message': 'Dec 7 00:43:51 hqnl0246134 sshd[270919]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-07 00:43:53,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366633.8500824, 'message': 'Dec 7 00:43:53 hqnl0246134 sshd[270919]: Failed password for root from 61.177.173.48 port 53458 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-07 00:43:55,869] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366635.8518407, 'message': 'Dec 7 00:43:55 hqnl0246134 sshd[270926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 00:43:55,887] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366635.8520234, 'message': 'Dec 7 00:43:55 hqnl0246134 sshd[270926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 00:43:56,953] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:43:56,954] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:43:56,961] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:43:56,974] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-07 00:43:57,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366637.8574672, 'message': 'Dec 7 00:43:57 hqnl0246134 sshd[270926]: Failed password for root from 61.177.173.48 port 29424 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 00:43:59,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366639.8578012, 'message': 'Dec 7 00:43:59 hqnl0246134 sshd[270926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 00:44:01,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366641.8617616, 'message': 'Dec 7 00:44:01 hqnl0246134 sshd[270926]: Failed password for root from 61.177.173.48 port 29424 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 00:44:03,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366643.8644047, 'message': 'Dec 7 00:44:01 hqnl0246134 sshd[270926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 00:44:03,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670366643.864745, 'message': 'Dec 7 00:44:03 hqnl0246134 sshd[270926]: Failed password for root from 61.177.173.48 port 29424 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 00:44:09,907] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366649.8721874, 'message': 'Dec 7 00:44:09 hqnl0246134 sshd[270948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0349 seconds
WARNING [2022-12-07 00:44:11,380] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:44:11,410] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0425 seconds
INFO [2022-12-07 00:44:11,897] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366651.8746357, 'message': 'Dec 7 00:44:11 hqnl0246134 sshd[270948]: Failed password for root from 61.177.173.18 port 54266 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-07 00:44:17,886] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:44:17,886] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:44:17,895] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:44:17,906] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 00:44:20,519] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:44:20,520] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:44:20,529] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:44:20,543] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0223 seconds
WARNING [2022-12-07 00:44:50,024] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:44:50,026] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:44:59,985] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366699.955609, 'message': 'Dec 7 00:44:58 hqnl0246134 sshd[270974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-07 00:45:01,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366701.9566395, 'message': 'Dec 7 00:45:00 hqnl0246134 sshd[270974]: Failed password for root from 61.177.173.18 port 24802 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-07 00:45:03,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366703.9594927, 'message': 'Dec 7 00:45:02 hqnl0246134 sshd[270974]: Failed password for root from 61.177.173.18 port 24802 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-07 00:45:07,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366707.9675014, 'message': 'Dec 7 00:45:07 hqnl0246134 sshd[270974]: Failed password for root from 61.177.173.18 port 24802 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-07 00:45:07,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366707.9676857, 'message': 'Dec 7 00:45:07 hqnl0246134 sshd[271008]: Invalid user novinhost from 165.227.166.207 port 38244', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-07 00:45:08,011] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366707.9678726, 'message': 'Dec 7 00:45:07 hqnl0246134 sshd[271008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-07 00:45:09,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366709.9713306, 'message': 'Dec 7 00:45:09 hqnl0246134 sshd[271008]: Failed password for invalid user novinhost from 165.227.166.207 port 38244 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-07 00:45:11,384] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:45:11,405] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0331 seconds
INFO [2022-12-07 00:45:11,597] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:45:11,598] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:45:11,605] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:45:11,616] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-07 00:45:11,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366711.9738371, 'message': 'Dec 7 00:45:11 hqnl0246134 sshd[271008]: Disconnected from invalid user novinhost 165.227.166.207 port 38244 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 00:45:17,904] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:45:17,905] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:45:17,912] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:45:17,923] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-07 00:45:20,548] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:45:20,548] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:45:20,559] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:45:20,570] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-07 00:45:31,335] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 00:45:34,033] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 00:45:34,034] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 00:45:34,035] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 00:45:34,035] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 00:45:34,035] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 00:45:34,049] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 00:45:34,069] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0323 seconds
WARNING [2022-12-07 00:45:34,078] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 00:45:34,081] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:45:34,101] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0400 seconds
INFO [2022-12-07 00:45:34,103] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0373 seconds
INFO [2022-12-07 00:45:46,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366746.0180879, 'message': 'Dec 7 00:45:45 hqnl0246134 sshd[271041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-07 00:45:48,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366748.0207806, 'message': 'Dec 7 00:45:46 hqnl0246134 sshd[271041]: Failed password for root from 61.177.173.18 port 32159 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-07 00:45:50,029] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:45:50,030] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:46:05,175] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 00:46:05,176] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 00:46:05,177] im360.plugins.client360: Waiting 6 minutes before retry...
WARNING [2022-12-07 00:46:11,388] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:46:11,410] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0331 seconds
INFO [2022-12-07 00:46:17,737] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:46:17,738] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:46:17,746] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:46:17,759] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-07 00:46:20,239] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:46:20,239] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:46:20,246] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:46:20,258] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-07 00:46:36,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366796.0811758, 'message': 'Dec 7 00:46:34 hqnl0246134 sshd[271072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 00:46:38,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366798.0831373, 'message': 'Dec 7 00:46:36 hqnl0246134 sshd[271072]: Failed password for root from 61.177.173.18 port 55552 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-07 00:46:46,189] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:46:46,189] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:46:46,196] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:46:46,207] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
WARNING [2022-12-07 00:46:50,032] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:46:50,033] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:47:00,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366820.105865, 'message': 'Dec 7 00:46:58 hqnl0246134 sshd[271092]: Invalid user flw from 165.227.166.207 port 48554', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 00:47:00,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366820.1060922, 'message': 'Dec 7 00:46:58 hqnl0246134 sshd[271092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-07 00:47:02,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366822.109569, 'message': 'Dec 7 00:47:00 hqnl0246134 sshd[271092]: Failed password for invalid user flw from 165.227.166.207 port 48554 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 00:47:02,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366822.109893, 'message': 'Dec 7 00:47:02 hqnl0246134 sshd[271092]: Disconnected from invalid user flw 165.227.166.207 port 48554 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 00:47:10,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366830.1152585, 'message': 'Dec 7 00:47:08 hqnl0246134 sshd[271120]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-07 00:47:10,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366830.115627, 'message': 'Dec 7 00:47:08 hqnl0246134 sshd[271120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
WARNING [2022-12-07 00:47:11,390] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:47:11,409] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0260 seconds
INFO [2022-12-07 00:47:12,140] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366832.1171215, 'message': 'Dec 7 00:47:11 hqnl0246134 sshd[271120]: Failed password for root from 61.177.172.98 port 27905 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-07 00:47:14,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366834.12036, 'message': 'Dec 7 00:47:12 hqnl0246134 sshd[271120]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-07 00:47:16,157] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366836.1221645, 'message': 'Dec 7 00:47:14 hqnl0246134 sshd[271120]: Failed password for root from 61.177.172.98 port 27905 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 00:47:16,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366836.1225564, 'message': 'Dec 7 00:47:15 hqnl0246134 sshd[271120]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-07 00:47:17,925] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:47:17,926] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:47:17,935] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:47:17,947] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-07 00:47:18,142] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366838.123921, 'message': 'Dec 7 00:47:16 hqnl0246134 sshd[271120]: Failed password for root from 61.177.172.98 port 27905 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 00:47:20,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366840.1269262, 'message': 'Dec 7 00:47:19 hqnl0246134 sshd[271128]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 00:47:20,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366840.1271958, 'message': 'Dec 7 00:47:19 hqnl0246134 sshd[271128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 00:47:20,709] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:47:20,709] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:47:20,717] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:47:20,729] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 00:47:22,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366842.1299512, 'message': 'Dec 7 00:47:22 hqnl0246134 sshd[271128]: Failed password for root from 61.177.172.98 port 62656 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-07 00:47:24,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366844.132646, 'message': 'Dec 7 00:47:22 hqnl0246134 sshd[271135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-07 00:47:24,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366844.1330235, 'message': 'Dec 7 00:47:23 hqnl0246134 sshd[271128]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-07 00:47:24,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366844.1332085, 'message': 'Dec 7 00:47:24 hqnl0246134 sshd[271135]: Failed password for root from 61.177.173.18 port 25464 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 00:47:26,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366846.1338024, 'message': 'Dec 7 00:47:25 hqnl0246134 sshd[271128]: Failed password for root from 61.177.172.98 port 62656 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 00:47:28,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366848.1384678, 'message': 'Dec 7 00:47:26 hqnl0246134 sshd[271128]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-07 00:47:28,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366848.1386683, 'message': 'Dec 7 00:47:26 hqnl0246134 sshd[271135]: Failed password for root from 61.177.173.18 port 25464 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-07 00:47:30,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366850.145009, 'message': 'Dec 7 00:47:28 hqnl0246134 sshd[271128]: Failed password for root from 61.177.172.98 port 62656 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-07 00:47:30,187] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366850.1452954, 'message': 'Dec 7 00:47:28 hqnl0246134 sshd[271135]: Failed password for root from 61.177.173.18 port 25464 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0415 seconds
INFO [2022-12-07 00:47:34,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366854.1491463, 'message': 'Dec 7 00:47:32 hqnl0246134 sshd[271138]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-07 00:47:34,198] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366854.1497736, 'message': 'Dec 7 00:47:32 hqnl0246134 sshd[271138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-07 00:47:36,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366856.1510298, 'message': 'Dec 7 00:47:34 hqnl0246134 sshd[271138]: Failed password for root from 61.177.172.98 port 45384 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 00:47:38,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366858.1564505, 'message': 'Dec 7 00:47:37 hqnl0246134 sshd[271138]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 00:47:40,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366860.1606634, 'message': 'Dec 7 00:47:38 hqnl0246134 sshd[271138]: Failed password for root from 61.177.172.98 port 45384 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:47:40,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366860.160886, 'message': 'Dec 7 00:47:39 hqnl0246134 sshd[271138]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 00:47:42,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366862.1667523, 'message': 'Dec 7 00:47:41 hqnl0246134 sshd[271138]: Failed password for root from 61.177.172.98 port 45384 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-07 00:47:44,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366864.1688006, 'message': 'Dec 7 00:47:43 hqnl0246134 sshd[271152]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 00:47:44,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366864.1689773, 'message': 'Dec 7 00:47:43 hqnl0246134 sshd[271152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.98 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 00:47:46,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366866.172875, 'message': 'Dec 7 00:47:45 hqnl0246134 sshd[271152]: Failed password for root from 61.177.172.98 port 58357 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 00:47:48,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366868.1738071, 'message': 'Dec 7 00:47:47 hqnl0246134 sshd[271152]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-07 00:47:50,045] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:47:50,046] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:47:50,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366870.175613, 'message': 'Dec 7 00:47:49 hqnl0246134 sshd[271152]: Failed password for root from 61.177.172.98 port 58357 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-07 00:47:52,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366872.1776278, 'message': 'Dec 7 00:47:50 hqnl0246134 sshd[271152]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.98 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 00:47:54,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.98', 'timestamp': 1670366874.1788986, 'message': 'Dec 7 00:47:52 hqnl0246134 sshd[271152]: Failed password for root from 61.177.172.98 port 58357 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 00:47:55,677] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:47:55,678] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:47:55,688] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:47:55,704] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0256 seconds
INFO [2022-12-07 00:47:56,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366876.1811886, 'message': 'Dec 7 00:47:55 hqnl0246134 sshd[271157]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 00:47:56,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366876.181511, 'message': 'Dec 7 00:47:55 hqnl0246134 sshd[271157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 00:47:58,204] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366878.1856413, 'message': 'Dec 7 00:47:57 hqnl0246134 sshd[271157]: Failed password for root from 61.177.173.51 port 62683 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 00:48:00,209] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366880.1911314, 'message': 'Dec 7 00:47:59 hqnl0246134 sshd[271157]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 00:48:02,216] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366882.1962345, 'message': 'Dec 7 00:48:01 hqnl0246134 sshd[271157]: Failed password for root from 61.177.173.51 port 62683 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 00:48:02,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366882.1964295, 'message': 'Dec 7 00:48:01 hqnl0246134 sshd[271157]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 00:48:04,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366884.1982985, 'message': 'Dec 7 00:48:03 hqnl0246134 sshd[271157]: Failed password for root from 61.177.173.51 port 62683 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-07 00:48:06,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366886.2008235, 'message': 'Dec 7 00:48:05 hqnl0246134 sshd[271178]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 00:48:06,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366886.201093, 'message': 'Dec 7 00:48:05 hqnl0246134 sshd[271178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 00:48:08,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366888.201796, 'message': 'Dec 7 00:48:08 hqnl0246134 sshd[271180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-07 00:48:08,231] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366888.2020001, 'message': 'Dec 7 00:48:08 hqnl0246134 sshd[271178]: Failed password for root from 61.177.173.51 port 44525 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-07 00:48:10,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366890.2042916, 'message': 'Dec 7 00:48:09 hqnl0246134 sshd[271178]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-07 00:48:11,395] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:48:11,416] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0275 seconds
INFO [2022-12-07 00:48:12,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366892.2060323, 'message': 'Dec 7 00:48:10 hqnl0246134 sshd[271180]: Failed password for root from 61.177.173.18 port 33849 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-07 00:48:12,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366892.2062533, 'message': 'Dec 7 00:48:11 hqnl0246134 sshd[271178]: Failed password for root from 61.177.173.51 port 44525 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-07 00:48:14,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366894.2082078, 'message': 'Dec 7 00:48:12 hqnl0246134 sshd[271178]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 00:48:16,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366896.2126036, 'message': 'Dec 7 00:48:14 hqnl0246134 sshd[271180]: Failed password for root from 61.177.173.18 port 33849 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0576 seconds
INFO [2022-12-07 00:48:16,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670366896.2128742, 'message': 'Dec 7 00:48:14 hqnl0246134 sshd[271178]: Failed password for root from 61.177.173.51 port 44525 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0577 seconds
INFO [2022-12-07 00:48:18,116] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:48:18,117] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:48:18,130] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:48:18,152] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0331 seconds
INFO [2022-12-07 00:48:18,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366898.2124934, 'message': 'Dec 7 00:48:17 hqnl0246134 sshd[271180]: Failed password for root from 61.177.173.18 port 33849 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-07 00:48:20,874] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:48:20,875] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:48:20,882] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:48:20,893] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
WARNING [2022-12-07 00:48:50,053] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:48:50,055] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:48:50,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366930.2540016, 'message': 'Dec 7 00:48:49 hqnl0246134 sshd[271231]: Invalid user a from 165.227.166.207 port 58846', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0431 seconds
INFO [2022-12-07 00:48:50,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366930.2550423, 'message': 'Dec 7 00:48:49 hqnl0246134 sshd[271231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 00:48:52,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366932.253815, 'message': 'Dec 7 00:48:52 hqnl0246134 sshd[271231]: Failed password for invalid user a from 165.227.166.207 port 58846 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 00:48:54,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670366934.2570336, 'message': 'Dec 7 00:48:53 hqnl0246134 sshd[271231]: Disconnected from invalid user a 165.227.166.207 port 58846 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-07 00:48:54,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366934.2574284, 'message': 'Dec 7 00:48:53 hqnl0246134 sshd[271234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-07 00:48:56,144] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:48:56,145] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:48:56,154] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:48:56,167] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-07 00:48:56,278] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366936.257551, 'message': 'Dec 7 00:48:55 hqnl0246134 sshd[271234]: Failed password for root from 61.177.173.18 port 45890 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 00:48:58,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366938.2612462, 'message': 'Dec 7 00:48:57 hqnl0246134 sshd[271234]: Failed password for root from 61.177.173.18 port 45890 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 00:49:02,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366942.2688081, 'message': 'Dec 7 00:48:59 hqnl0246134 sshd[271234]: Failed password for root from 61.177.173.18 port 45890 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
WARNING [2022-12-07 00:49:11,405] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:49:11,437] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0433 seconds
INFO [2022-12-07 00:49:17,741] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:49:17,742] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:49:17,748] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:49:17,759] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0163 seconds
INFO [2022-12-07 00:49:20,307] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:49:20,308] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:49:20,314] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:49:20,325] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0167 seconds
INFO [2022-12-07 00:49:42,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366982.3399055, 'message': 'Dec 7 00:49:41 hqnl0246134 sshd[271278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-07 00:49:44,359] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670366984.3416924, 'message': 'Dec 7 00:49:42 hqnl0246134 sshd[271278]: Failed password for root from 61.177.173.18 port 13816 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 00:49:48,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670366988.3470302, 'message': 'Dec 7 00:49:47 hqnl0246134 sshd[271281]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 00:49:48,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670366988.347253, 'message': 'Dec 7 00:49:47 hqnl0246134 sshd[271281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-07 00:49:50,058] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:49:50,059] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:49:50,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670366990.3509386, 'message': 'Dec 7 00:49:49 hqnl0246134 sshd[271281]: Failed password for root from 61.177.173.52 port 20369 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
WARNING [2022-12-07 00:50:11,409] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:50:11,430] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0319 seconds
INFO [2022-12-07 00:50:17,982] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:50:17,983] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:50:17,991] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:50:18,003] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-07 00:50:20,675] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:50:20,675] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:50:20,684] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:50:20,695] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-07 00:50:28,425] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367028.399591, 'message': 'Dec 7 00:50:27 hqnl0246134 sshd[271336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-07 00:50:30,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367030.3994658, 'message': 'Dec 7 00:50:29 hqnl0246134 sshd[271336]: Failed password for root from 61.177.173.18 port 28301 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1162 seconds
INFO [2022-12-07 00:50:38,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367038.4092076, 'message': 'Dec 7 00:50:37 hqnl0246134 sshd[271350]: Invalid user aa from 165.227.166.207 port 40894', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0417 seconds
INFO [2022-12-07 00:50:38,472] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367038.4099886, 'message': 'Dec 7 00:50:37 hqnl0246134 sshd[271350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:50:39,022] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:50:39,022] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:50:39,029] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:50:39,040] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-07 00:50:40,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367040.410448, 'message': 'Dec 7 00:50:39 hqnl0246134 sshd[271350]: Failed password for invalid user aa from 165.227.166.207 port 40894 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 00:50:42,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367042.4139447, 'message': 'Dec 7 00:50:40 hqnl0246134 sshd[271350]: Disconnected from invalid user aa 165.227.166.207 port 40894 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-07 00:50:50,062] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:50:50,063] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 00:51:11,413] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:51:11,435] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0308 seconds
INFO [2022-12-07 00:51:16,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367076.4645305, 'message': 'Dec 7 00:51:15 hqnl0246134 sshd[271374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-07 00:51:18,487] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367078.4675574, 'message': 'Dec 7 00:51:17 hqnl0246134 sshd[271374]: Failed password for root from 61.177.173.18 port 50796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 00:51:19,946] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:51:19,946] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:51:19,956] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:51:19,969] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-07 00:51:22,493] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367082.472901, 'message': 'Dec 7 00:51:21 hqnl0246134 sshd[271374]: Failed password for root from 61.177.173.18 port 50796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 00:51:22,597] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:51:22,598] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:51:22,609] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:51:22,621] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0222 seconds
INFO [2022-12-07 00:51:24,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367084.4742663, 'message': 'Dec 7 00:51:24 hqnl0246134 sshd[271374]: Failed password for root from 61.177.173.18 port 50796 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 00:51:40,128] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-07 00:51:40,131] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-07 00:51:41,015] im360.plugins.pam: PAM module has been enabled for dovecot-pam
WARNING [2022-12-07 00:51:50,068] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:51:50,069] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 00:51:54,090] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-07 00:51:58,545] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670367118.5115948, 'message': 'Dec 7 00:51:57 hqnl0246134 sshd[271414]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-07 00:51:58,563] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670367118.5120595, 'message': 'Dec 7 00:51:57 hqnl0246134 sshd[271414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 00:52:00,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670367120.513251, 'message': 'Dec 7 00:51:59 hqnl0246134 sshd[271414]: Failed password for root from 61.177.173.52 port 50536 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-07 00:52:00,559] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670367120.5135689, 'message': 'Dec 7 00:52:00 hqnl0246134 sshd[271414]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 00:52:02,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670367122.5158787, 'message': 'Dec 7 00:52:02 hqnl0246134 sshd[271414]: Failed password for root from 61.177.173.52 port 50536 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-07 00:52:04,628] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367124.5197797, 'message': 'Dec 7 00:52:03 hqnl0246134 sshd[271433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.1065 seconds
INFO [2022-12-07 00:52:05,185] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:52:05,185] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:52:05,193] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:52:05,205] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 00:52:06,552] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367126.51999, 'message': 'Dec 7 00:52:06 hqnl0246134 sshd[271433]: Failed password for root from 61.177.173.18 port 17128 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
WARNING [2022-12-07 00:52:11,415] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:52:11,436] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0284 seconds
INFO [2022-12-07 00:52:18,488] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:52:18,489] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:52:18,505] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:52:18,519] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-07 00:52:21,286] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:52:21,287] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:52:21,294] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:52:21,306] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 00:52:22,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367142.5380955, 'message': 'Dec 7 00:52:22 hqnl0246134 sshd[271462]: Invalid user aaden from 165.227.166.207 port 51188', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 00:52:24,556] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367144.5383496, 'message': 'Dec 7 00:52:22 hqnl0246134 sshd[271462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 00:52:26,559] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367146.540759, 'message': 'Dec 7 00:52:25 hqnl0246134 sshd[271462]: Failed password for invalid user aaden from 165.227.166.207 port 51188 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 00:52:26,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367146.5409322, 'message': 'Dec 7 00:52:25 hqnl0246134 sshd[271462]: Disconnected from invalid user aaden 165.227.166.207 port 51188 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
WARNING [2022-12-07 00:52:50,071] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:52:50,072] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:52:51,846] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 00:52:51,922] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 00:52:51,923] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 00:52:51,924] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 00:52:51,924] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 00:52:51,925] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 00:52:51,942] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 00:52:51,970] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0445 seconds
WARNING [2022-12-07 00:52:51,977] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 00:52:51,979] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:52:51,999] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0370 seconds
INFO [2022-12-07 00:52:52,001] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0331 seconds
INFO [2022-12-07 00:52:52,589] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367172.569816, 'message': 'Dec 7 00:52:50 hqnl0246134 sshd[271479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 00:52:54,588] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367174.570343, 'message': 'Dec 7 00:52:52 hqnl0246134 sshd[271479]: Failed password for root from 61.177.173.18 port 24809 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-07 00:53:11,426] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:53:11,461] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0503 seconds
INFO [2022-12-07 00:53:17,897] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:53:17,897] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:53:17,905] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:53:17,920] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-07 00:53:22,055] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 00:53:22,056] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 00:53:22,057] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-07 00:53:22,907] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:53:22,908] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:53:22,944] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:53:22,990] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0815 seconds
INFO [2022-12-07 00:53:24,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367204.6049576, 'message': 'Dec 7 00:53:24 hqnl0246134 sshd[271520]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0659 seconds
INFO [2022-12-07 00:53:24,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367204.6052096, 'message': 'Dec 7 00:53:24 hqnl0246134 sshd[271520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0876 seconds
INFO [2022-12-07 00:53:26,698] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367206.6057055, 'message': 'Dec 7 00:53:26 hqnl0246134 sshd[271520]: Failed password for root from 61.177.173.48 port 53225 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0922 seconds
INFO [2022-12-07 00:53:26,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367206.6059108, 'message': 'Dec 7 00:53:26 hqnl0246134 sshd[271520]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0508 seconds
INFO [2022-12-07 00:53:28,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367208.6078684, 'message': 'Dec 7 00:53:27 hqnl0246134 sshd[271520]: Failed password for root from 61.177.173.48 port 53225 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 00:53:30,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367210.6099896, 'message': 'Dec 7 00:53:28 hqnl0246134 sshd[271520]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 00:53:32,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367212.6129346, 'message': 'Dec 7 00:53:30 hqnl0246134 sshd[271520]: Failed password for root from 61.177.173.48 port 53225 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 00:53:34,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367214.6145215, 'message': 'Dec 7 00:53:34 hqnl0246134 sshd[271529]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-07 00:53:34,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367214.614855, 'message': 'Dec 7 00:53:34 hqnl0246134 sshd[271529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 00:53:35,575] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:53:35,576] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:53:35,586] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:53:35,600] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0232 seconds
INFO [2022-12-07 00:53:38,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367218.6186132, 'message': 'Dec 7 00:53:37 hqnl0246134 sshd[271529]: Failed password for root from 61.177.173.48 port 32541 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 00:53:38,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367218.6189804, 'message': 'Dec 7 00:53:38 hqnl0246134 sshd[271543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-07 00:53:40,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367220.6210153, 'message': 'Dec 7 00:53:39 hqnl0246134 sshd[271529]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-07 00:53:40,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367220.6212761, 'message': 'Dec 7 00:53:39 hqnl0246134 sshd[271543]: Failed password for root from 61.177.173.18 port 48326 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 00:53:40,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367220.6213882, 'message': 'Dec 7 00:53:40 hqnl0246134 sshd[271529]: Failed password for root from 61.177.173.48 port 32541 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 00:53:42,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367222.6257653, 'message': 'Dec 7 00:53:41 hqnl0246134 sshd[271529]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0423 seconds
INFO [2022-12-07 00:53:42,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367222.626035, 'message': 'Dec 7 00:53:42 hqnl0246134 sshd[271543]: Failed password for root from 61.177.173.18 port 48326 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-07 00:53:44,675] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367224.630303, 'message': 'Dec 7 00:53:43 hqnl0246134 sshd[271529]: Failed password for root from 61.177.173.48 port 32541 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0449 seconds
INFO [2022-12-07 00:53:44,676] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367224.6305504, 'message': 'Dec 7 00:53:44 hqnl0246134 sshd[271543]: Failed password for root from 61.177.173.18 port 48326 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0451 seconds
INFO [2022-12-07 00:53:46,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367226.6372495, 'message': 'Dec 7 00:53:44 hqnl0246134 sshd[271545]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 00:53:46,676] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367226.637425, 'message': 'Dec 7 00:53:44 hqnl0246134 sshd[271545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 00:53:48,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367228.6380963, 'message': 'Dec 7 00:53:47 hqnl0246134 sshd[271545]: Failed password for root from 61.177.173.48 port 17785 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
WARNING [2022-12-07 00:53:50,074] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:53:50,075] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:53:50,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367230.640023, 'message': 'Dec 7 00:53:49 hqnl0246134 sshd[271545]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 00:53:50,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367230.6402738, 'message': 'Dec 7 00:53:50 hqnl0246134 sshd[271545]: Failed password for root from 61.177.173.48 port 17785 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 00:53:52,660] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367232.641495, 'message': 'Dec 7 00:53:51 hqnl0246134 sshd[271545]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 00:53:54,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670367234.644353, 'message': 'Dec 7 00:53:53 hqnl0246134 sshd[271545]: Failed password for root from 61.177.173.48 port 17785 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 00:54:10,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367250.6665015, 'message': 'Dec 7 00:54:08 hqnl0246134 sshd[271567]: Invalid user abc from 165.227.166.207 port 33250', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 00:54:10,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367250.667035, 'message': 'Dec 7 00:54:08 hqnl0246134 sshd[271567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-07 00:54:11,421] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:54:11,441] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0274 seconds
INFO [2022-12-07 00:54:12,687] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367252.6682706, 'message': 'Dec 7 00:54:10 hqnl0246134 sshd[271567]: Failed password for invalid user abc from 165.227.166.207 port 33250 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 00:54:12,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367252.6684732, 'message': 'Dec 7 00:54:11 hqnl0246134 sshd[271567]: Disconnected from invalid user abc 165.227.166.207 port 33250 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 00:54:17,762] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:54:17,763] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:54:17,770] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:54:17,782] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-07 00:54:20,455] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:54:20,456] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:54:20,472] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:54:20,497] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0314 seconds
INFO [2022-12-07 00:54:24,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367264.6803942, 'message': 'Dec 7 00:54:23 hqnl0246134 sshd[271582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 00:54:26,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367266.681859, 'message': 'Dec 7 00:54:25 hqnl0246134 sshd[271582]: Failed password for root from 61.177.173.18 port 55881 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 00:54:30,705] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367270.686527, 'message': 'Dec 7 00:54:30 hqnl0246134 sshd[271582]: Failed password for root from 61.177.173.18 port 55881 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 00:54:34,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367274.6903172, 'message': 'Dec 7 00:54:32 hqnl0246134 sshd[271582]: Failed password for root from 61.177.173.18 port 55881 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-07 00:54:50,079] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:54:50,081] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 00:55:11,428] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:55:11,449] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0321 seconds
INFO [2022-12-07 00:55:17,794] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:55:17,795] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:55:17,801] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:55:17,813] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-07 00:55:20,611] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:55:20,612] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:55:20,618] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:55:20,630] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
WARNING [2022-12-07 00:55:50,086] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:55:50,088] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:55:54,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367354.7793634, 'message': 'Dec 7 00:55:54 hqnl0246134 sshd[271670]: Invalid user admin from 165.227.166.207 port 43538', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-07 00:55:54,833] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367354.7801173, 'message': 'Dec 7 00:55:54 hqnl0246134 sshd[271670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-07 00:55:56,800] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367356.7784796, 'message': 'Dec 7 00:55:56 hqnl0246134 sshd[271670]: Failed password for invalid user admin from 165.227.166.207 port 43538 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 00:55:58,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367358.7809458, 'message': 'Dec 7 00:55:57 hqnl0246134 sshd[271670]: Disconnected from invalid user admin 165.227.166.207 port 43538 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-07 00:56:00,601] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:56:00,602] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:56:00,609] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:56:00,623] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
WARNING [2022-12-07 00:56:11,429] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:56:11,460] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0398 seconds
INFO [2022-12-07 00:56:16,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367376.8044007, 'message': 'Dec 7 00:56:14 hqnl0246134 sshd[271697]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-07 00:56:16,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367376.8047729, 'message': 'Dec 7 00:56:14 hqnl0246134 sshd[271697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.53 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-07 00:56:16,888] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367376.8049762, 'message': 'Dec 7 00:56:16 hqnl0246134 sshd[271697]: Failed password for root from 61.177.173.53 port 47344 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-07 00:56:17,792] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:56:17,792] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:56:17,800] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:56:17,812] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-07 00:56:20,426] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:56:20,426] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:56:20,437] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:56:20,449] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-07 00:56:20,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367380.8081899, 'message': 'Dec 7 00:56:18 hqnl0246134 sshd[271697]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 00:56:22,827] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367382.809653, 'message': 'Dec 7 00:56:21 hqnl0246134 sshd[271697]: Failed password for root from 61.177.173.53 port 47344 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 00:56:24,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367384.8118076, 'message': 'Dec 7 00:56:23 hqnl0246134 sshd[271697]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 00:56:26,838] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367386.814011, 'message': 'Dec 7 00:56:25 hqnl0246134 sshd[271697]: Failed password for root from 61.177.173.53 port 47344 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-07 00:56:30,837] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367390.8184187, 'message': 'Dec 7 00:56:29 hqnl0246134 sshd[271711]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 00:56:30,855] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367390.8186624, 'message': 'Dec 7 00:56:29 hqnl0246134 sshd[271711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.53 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 00:56:32,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367392.8208816, 'message': 'Dec 7 00:56:31 hqnl0246134 sshd[271711]: Failed password for root from 61.177.173.53 port 16553 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-07 00:56:34,845] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367394.823459, 'message': 'Dec 7 00:56:33 hqnl0246134 sshd[271711]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-07 00:56:36,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367396.8260782, 'message': 'Dec 7 00:56:35 hqnl0246134 sshd[271711]: Failed password for root from 61.177.173.53 port 16553 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 00:56:38,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367398.8286111, 'message': 'Dec 7 00:56:38 hqnl0246134 sshd[271711]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 00:56:40,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367400.8297122, 'message': 'Dec 7 00:56:40 hqnl0246134 sshd[271724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 00:56:40,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670367400.8300009, 'message': 'Dec 7 00:56:40 hqnl0246134 sshd[271711]: Failed password for root from 61.177.173.53 port 16553 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-07 00:56:42,855] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367402.8325217, 'message': 'Dec 7 00:56:42 hqnl0246134 sshd[271724]: Failed password for root from 61.177.173.18 port 48744 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-07 00:56:46,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367406.8365898, 'message': 'Dec 7 00:56:46 hqnl0246134 sshd[271724]: Failed password for root from 61.177.173.18 port 48744 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
WARNING [2022-12-07 00:56:50,091] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:56:50,092] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:56:50,863] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367410.8402224, 'message': 'Dec 7 00:56:48 hqnl0246134 sshd[271724]: Failed password for root from 61.177.173.18 port 48744 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
WARNING [2022-12-07 00:57:11,435] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:57:11,466] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0409 seconds
INFO [2022-12-07 00:57:17,939] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:57:17,939] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:57:17,953] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:57:17,972] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0313 seconds
INFO [2022-12-07 00:57:20,535] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:57:20,535] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:57:20,544] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:57:20,555] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-07 00:57:34,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367454.8941236, 'message': 'Dec 7 00:57:34 hqnl0246134 sshd[271770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 00:57:34,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367454.8943994, 'message': 'Dec 7 00:57:34 hqnl0246134 sshd[271770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-07 00:57:36,921] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367456.9004374, 'message': 'Dec 7 00:57:35 hqnl0246134 sshd[271770]: Failed password for root from 61.177.172.114 port 24235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 00:57:36,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367456.9007714, 'message': 'Dec 7 00:57:36 hqnl0246134 sshd[271770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 00:57:38,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367458.904483, 'message': 'Dec 7 00:57:38 hqnl0246134 sshd[271770]: Failed password for root from 61.177.172.114 port 24235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-07 00:57:38,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367458.9046988, 'message': 'Dec 7 00:57:38 hqnl0246134 sshd[271780]: Invalid user alex from 165.227.166.207 port 53810', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-07 00:57:38,949] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367458.904809, 'message': 'Dec 7 00:57:38 hqnl0246134 sshd[271780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-07 00:57:40,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367460.9062054, 'message': 'Dec 7 00:57:40 hqnl0246134 sshd[271780]: Failed password for invalid user alex from 165.227.166.207 port 53810 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 00:57:40,937] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367460.906402, 'message': 'Dec 7 00:57:40 hqnl0246134 sshd[271770]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 00:57:40,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367460.9065561, 'message': 'Dec 7 00:57:40 hqnl0246134 sshd[271780]: Disconnected from invalid user alex 165.227.166.207 port 53810 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 00:57:42,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367462.9083931, 'message': 'Dec 7 00:57:42 hqnl0246134 sshd[271770]: Failed password for root from 61.177.172.114 port 24235 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 00:57:43,199] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:57:43,199] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:57:43,209] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:57:43,220] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-07 00:57:44,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367464.9103963, 'message': 'Dec 7 00:57:44 hqnl0246134 sshd[271789]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-07 00:57:44,966] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367464.9106889, 'message': 'Dec 7 00:57:44 hqnl0246134 sshd[271789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 00:57:46,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367466.9124167, 'message': 'Dec 7 00:57:46 hqnl0246134 sshd[271789]: Failed password for root from 61.177.172.114 port 59072 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 00:57:48,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367468.91368, 'message': 'Dec 7 00:57:48 hqnl0246134 sshd[271789]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0227 seconds
WARNING [2022-12-07 00:57:50,095] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:57:50,096] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 00:57:52,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367472.9184537, 'message': 'Dec 7 00:57:51 hqnl0246134 sshd[271789]: Failed password for root from 61.177.172.114 port 59072 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0731 seconds
INFO [2022-12-07 00:57:54,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367474.922586, 'message': 'Dec 7 00:57:53 hqnl0246134 sshd[271789]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 00:57:56,951] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367476.9253545, 'message': 'Dec 7 00:57:55 hqnl0246134 sshd[271789]: Failed password for root from 61.177.172.114 port 59072 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-07 00:57:58,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367478.9286985, 'message': 'Dec 7 00:57:58 hqnl0246134 sshd[271795]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-07 00:57:58,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367478.9289176, 'message': 'Dec 7 00:57:58 hqnl0246134 sshd[271795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-07 00:58:02,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367482.9366932, 'message': 'Dec 7 00:58:01 hqnl0246134 sshd[271795]: Failed password for root from 61.177.172.114 port 22303 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-07 00:58:04,965] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367484.9407964, 'message': 'Dec 7 00:58:03 hqnl0246134 sshd[271795]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-07 00:58:06,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367486.9418683, 'message': 'Dec 7 00:58:05 hqnl0246134 sshd[271795]: Failed password for root from 61.177.172.114 port 22303 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 00:58:08,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367488.9443996, 'message': 'Dec 7 00:58:07 hqnl0246134 sshd[271795]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 00:58:10,967] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367490.9464734, 'message': 'Dec 7 00:58:09 hqnl0246134 sshd[271795]: Failed password for root from 61.177.172.114 port 22303 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
WARNING [2022-12-07 00:58:11,440] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:58:11,462] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0294 seconds
INFO [2022-12-07 00:58:12,440] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 00:58:12,515] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 00:58:12,516] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 00:58:12,516] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 00:58:12,516] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 00:58:12,516] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 00:58:12,526] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 00:58:12,541] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0236 seconds
WARNING [2022-12-07 00:58:12,548] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 00:58:12,550] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:58:12,568] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0325 seconds
INFO [2022-12-07 00:58:12,570] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0305 seconds
INFO [2022-12-07 00:58:14,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367494.950423, 'message': 'Dec 7 00:58:13 hqnl0246134 sshd[271821]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 00:58:14,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367494.9506218, 'message': 'Dec 7 00:58:13 hqnl0246134 sshd[271821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 00:58:16,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367496.9512613, 'message': 'Dec 7 00:58:15 hqnl0246134 sshd[271821]: Failed password for root from 61.177.172.114 port 21827 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-07 00:58:16,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367496.9515216, 'message': 'Dec 7 00:58:15 hqnl0246134 sshd[271821]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 00:58:17,895] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:58:17,896] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:58:17,903] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:58:17,914] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-07 00:58:18,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367498.9516063, 'message': 'Dec 7 00:58:18 hqnl0246134 sshd[271821]: Failed password for root from 61.177.172.114 port 21827 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 00:58:20,491] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:58:20,492] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:58:20,499] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:58:20,511] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-07 00:58:20,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367500.9556959, 'message': 'Dec 7 00:58:19 hqnl0246134 sshd[271821]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 00:58:22,993] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670367502.959556, 'message': 'Dec 7 00:58:22 hqnl0246134 sshd[271821]: Failed password for root from 61.177.172.114 port 21827 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-07 00:58:42,646] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 00:58:42,648] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 00:58:42,649] im360.plugins.client360: Waiting 7 minutes before retry...
WARNING [2022-12-07 00:58:50,099] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:58:50,100] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 00:59:11,450] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:59:11,475] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0367 seconds
INFO [2022-12-07 00:59:17,985] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:59:17,986] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:59:17,995] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:59:18,007] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0206 seconds
INFO [2022-12-07 00:59:20,789] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:59:20,790] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:59:20,802] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:59:20,816] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0251 seconds
INFO [2022-12-07 00:59:29,836] defence360agent.files: Updating all files
INFO [2022-12-07 00:59:30,115] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-07 00:59:30,116] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-07 00:59:30,402] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-07 00:59:30,402] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-07 00:59:30,724] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-07 00:59:30,724] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-07 00:59:31,417] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-07 00:59:31,418] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-07 00:59:31,418] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-07 00:59:31,685] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 22:59:31 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E5674D8601FA9'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-07 00:59:31,688] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-07 00:59:31,688] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-07 00:59:32,303] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-07 00:59:32,303] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-07 00:59:32,619] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-07 00:59:32,619] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-07 00:59:32,886] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-07 00:59:32,886] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-07 00:59:33,272] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-07 00:59:33,273] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-07 00:59:33,656] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-07 00:59:33,658] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-07 00:59:35,050] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367575.0303638, 'message': 'Dec 7 00:59:33 hqnl0246134 sshd[271881]: Invalid user app from 165.227.166.207 port 35876', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 00:59:35,069] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367575.0305915, 'message': 'Dec 7 00:59:33 hqnl0246134 sshd[271881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 00:59:37,060] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367577.0330043, 'message': 'Dec 7 00:59:36 hqnl0246134 sshd[271881]: Failed password for invalid user app from 165.227.166.207 port 35876 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0264 seconds
INFO [2022-12-07 00:59:39,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367579.0342076, 'message': 'Dec 7 00:59:37 hqnl0246134 sshd[271881]: Disconnected from invalid user app 165.227.166.207 port 35876 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 00:59:39,526] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 00:59:39,527] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 00:59:39,534] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 00:59:39,546] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
WARNING [2022-12-07 00:59:50,102] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 00:59:50,103] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:00:11,461] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:00:11,487] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0433 seconds
INFO [2022-12-07 01:00:18,662] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:00:18,663] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:00:18,671] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:00:18,683] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-07 01:00:21,986] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:00:21,986] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:00:22,038] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:00:22,050] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
INFO [2022-12-07 01:00:23,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367623.070894, 'message': 'Dec 7 01:00:23 hqnl0246134 sshd[271970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-07 01:00:27,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367627.076741, 'message': 'Dec 7 01:00:25 hqnl0246134 sshd[271970]: Failed password for root from 61.177.173.18 port 52521 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-07 01:00:31,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367631.0801437, 'message': 'Dec 7 01:00:29 hqnl0246134 sshd[271970]: Failed password for root from 61.177.173.18 port 52521 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-07 01:00:35,110] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367635.0906672, 'message': 'Dec 7 01:00:31 hqnl0246134 sshd[271970]: Failed password for root from 61.177.173.18 port 52521 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-07 01:00:50,106] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:00:50,108] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:01:07,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367667.1337988, 'message': 'Dec 7 01:01:06 hqnl0246134 sshd[272013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0820 seconds
INFO [2022-12-07 01:01:09,167] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367669.1348336, 'message': 'Dec 7 01:01:08 hqnl0246134 sshd[272013]: Failed password for root from 61.177.173.18 port 36443 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-07 01:01:11,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367671.1383002, 'message': 'Dec 7 01:01:10 hqnl0246134 sshd[272013]: Failed password for root from 61.177.173.18 port 36443 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0235 seconds
WARNING [2022-12-07 01:01:11,459] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:01:11,492] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0456 seconds
INFO [2022-12-07 01:01:15,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367675.1504772, 'message': 'Dec 7 01:01:13 hqnl0246134 sshd[272013]: Failed password for root from 61.177.173.18 port 36443 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0410 seconds
INFO [2022-12-07 01:01:21,568] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:01:21,569] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:01:21,579] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:01:21,592] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-07 01:01:27,687] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:01:27,687] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:01:27,698] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:01:27,713] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0241 seconds
INFO [2022-12-07 01:01:31,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367691.166398, 'message': 'Dec 7 01:01:29 hqnl0246134 sshd[272041]: Invalid user centos from 165.227.166.207 port 46218', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-07 01:01:31,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367691.1667573, 'message': 'Dec 7 01:01:29 hqnl0246134 sshd[272041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 01:01:33,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367693.1683195, 'message': 'Dec 7 01:01:31 hqnl0246134 sshd[272041]: Failed password for invalid user centos from 165.227.166.207 port 46218 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 01:01:33,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367693.168526, 'message': 'Dec 7 01:01:32 hqnl0246134 sshd[272041]: Disconnected from invalid user centos 165.227.166.207 port 46218 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0236 seconds
WARNING [2022-12-07 01:01:50,115] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:01:50,117] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:01:53,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367713.1956344, 'message': 'Dec 7 01:01:51 hqnl0246134 sshd[272063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0328 seconds
WARNING [2022-12-07 01:01:54,094] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-07 01:01:55,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367715.1946516, 'message': 'Dec 7 01:01:53 hqnl0246134 sshd[272063]: Failed password for root from 61.177.173.18 port 58726 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-07 01:02:05,304] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:02:05,305] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:02:05,315] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:02:05,329] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0230 seconds
WARNING [2022-12-07 01:02:11,461] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:02:11,490] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0404 seconds
INFO [2022-12-07 01:02:20,416] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:02:20,417] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:02:20,425] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:02:20,438] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-07 01:02:25,172] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:02:25,172] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:02:25,180] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:02:25,192] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 01:02:35,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367755.2396333, 'message': 'Dec 7 01:02:35 hqnl0246134 sshd[272119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 01:02:37,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367757.2377615, 'message': 'Dec 7 01:02:36 hqnl0246134 sshd[272119]: Failed password for root from 61.177.173.18 port 12770 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
WARNING [2022-12-07 01:02:50,122] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:02:50,124] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:03:11,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367791.304812, 'message': 'Dec 7 01:03:09 hqnl0246134 sshd[272142]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-07 01:03:11,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367791.305649, 'message': 'Dec 7 01:03:09 hqnl0246134 sshd[272142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 01:03:11,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367791.3058167, 'message': 'Dec 7 01:03:11 hqnl0246134 sshd[272142]: Failed password for root from 61.177.173.39 port 38943 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0164 seconds
WARNING [2022-12-07 01:03:11,460] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:03:11,480] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0265 seconds
INFO [2022-12-07 01:03:13,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367793.304555, 'message': 'Dec 7 01:03:12 hqnl0246134 sshd[272156]: Invalid user chenwei from 165.227.166.207 port 56472', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 01:03:13,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367793.3048894, 'message': 'Dec 7 01:03:12 hqnl0246134 sshd[272156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-07 01:03:15,352] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367795.3175092, 'message': 'Dec 7 01:03:13 hqnl0246134 sshd[272142]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-07 01:03:15,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367795.3177364, 'message': 'Dec 7 01:03:14 hqnl0246134 sshd[272156]: Failed password for invalid user chenwei from 165.227.166.207 port 56472 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-07 01:03:15,374] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367795.317869, 'message': 'Dec 7 01:03:15 hqnl0246134 sshd[272142]: Failed password for root from 61.177.173.39 port 38943 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-07 01:03:17,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367797.308838, 'message': 'Dec 7 01:03:15 hqnl0246134 sshd[272142]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0552 seconds
INFO [2022-12-07 01:03:17,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367797.309092, 'message': 'Dec 7 01:03:16 hqnl0246134 sshd[272156]: Disconnected from invalid user chenwei 165.227.166.207 port 56472 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0553 seconds
INFO [2022-12-07 01:03:18,561] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:03:18,561] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:03:18,574] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:03:18,596] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0330 seconds
INFO [2022-12-07 01:03:19,132] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:03:19,132] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:03:19,150] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:03:19,209] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0661 seconds
INFO [2022-12-07 01:03:19,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367799.3102121, 'message': 'Dec 7 01:03:17 hqnl0246134 sshd[272142]: Failed password for root from 61.177.173.39 port 38943 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0572 seconds
INFO [2022-12-07 01:03:21,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367801.3123655, 'message': 'Dec 7 01:03:20 hqnl0246134 sshd[272175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 01:03:23,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367803.3136046, 'message': 'Dec 7 01:03:22 hqnl0246134 sshd[272175]: Failed password for root from 61.177.173.18 port 36531 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 01:03:23,446] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:03:23,447] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:03:23,454] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:03:23,467] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-07 01:03:25,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367805.316767, 'message': 'Dec 7 01:03:24 hqnl0246134 sshd[272175]: Failed password for root from 61.177.173.18 port 36531 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 01:03:29,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367809.3228068, 'message': 'Dec 7 01:03:26 hqnl0246134 sshd[272175]: Failed password for root from 61.177.173.18 port 36531 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 01:03:31,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367811.3251717, 'message': 'Dec 7 01:03:31 hqnl0246134 sshd[272180]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-07 01:03:31,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367811.3254569, 'message': 'Dec 7 01:03:31 hqnl0246134 sshd[272180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 01:03:33,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367813.3270426, 'message': 'Dec 7 01:03:32 hqnl0246134 sshd[272180]: Failed password for root from 61.177.173.39 port 43566 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-07 01:03:35,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367815.3296616, 'message': 'Dec 7 01:03:33 hqnl0246134 sshd[272180]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-07 01:03:35,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367815.330205, 'message': 'Dec 7 01:03:35 hqnl0246134 sshd[272180]: Failed password for root from 61.177.173.39 port 43566 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 01:03:37,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367817.3297331, 'message': 'Dec 7 01:03:35 hqnl0246134 sshd[272180]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 01:03:39,362] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367819.3339748, 'message': 'Dec 7 01:03:38 hqnl0246134 sshd[272180]: Failed password for root from 61.177.173.39 port 43566 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-07 01:03:43,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367823.3367188, 'message': 'Dec 7 01:03:42 hqnl0246134 sshd[272193]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-07 01:03:43,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367823.337121, 'message': 'Dec 7 01:03:42 hqnl0246134 sshd[272193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-07 01:03:45,502] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367825.4851515, 'message': 'Dec 7 01:03:44 hqnl0246134 sshd[272193]: Failed password for root from 61.177.173.39 port 16960 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 01:03:47,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367827.3407564, 'message': 'Dec 7 01:03:46 hqnl0246134 sshd[272193]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:03:49,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367829.346157, 'message': 'Dec 7 01:03:48 hqnl0246134 sshd[272193]: Failed password for root from 61.177.173.39 port 16960 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
WARNING [2022-12-07 01:03:50,127] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:03:50,128] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:03:51,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367831.347599, 'message': 'Dec 7 01:03:50 hqnl0246134 sshd[272193]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:03:53,367] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670367833.349599, 'message': 'Dec 7 01:03:53 hqnl0246134 sshd[272193]: Failed password for root from 61.177.173.39 port 16960 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:04:07,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367847.3658066, 'message': 'Dec 7 01:04:05 hqnl0246134 sshd[272205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-07 01:04:09,399] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367849.3674624, 'message': 'Dec 7 01:04:07 hqnl0246134 sshd[272205]: Failed password for root from 61.177.173.18 port 58662 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
WARNING [2022-12-07 01:04:11,476] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:04:11,512] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0537 seconds
INFO [2022-12-07 01:04:18,136] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:04:18,137] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:04:18,145] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:04:18,159] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-07 01:04:21,368] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:04:21,369] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:04:21,376] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:04:21,389] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-07 01:04:27,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367867.3884792, 'message': 'Dec 7 01:04:26 hqnl0246134 sshd[272230]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-07 01:04:27,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367867.388781, 'message': 'Dec 7 01:04:26 hqnl0246134 sshd[272230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 01:04:29,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367869.3886056, 'message': 'Dec 7 01:04:28 hqnl0246134 sshd[272230]: Failed password for root from 61.177.173.51 port 13308 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-07 01:04:29,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367869.3888667, 'message': 'Dec 7 01:04:28 hqnl0246134 sshd[272230]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 01:04:31,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367871.3907487, 'message': 'Dec 7 01:04:30 hqnl0246134 sshd[272230]: Failed password for root from 61.177.173.51 port 13308 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-07 01:04:31,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367871.3911583, 'message': 'Dec 7 01:04:31 hqnl0246134 sshd[272230]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 01:04:33,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367873.3937447, 'message': 'Dec 7 01:04:32 hqnl0246134 sshd[272230]: Failed password for root from 61.177.173.51 port 13308 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-07 01:04:35,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367875.3959913, 'message': 'Dec 7 01:04:35 hqnl0246134 sshd[272236]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-07 01:04:35,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367875.3963869, 'message': 'Dec 7 01:04:35 hqnl0246134 sshd[272236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.51 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 01:04:36,604] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:04:36,605] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:04:36,612] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:04:36,624] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-07 01:04:37,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367877.3974326, 'message': 'Dec 7 01:04:37 hqnl0246134 sshd[272236]: Failed password for root from 61.177.173.51 port 32743 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-07 01:04:39,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367879.4005225, 'message': 'Dec 7 01:04:37 hqnl0246134 sshd[272236]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0423 seconds
INFO [2022-12-07 01:04:39,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367879.4008539, 'message': 'Dec 7 01:04:39 hqnl0246134 sshd[272236]: Failed password for root from 61.177.173.51 port 32743 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-07 01:04:41,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367881.4004114, 'message': 'Dec 7 01:04:39 hqnl0246134 sshd[272236]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.51 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 01:04:43,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.51', 'timestamp': 1670367883.402392, 'message': 'Dec 7 01:04:41 hqnl0246134 sshd[272236]: Failed password for root from 61.177.173.51 port 32743 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-07 01:04:50,130] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:04:50,131] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:04:53,455] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367893.415399, 'message': 'Dec 7 01:04:51 hqnl0246134 sshd[272254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-07 01:04:55,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367895.4176745, 'message': 'Dec 7 01:04:53 hqnl0246134 sshd[272254]: Failed password for root from 61.177.173.18 port 25924 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-07 01:04:55,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367895.4181185, 'message': 'Dec 7 01:04:54 hqnl0246134 sshd[272257]: Invalid user code87 from 165.227.166.207 port 38514', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0504 seconds
INFO [2022-12-07 01:04:55,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367895.4182596, 'message': 'Dec 7 01:04:54 hqnl0246134 sshd[272257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 01:04:57,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367897.4192278, 'message': 'Dec 7 01:04:56 hqnl0246134 sshd[272254]: Failed password for root from 61.177.173.18 port 25924 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-07 01:04:57,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367897.4196289, 'message': 'Dec 7 01:04:56 hqnl0246134 sshd[272257]: Failed password for invalid user code87 from 165.227.166.207 port 38514 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-07 01:04:59,448] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670367899.4211817, 'message': 'Dec 7 01:04:58 hqnl0246134 sshd[272257]: Disconnected from invalid user code87 165.227.166.207 port 38514 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0268 seconds
INFO [2022-12-07 01:05:01,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367901.424162, 'message': 'Dec 7 01:05:00 hqnl0246134 sshd[272254]: Failed password for root from 61.177.173.18 port 25924 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0525 seconds
WARNING [2022-12-07 01:05:11,479] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:05:11,509] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0437 seconds
INFO [2022-12-07 01:05:18,304] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:05:18,305] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:05:18,313] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:05:18,326] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-07 01:05:21,503] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:05:21,504] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:05:21,512] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:05:21,524] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-07 01:05:37,523] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367937.477397, 'message': 'Dec 7 01:05:36 hqnl0246134 sshd[272345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0440 seconds
INFO [2022-12-07 01:05:37,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367937.47823, 'message': 'Dec 7 01:05:37 hqnl0246134 sshd[272348]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0446 seconds
INFO [2022-12-07 01:05:37,545] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367937.4784024, 'message': 'Dec 7 01:05:37 hqnl0246134 sshd[272348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 01:05:39,512] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367939.478484, 'message': 'Dec 7 01:05:39 hqnl0246134 sshd[272345]: Failed password for root from 61.177.173.18 port 43465 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-07 01:05:41,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367941.4808953, 'message': 'Dec 7 01:05:39 hqnl0246134 sshd[272348]: Failed password for root from 61.177.173.37 port 55725 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-07 01:05:43,512] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367943.4818869, 'message': 'Dec 7 01:05:41 hqnl0246134 sshd[272348]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-07 01:05:43,512] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367943.4821005, 'message': 'Dec 7 01:05:43 hqnl0246134 sshd[272345]: Failed password for root from 61.177.173.18 port 43465 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-07 01:05:45,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367945.4863226, 'message': 'Dec 7 01:05:43 hqnl0246134 sshd[272348]: Failed password for root from 61.177.173.37 port 55725 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0390 seconds
INFO [2022-12-07 01:05:45,528] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367945.4869025, 'message': 'Dec 7 01:05:45 hqnl0246134 sshd[272345]: Failed password for root from 61.177.173.18 port 43465 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-07 01:05:45,546] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367945.4866977, 'message': 'Dec 7 01:05:43 hqnl0246134 sshd[272348]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 01:05:45,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367945.4871447, 'message': 'Dec 7 01:05:45 hqnl0246134 sshd[272348]: Failed password for root from 61.177.173.37 port 55725 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 01:05:48,616] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:05:48,617] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:05:48,625] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:05:48,638] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-07 01:05:49,551] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367949.5132911, 'message': 'Dec 7 01:05:47 hqnl0246134 sshd[272360]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0371 seconds
INFO [2022-12-07 01:05:49,588] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367949.5137246, 'message': 'Dec 7 01:05:47 hqnl0246134 sshd[272360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0356 seconds
WARNING [2022-12-07 01:05:50,134] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:05:50,135] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:05:51,546] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367951.5166087, 'message': 'Dec 7 01:05:50 hqnl0246134 sshd[272360]: Failed password for root from 61.177.173.37 port 20759 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 01:05:53,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367953.5191145, 'message': 'Dec 7 01:05:51 hqnl0246134 sshd[272360]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 01:05:55,569] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367955.5213745, 'message': 'Dec 7 01:05:53 hqnl0246134 sshd[272360]: Failed password for root from 61.177.173.37 port 20759 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0480 seconds
INFO [2022-12-07 01:05:57,549] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367957.5240138, 'message': 'Dec 7 01:05:56 hqnl0246134 sshd[272360]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-07 01:05:59,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367959.5267227, 'message': 'Dec 7 01:05:58 hqnl0246134 sshd[272360]: Failed password for root from 61.177.173.37 port 20759 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-07 01:06:01,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367961.5292299, 'message': 'Dec 7 01:05:59 hqnl0246134 sshd[272371]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-07 01:06:01,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367961.5294385, 'message': 'Dec 7 01:05:59 hqnl0246134 sshd[272371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-07 01:06:03,552] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367963.5315242, 'message': 'Dec 7 01:06:02 hqnl0246134 sshd[272371]: Failed password for root from 61.177.173.37 port 51610 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-07 01:06:05,556] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367965.5353584, 'message': 'Dec 7 01:06:04 hqnl0246134 sshd[272371]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 01:06:07,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367967.5374866, 'message': 'Dec 7 01:06:06 hqnl0246134 sshd[272371]: Failed password for root from 61.177.173.37 port 51610 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 01:06:07,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367967.5376778, 'message': 'Dec 7 01:06:06 hqnl0246134 sshd[272371]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 01:06:08,477] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 01:06:08,546] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 01:06:08,546] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 01:06:08,546] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 01:06:08,547] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 01:06:08,547] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 01:06:08,559] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 01:06:08,576] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0282 seconds
WARNING [2022-12-07 01:06:08,586] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 01:06:08,588] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:06:08,605] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0351 seconds
INFO [2022-12-07 01:06:08,607] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0333 seconds
INFO [2022-12-07 01:06:09,560] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367969.5400507, 'message': 'Dec 7 01:06:08 hqnl0246134 sshd[272371]: Failed password for root from 61.177.173.37 port 51610 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
WARNING [2022-12-07 01:06:11,479] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:06:11,500] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0272 seconds
INFO [2022-12-07 01:06:13,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367973.5453706, 'message': 'Dec 7 01:06:12 hqnl0246134 sshd[272389]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 01:06:13,583] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367973.5456247, 'message': 'Dec 7 01:06:12 hqnl0246134 sshd[272389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:06:15,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367975.5480602, 'message': 'Dec 7 01:06:15 hqnl0246134 sshd[272389]: Failed password for root from 61.177.173.37 port 35348 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-07 01:06:17,592] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367977.549682, 'message': 'Dec 7 01:06:16 hqnl0246134 sshd[272389]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0419 seconds
INFO [2022-12-07 01:06:18,427] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:06:18,428] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:06:18,436] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:06:18,448] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-07 01:06:19,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367979.552878, 'message': 'Dec 7 01:06:19 hqnl0246134 sshd[272389]: Failed password for root from 61.177.173.37 port 35348 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-07 01:06:21,343] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:06:21,344] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:06:21,352] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:06:21,364] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-07 01:06:21,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367981.5539305, 'message': 'Dec 7 01:06:21 hqnl0246134 sshd[272389]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 01:06:23,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367983.5577452, 'message': 'Dec 7 01:06:22 hqnl0246134 sshd[272403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-07 01:06:23,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367983.5580964, 'message': 'Dec 7 01:06:22 hqnl0246134 sshd[272389]: Failed password for root from 61.177.173.37 port 35348 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0456 seconds
INFO [2022-12-07 01:06:25,595] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367985.5584497, 'message': 'Dec 7 01:06:24 hqnl0246134 sshd[272403]: Failed password for root from 61.177.173.18 port 17625 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-07 01:06:25,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367985.5588675, 'message': 'Dec 7 01:06:24 hqnl0246134 sshd[272406]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-07 01:06:25,617] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367985.5590866, 'message': 'Dec 7 01:06:24 hqnl0246134 sshd[272406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.37 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 01:06:27,591] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367987.5606923, 'message': 'Dec 7 01:06:27 hqnl0246134 sshd[272403]: Failed password for root from 61.177.173.18 port 17625 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 01:06:27,592] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367987.5609782, 'message': 'Dec 7 01:06:27 hqnl0246134 sshd[272406]: Failed password for root from 61.177.173.37 port 19652 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-07 01:06:29,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367989.561937, 'message': 'Dec 7 01:06:29 hqnl0246134 sshd[272406]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-07 01:06:31,602] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670367991.568105, 'message': 'Dec 7 01:06:31 hqnl0246134 sshd[272403]: Failed password for root from 61.177.173.18 port 17625 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-07 01:06:31,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367991.5683968, 'message': 'Dec 7 01:06:31 hqnl0246134 sshd[272406]: Failed password for root from 61.177.173.37 port 19652 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-07 01:06:31,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367991.568624, 'message': 'Dec 7 01:06:31 hqnl0246134 sshd[272406]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.37 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:06:33,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.37', 'timestamp': 1670367993.5732348, 'message': 'Dec 7 01:06:33 hqnl0246134 sshd[272406]: Failed password for root from 61.177.173.37 port 19652 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 01:06:38,788] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 01:06:38,789] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 01:06:38,790] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-07 01:06:45,614] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368005.5886426, 'message': 'Dec 7 01:06:43 hqnl0246134 sshd[272440]: Invalid user composer from 165.227.166.207 port 48874', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-07 01:06:45,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368005.5906506, 'message': 'Dec 7 01:06:43 hqnl0246134 sshd[272440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 01:06:45,651] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368005.5908594, 'message': 'Dec 7 01:06:45 hqnl0246134 sshd[272440]: Failed password for invalid user composer from 165.227.166.207 port 48874 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:06:45,669] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368005.591041, 'message': 'Dec 7 01:06:45 hqnl0246134 sshd[272440]: Disconnected from invalid user composer 165.227.166.207 port 48874 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-07 01:06:50,139] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:06:50,139] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:07:07,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368027.6159658, 'message': 'Dec 7 01:07:06 hqnl0246134 sshd[272465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-07 01:07:09,664] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368029.6150799, 'message': 'Dec 7 01:07:08 hqnl0246134 sshd[272465]: Failed password for root from 61.177.173.18 port 36760 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0483 seconds
WARNING [2022-12-07 01:07:11,487] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:07:11,515] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0368 seconds
INFO [2022-12-07 01:07:18,757] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:07:18,758] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:07:18,769] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:07:18,790] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0283 seconds
INFO [2022-12-07 01:07:18,909] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:07:18,910] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:07:18,917] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:07:18,929] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-07 01:07:22,086] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:07:22,087] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:07:22,094] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:07:22,105] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
WARNING [2022-12-07 01:07:50,144] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:07:50,145] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:07:51,697] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368071.673139, 'message': 'Dec 7 01:07:49 hqnl0246134 sshd[272508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-07 01:07:51,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368071.6735516, 'message': 'Dec 7 01:07:51 hqnl0246134 sshd[272508]: Failed password for root from 61.177.173.18 port 49441 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 01:08:07,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368087.7022874, 'message': 'Dec 7 01:08:06 hqnl0246134 sshd[272523]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-07 01:08:07,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368087.7030103, 'message': 'Dec 7 01:08:06 hqnl0246134 sshd[272523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-07 01:08:09,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368089.7037187, 'message': 'Dec 7 01:08:08 hqnl0246134 sshd[272523]: Failed password for root from 61.177.172.114 port 57194 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-07 01:08:09,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368089.704225, 'message': 'Dec 7 01:08:08 hqnl0246134 sshd[272523]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
WARNING [2022-12-07 01:08:11,495] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:08:11,932] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.4511 seconds
INFO [2022-12-07 01:08:11,946] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368091.9142537, 'message': 'Dec 7 01:08:10 hqnl0246134 sshd[272523]: Failed password for root from 61.177.172.114 port 57194 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-07 01:08:11,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368091.9144263, 'message': 'Dec 7 01:08:10 hqnl0246134 sshd[272523]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:08:13,724] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368093.706451, 'message': 'Dec 7 01:08:12 hqnl0246134 sshd[272523]: Failed password for root from 61.177.172.114 port 57194 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 01:08:15,729] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368095.7072554, 'message': 'Dec 7 01:08:14 hqnl0246134 sshd[272540]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 01:08:15,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368095.7075682, 'message': 'Dec 7 01:08:14 hqnl0246134 sshd[272540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 01:08:17,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368097.7121139, 'message': 'Dec 7 01:08:15 hqnl0246134 sshd[272540]: Failed password for root from 61.177.172.114 port 14328 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:08:17,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368097.7123277, 'message': 'Dec 7 01:08:16 hqnl0246134 sshd[272540]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-07 01:08:18,414] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:08:18,414] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:08:18,423] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:08:18,436] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-07 01:08:19,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368099.7140334, 'message': 'Dec 7 01:08:18 hqnl0246134 sshd[272540]: Failed password for root from 61.177.172.114 port 14328 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-07 01:08:19,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368099.7142003, 'message': 'Dec 7 01:08:19 hqnl0246134 sshd[272540]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 01:08:21,523] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:08:21,524] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:08:21,532] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:08:21,543] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 01:08:21,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368101.7163846, 'message': 'Dec 7 01:08:21 hqnl0246134 sshd[272540]: Failed password for root from 61.177.172.114 port 14328 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-07 01:08:25,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368105.722874, 'message': 'Dec 7 01:08:24 hqnl0246134 sshd[272556]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-07 01:08:25,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368105.723287, 'message': 'Dec 7 01:08:24 hqnl0246134 sshd[272556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 01:08:26,306] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:08:26,307] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:08:26,314] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:08:26,326] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-07 01:08:27,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368107.727263, 'message': 'Dec 7 01:08:26 hqnl0246134 sshd[272556]: Failed password for root from 61.177.172.114 port 43709 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-07 01:08:29,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368109.729461, 'message': 'Dec 7 01:08:29 hqnl0246134 sshd[272556]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 01:08:31,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368111.7332659, 'message': 'Dec 7 01:08:30 hqnl0246134 sshd[272556]: Failed password for root from 61.177.172.114 port 43709 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 01:08:31,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368111.7368207, 'message': 'Dec 7 01:08:31 hqnl0246134 sshd[272556]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:08:35,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368115.7382486, 'message': 'Dec 7 01:08:33 hqnl0246134 sshd[272556]: Failed password for root from 61.177.172.114 port 43709 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-07 01:08:35,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368115.7386267, 'message': 'Dec 7 01:08:33 hqnl0246134 sshd[272562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-07 01:08:35,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368115.7387874, 'message': 'Dec 7 01:08:35 hqnl0246134 sshd[272562]: Failed password for root from 61.177.173.18 port 19921 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 01:08:37,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368117.7410836, 'message': 'Dec 7 01:08:37 hqnl0246134 sshd[272564]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 01:08:37,782] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368117.7413223, 'message': 'Dec 7 01:08:37 hqnl0246134 sshd[272564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 01:08:39,782] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368119.7466574, 'message': 'Dec 7 01:08:38 hqnl0246134 sshd[272562]: Failed password for root from 61.177.173.18 port 19921 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 01:08:39,783] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368119.7471836, 'message': 'Dec 7 01:08:39 hqnl0246134 sshd[272564]: Failed password for root from 61.177.172.114 port 42307 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 01:08:39,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368119.7473314, 'message': 'Dec 7 01:08:39 hqnl0246134 sshd[272564]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 01:08:41,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368121.7462137, 'message': 'Dec 7 01:08:41 hqnl0246134 sshd[272564]: Failed password for root from 61.177.172.114 port 42307 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 01:08:43,794] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368123.7485676, 'message': 'Dec 7 01:08:41 hqnl0246134 sshd[272564]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0452 seconds
INFO [2022-12-07 01:08:43,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368123.7487578, 'message': 'Dec 7 01:08:42 hqnl0246134 sshd[272562]: Failed password for root from 61.177.173.18 port 19921 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0455 seconds
INFO [2022-12-07 01:08:43,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368123.748937, 'message': 'Dec 7 01:08:42 hqnl0246134 sshd[272574]: Invalid user czh from 165.227.166.207 port 59108', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-07 01:08:43,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368123.7490711, 'message': 'Dec 7 01:08:42 hqnl0246134 sshd[272574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:08:45,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670368125.7498174, 'message': 'Dec 7 01:08:44 hqnl0246134 sshd[272564]: Failed password for root from 61.177.172.114 port 42307 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0393 seconds
INFO [2022-12-07 01:08:45,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368125.750071, 'message': 'Dec 7 01:08:44 hqnl0246134 sshd[272574]: Failed password for invalid user czh from 165.227.166.207 port 59108 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0391 seconds
INFO [2022-12-07 01:08:47,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368127.7521174, 'message': 'Dec 7 01:08:45 hqnl0246134 sshd[272574]: Disconnected from invalid user czh 165.227.166.207 port 59108 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-07 01:08:50,148] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:08:50,149] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:09:11,500] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:09:11,525] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0356 seconds
INFO [2022-12-07 01:09:18,234] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:09:18,234] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:09:18,249] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:09:18,267] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0290 seconds
INFO [2022-12-07 01:09:19,814] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368159.7935517, 'message': 'Dec 7 01:09:19 hqnl0246134 sshd[272737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 01:09:21,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368161.7942848, 'message': 'Dec 7 01:09:21 hqnl0246134 sshd[272737]: Failed password for root from 61.177.173.18 port 44414 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-07 01:09:22,070] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:09:22,071] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:09:22,084] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:09:22,106] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0351 seconds
INFO [2022-12-07 01:09:25,816] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368165.7978303, 'message': 'Dec 7 01:09:25 hqnl0246134 sshd[272737]: Failed password for root from 61.177.173.18 port 44414 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 01:09:29,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368169.8026874, 'message': 'Dec 7 01:09:28 hqnl0246134 sshd[272737]: Failed password for root from 61.177.173.18 port 44414 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 01:09:33,089] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:09:33,090] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:09:33,098] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:09:33,110] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
WARNING [2022-12-07 01:09:50,151] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:09:50,153] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:10:05,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368205.8409317, 'message': 'Dec 7 01:10:05 hqnl0246134 sshd[272788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-07 01:10:07,864] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368207.8407216, 'message': 'Dec 7 01:10:07 hqnl0246134 sshd[272788]: Failed password for root from 61.177.173.18 port 13682 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0228 seconds
WARNING [2022-12-07 01:10:12,222] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:10:12,248] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.7327 seconds
INFO [2022-12-07 01:10:18,638] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:10:18,639] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:10:18,652] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:10:18,671] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0309 seconds
INFO [2022-12-07 01:10:21,683] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:10:21,683] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:10:21,691] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:10:21,704] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
INFO [2022-12-07 01:10:39,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368239.889076, 'message': 'Dec 7 01:10:39 hqnl0246134 sshd[272827]: Invalid user db2inst1 from 165.227.166.207 port 41170', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-07 01:10:39,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368239.8901386, 'message': 'Dec 7 01:10:39 hqnl0246134 sshd[272827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:10:41,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368241.891489, 'message': 'Dec 7 01:10:41 hqnl0246134 sshd[272827]: Failed password for invalid user db2inst1 from 165.227.166.207 port 41170 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-07 01:10:43,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368243.894783, 'message': 'Dec 7 01:10:43 hqnl0246134 sshd[272827]: Disconnected from invalid user db2inst1 165.227.166.207 port 41170 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 01:10:46,719] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:10:46,724] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:10:46,733] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:10:46,749] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0237 seconds
WARNING [2022-12-07 01:10:50,156] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:10:50,157] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:10:51,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368251.902298, 'message': 'Dec 7 01:10:51 hqnl0246134 sshd[272843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-07 01:10:53,924] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368253.9044893, 'message': 'Dec 7 01:10:53 hqnl0246134 sshd[272843]: Failed password for root from 61.177.173.18 port 32875 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-07 01:11:11,545] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:11:11,587] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0658 seconds
INFO [2022-12-07 01:11:18,379] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:11:18,380] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:11:18,392] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:11:18,409] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0258 seconds
INFO [2022-12-07 01:11:22,940] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:11:22,941] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:11:22,948] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:11:22,961] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-07 01:11:39,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368299.9628189, 'message': 'Dec 7 01:11:38 hqnl0246134 sshd[272880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-07 01:11:41,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368301.9622622, 'message': 'Dec 7 01:11:41 hqnl0246134 sshd[272880]: Failed password for root from 61.177.173.18 port 58424 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
WARNING [2022-12-07 01:11:50,161] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:11:50,163] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:11:54,100] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-07 01:12:11,537] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:12:11,561] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0344 seconds
INFO [2022-12-07 01:12:18,063] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:12:18,064] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:12:18,071] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:12:18,085] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-07 01:12:20,943] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:12:20,944] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:12:20,951] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:12:20,963] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-07 01:12:26,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368346.0645216, 'message': 'Dec 7 01:12:25 hqnl0246134 sshd[272928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 01:12:30,097] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368350.0752003, 'message': 'Dec 7 01:12:28 hqnl0246134 sshd[272928]: Failed password for root from 61.177.173.18 port 24256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-07 01:12:32,101] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368352.0774596, 'message': 'Dec 7 01:12:31 hqnl0246134 sshd[272928]: Failed password for root from 61.177.173.18 port 24256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-07 01:12:36,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368356.0815296, 'message': 'Dec 7 01:12:35 hqnl0246134 sshd[272928]: Failed password for root from 61.177.173.18 port 24256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-07 01:12:38,684] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:12:38,684] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:12:38,692] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:12:38,704] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-07 01:12:40,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368360.0871384, 'message': 'Dec 7 01:12:38 hqnl0246134 sshd[272947]: Invalid user dell from 165.227.166.207 port 51450', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-07 01:12:40,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368360.087533, 'message': 'Dec 7 01:12:38 hqnl0246134 sshd[272947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 01:12:42,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368362.08921, 'message': 'Dec 7 01:12:40 hqnl0246134 sshd[272947]: Failed password for invalid user dell from 165.227.166.207 port 51450 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0257 seconds
INFO [2022-12-07 01:12:42,136] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368362.089395, 'message': 'Dec 7 01:12:41 hqnl0246134 sshd[272947]: Disconnected from invalid user dell 165.227.166.207 port 51450 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
WARNING [2022-12-07 01:12:50,167] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:12:50,168] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:12:54,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368374.1070611, 'message': 'Dec 7 01:12:53 hqnl0246134 sshd[272965]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0456 seconds
INFO [2022-12-07 01:12:54,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368374.1076543, 'message': 'Dec 7 01:12:53 hqnl0246134 sshd[272965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-07 01:12:56,127] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368376.1082075, 'message': 'Dec 7 01:12:55 hqnl0246134 sshd[272965]: Failed password for root from 61.177.173.50 port 26036 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 01:12:58,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368378.1106327, 'message': 'Dec 7 01:12:57 hqnl0246134 sshd[272965]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-07 01:13:00,134] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368380.1132255, 'message': 'Dec 7 01:12:59 hqnl0246134 sshd[272965]: Failed password for root from 61.177.173.50 port 26036 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-07 01:13:00,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368380.113444, 'message': 'Dec 7 01:13:00 hqnl0246134 sshd[272965]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 01:13:02,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368382.1158566, 'message': 'Dec 7 01:13:01 hqnl0246134 sshd[272967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 01:13:02,159] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368382.1160712, 'message': 'Dec 7 01:13:01 hqnl0246134 sshd[272967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-07 01:13:02,371] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-07 01:13:02,382] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:13:02,394] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0187 seconds
INFO [2022-12-07 01:13:04,146] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368384.1178355, 'message': 'Dec 7 01:13:02 hqnl0246134 sshd[272965]: Failed password for root from 61.177.173.50 port 26036 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-07 01:13:04,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368384.1180518, 'message': 'Dec 7 01:13:03 hqnl0246134 sshd[272967]: Failed password for root from 61.177.173.39 port 21724 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-07 01:13:06,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368386.1208234, 'message': 'Dec 7 01:13:05 hqnl0246134 sshd[272967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-07 01:13:06,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368386.1210272, 'message': 'Dec 7 01:13:06 hqnl0246134 sshd[272987]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0463 seconds
INFO [2022-12-07 01:13:06,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368386.1212022, 'message': 'Dec 7 01:13:06 hqnl0246134 sshd[272987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 01:13:08,158] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368388.123226, 'message': 'Dec 7 01:13:07 hqnl0246134 sshd[272967]: Failed password for root from 61.177.173.39 port 21724 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-07 01:13:08,159] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368388.1235373, 'message': 'Dec 7 01:13:07 hqnl0246134 sshd[272987]: Failed password for root from 61.177.173.50 port 14172 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-07 01:13:08,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368388.1237154, 'message': 'Dec 7 01:13:08 hqnl0246134 sshd[272967]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-07 01:13:10,213] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368390.1401675, 'message': 'Dec 7 01:13:08 hqnl0246134 sshd[272987]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0716 seconds
INFO [2022-12-07 01:13:10,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368390.140565, 'message': 'Dec 7 01:13:09 hqnl0246134 sshd[272967]: Failed password for root from 61.177.173.39 port 21724 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0712 seconds
WARNING [2022-12-07 01:13:11,542] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:13:11,597] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0655 seconds
INFO [2022-12-07 01:13:12,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368392.1291773, 'message': 'Dec 7 01:13:10 hqnl0246134 sshd[272987]: Failed password for root from 61.177.173.50 port 14172 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0451 seconds
INFO [2022-12-07 01:13:12,177] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368392.1295729, 'message': 'Dec 7 01:13:11 hqnl0246134 sshd[272991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0461 seconds
INFO [2022-12-07 01:13:12,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368392.1296995, 'message': 'Dec 7 01:13:12 hqnl0246134 sshd[272999]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0462 seconds
INFO [2022-12-07 01:13:12,209] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368392.1293743, 'message': 'Dec 7 01:13:10 hqnl0246134 sshd[272987]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-07 01:13:12,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368392.129862, 'message': 'Dec 7 01:13:12 hqnl0246134 sshd[272999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-07 01:13:12,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670368392.1299865, 'message': 'Dec 7 01:13:12 hqnl0246134 sshd[272987]: Failed password for root from 61.177.173.50 port 14172 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 01:13:14,159] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368394.1302414, 'message': 'Dec 7 01:13:12 hqnl0246134 sshd[272991]: Failed password for root from 61.177.173.18 port 49035 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-07 01:13:14,159] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368394.1304305, 'message': 'Dec 7 01:13:13 hqnl0246134 sshd[272999]: Failed password for root from 61.177.173.39 port 50385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-07 01:13:14,176] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368394.1305664, 'message': 'Dec 7 01:13:14 hqnl0246134 sshd[272999]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 01:13:16,158] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368396.1356924, 'message': 'Dec 7 01:13:15 hqnl0246134 sshd[272991]: Failed password for root from 61.177.173.18 port 49035 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 01:13:18,175] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368398.1373622, 'message': 'Dec 7 01:13:16 hqnl0246134 sshd[272999]: Failed password for root from 61.177.173.39 port 50385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-07 01:13:20,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368400.1380534, 'message': 'Dec 7 01:13:18 hqnl0246134 sshd[272999]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-07 01:13:20,182] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368400.1383562, 'message': 'Dec 7 01:13:19 hqnl0246134 sshd[272991]: Failed password for root from 61.177.173.18 port 49035 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-07 01:13:20,771] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:13:20,772] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:13:20,781] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:13:20,795] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0229 seconds
INFO [2022-12-07 01:13:22,168] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368402.1403284, 'message': 'Dec 7 01:13:20 hqnl0246134 sshd[272999]: Failed password for root from 61.177.173.39 port 50385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-07 01:13:23,906] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 01:13:24,000] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:13:24,001] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:13:24,012] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:13:24,082] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 01:13:24,082] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 01:13:24,083] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 01:13:24,083] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 01:13:24,083] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 01:13:24,091] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0884 seconds
INFO [2022-12-07 01:13:24,830] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 01:13:24,865] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.7809 seconds
WARNING [2022-12-07 01:13:24,875] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 01:13:24,882] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:13:24,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368404.8342738, 'message': 'Dec 7 01:13:22 hqnl0246134 sshd[273030]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-07 01:13:24,916] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0581 seconds
INFO [2022-12-07 01:13:24,921] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0547 seconds
INFO [2022-12-07 01:13:24,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368404.834562, 'message': 'Dec 7 01:13:22 hqnl0246134 sshd[273030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0457 seconds
INFO [2022-12-07 01:13:24,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368404.8346944, 'message': 'Dec 7 01:13:23 hqnl0246134 sshd[273030]: Failed password for root from 61.177.173.39 port 30067 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 01:13:26,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368406.1460578, 'message': 'Dec 7 01:13:24 hqnl0246134 sshd[273030]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-07 01:13:28,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368408.149283, 'message': 'Dec 7 01:13:27 hqnl0246134 sshd[273030]: Failed password for root from 61.177.173.39 port 30067 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-07 01:13:30,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368410.152684, 'message': 'Dec 7 01:13:28 hqnl0246134 sshd[273030]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-07 01:13:32,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368412.155006, 'message': 'Dec 7 01:13:30 hqnl0246134 sshd[273030]: Failed password for root from 61.177.173.39 port 30067 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0241 seconds
WARNING [2022-12-07 01:13:50,178] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:13:50,179] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:13:54,213] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 01:13:54,214] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 01:13:54,215] im360.plugins.client360: Waiting 7 minutes before retry...
INFO [2022-12-07 01:13:58,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368438.198673, 'message': 'Dec 7 01:13:56 hqnl0246134 sshd[273053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-07 01:13:58,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368438.1991467, 'message': 'Dec 7 01:13:57 hqnl0246134 sshd[273053]: Failed password for root from 61.177.173.18 port 63678 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 01:14:02,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368442.2018807, 'message': 'Dec 7 01:13:59 hqnl0246134 sshd[273053]: Failed password for root from 61.177.173.18 port 63678 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:14:04,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368444.2043085, 'message': 'Dec 7 01:14:02 hqnl0246134 sshd[273053]: Failed password for root from 61.177.173.18 port 63678 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 01:14:07,914] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:14:07,915] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:14:07,923] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:14:07,934] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
WARNING [2022-12-07 01:14:11,545] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:14:11,569] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0334 seconds
INFO [2022-12-07 01:14:17,948] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:14:17,948] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:14:17,957] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:14:17,969] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-07 01:14:20,734] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:14:20,735] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:14:20,742] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:14:20,754] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 01:14:26,246] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368466.2231998, 'message': 'Dec 7 01:14:24 hqnl0246134 sshd[273096]: Invalid user dell from 165.227.166.207 port 33508', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-07 01:14:26,265] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368466.2237015, 'message': 'Dec 7 01:14:25 hqnl0246134 sshd[273096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:14:28,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368468.2257464, 'message': 'Dec 7 01:14:26 hqnl0246134 sshd[273096]: Failed password for invalid user dell from 165.227.166.207 port 33508 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 01:14:28,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368468.226052, 'message': 'Dec 7 01:14:28 hqnl0246134 sshd[273096]: Disconnected from invalid user dell 165.227.166.207 port 33508 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 01:14:40,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368480.240371, 'message': 'Dec 7 01:14:40 hqnl0246134 sshd[273100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-07 01:14:42,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368482.2435892, 'message': 'Dec 7 01:14:42 hqnl0246134 sshd[273100]: Failed password for root from 61.177.173.18 port 24158 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
WARNING [2022-12-07 01:14:50,182] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:14:50,184] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:15:11,551] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:15:11,579] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0407 seconds
INFO [2022-12-07 01:15:16,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670368516.286979, 'message': 'Dec 7 01:15:15 hqnl0246134 sshd[273158]: Invalid user test from 152.89.196.220 port 60364', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0797 seconds
INFO [2022-12-07 01:15:16,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '152.89.196.220', 'timestamp': 1670368516.2878032, 'message': 'Dec 7 01:15:15 hqnl0246134 sshd[273158]: pam_imunify(sshd:auth): [IM360_RBL] The IP 152.89.196.220 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0681 seconds
INFO [2022-12-07 01:15:16,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '152.89.196.220', 'timestamp': 1670368516.2880816, 'message': 'Dec 7 01:15:15 hqnl0246134 sshd[273158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.196.220 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0601 seconds
INFO [2022-12-07 01:15:18,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670368518.2851286, 'message': 'Dec 7 01:15:17 hqnl0246134 sshd[273158]: Failed password for invalid user test from 152.89.196.220 port 60364 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0482 seconds
INFO [2022-12-07 01:15:18,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '152.89.196.220', 'timestamp': 1670368518.285506, 'message': 'Dec 7 01:15:17 hqnl0246134 sshd[273158]: Disconnected from invalid user test 152.89.196.220 port 60364 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-07 01:15:18,564] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:15:18,565] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:15:18,573] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:15:18,587] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-07 01:15:20,638] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:15:20,638] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:15:20,646] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:15:20,658] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 01:15:22,916] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:15:22,916] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:15:22,927] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:15:22,940] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
INFO [2022-12-07 01:15:26,315] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368526.2929592, 'message': 'Dec 7 01:15:24 hqnl0246134 sshd[273178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-07 01:15:28,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368528.2953713, 'message': 'Dec 7 01:15:26 hqnl0246134 sshd[273178]: Failed password for root from 61.177.173.18 port 42895 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-07 01:15:30,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368530.2964797, 'message': 'Dec 7 01:15:28 hqnl0246134 sshd[273178]: Failed password for root from 61.177.173.18 port 42895 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-07 01:15:32,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368532.2987874, 'message': 'Dec 7 01:15:31 hqnl0246134 sshd[273178]: Failed password for root from 61.177.173.18 port 42895 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
WARNING [2022-12-07 01:15:50,187] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:15:50,188] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:16:10,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368570.3447423, 'message': 'Dec 7 01:16:09 hqnl0246134 sshd[273204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0322 seconds
WARNING [2022-12-07 01:16:11,552] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:16:11,580] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0373 seconds
INFO [2022-12-07 01:16:12,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368572.3445046, 'message': 'Dec 7 01:16:11 hqnl0246134 sshd[273204]: Failed password for root from 61.177.173.18 port 59196 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 01:16:18,339] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:16:18,339] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:16:18,359] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:16:18,371] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0287 seconds
INFO [2022-12-07 01:16:21,773] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:16:21,774] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:16:21,794] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:16:21,838] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0618 seconds
INFO [2022-12-07 01:16:26,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368586.359843, 'message': 'Dec 7 01:16:25 hqnl0246134 sshd[273229]: Invalid user dell from 165.227.166.207 port 43792', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 01:16:26,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368586.3601804, 'message': 'Dec 7 01:16:25 hqnl0246134 sshd[273229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0162 seconds
INFO [2022-12-07 01:16:30,406] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368590.3634186, 'message': 'Dec 7 01:16:28 hqnl0246134 sshd[273229]: Failed password for invalid user dell from 165.227.166.207 port 43792 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0422 seconds
INFO [2022-12-07 01:16:30,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368590.3638182, 'message': 'Dec 7 01:16:29 hqnl0246134 sshd[273229]: Disconnected from invalid user dell 165.227.166.207 port 43792 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
WARNING [2022-12-07 01:16:50,193] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:16:50,195] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:16:56,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368616.3879879, 'message': 'Dec 7 01:16:56 hqnl0246134 sshd[273243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 01:16:58,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368618.3891184, 'message': 'Dec 7 01:16:57 hqnl0246134 sshd[273243]: Failed password for root from 61.177.173.18 port 34116 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0520 seconds
INFO [2022-12-07 01:17:02,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368622.3956795, 'message': 'Dec 7 01:17:00 hqnl0246134 sshd[273243]: Failed password for root from 61.177.173.18 port 34116 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0225 seconds
INFO [2022-12-07 01:17:06,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368626.4033961, 'message': 'Dec 7 01:17:04 hqnl0246134 sshd[273243]: Failed password for root from 61.177.173.18 port 34116 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-07 01:17:08,020] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:17:08,021] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:17:08,031] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:17:08,044] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
WARNING [2022-12-07 01:17:11,563] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:17:11,598] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0491 seconds
INFO [2022-12-07 01:17:16,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '196.1.114.254', 'timestamp': 1670368636.413859, 'message': 'Dec 7 01:17:16 hqnl0246134 sshd[273277]: Invalid user vnc from 196.1.114.254 port 41817', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 01:17:18,260] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:17:18,261] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:17:18,270] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:17:18,284] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-07 01:17:18,515] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '196.1.114.254', 'timestamp': 1670368638.4947376, 'message': 'Dec 7 01:17:16 hqnl0246134 sshd[273277]: pam_imunify(sshd:auth): [IM360_RBL] The IP 196.1.114.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 01:17:18,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '196.1.114.254', 'timestamp': 1670368638.4949603, 'message': 'Dec 7 01:17:16 hqnl0246134 sshd[273277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.114.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:17:18,552] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '196.1.114.254', 'timestamp': 1670368638.4951048, 'message': 'Dec 7 01:17:18 hqnl0246134 sshd[273277]: Failed password for invalid user vnc from 196.1.114.254 port 41817 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 01:17:20,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '196.1.114.254', 'timestamp': 1670368640.4164257, 'message': 'Dec 7 01:17:19 hqnl0246134 sshd[273277]: Disconnected from invalid user vnc 196.1.114.254 port 41817 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-07 01:17:21,205] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:17:21,205] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:17:21,214] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:17:21,226] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-07 01:17:36,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.255.8.153', 'timestamp': 1670368656.4400973, 'message': 'Dec 7 01:17:34 hqnl0246134 sshd[273290]: Invalid user appadmin from 36.255.8.153 port 50640', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-07 01:17:36,501] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.255.8.153', 'timestamp': 1670368656.4409916, 'message': 'Dec 7 01:17:34 hqnl0246134 sshd[273290]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.255.8.153 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-07 01:17:36,532] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.255.8.153', 'timestamp': 1670368656.4411979, 'message': 'Dec 7 01:17:34 hqnl0246134 sshd[273290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.8.153 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 01:17:38,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.255.8.153', 'timestamp': 1670368658.4389896, 'message': 'Dec 7 01:17:36 hqnl0246134 sshd[273290]: Failed password for invalid user appadmin from 36.255.8.153 port 50640 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-07 01:17:38,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.255.8.153', 'timestamp': 1670368658.4392414, 'message': 'Dec 7 01:17:37 hqnl0246134 sshd[273290]: Disconnected from invalid user appadmin 36.255.8.153 port 50640 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-07 01:17:42,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368662.4426048, 'message': 'Dec 7 01:17:41 hqnl0246134 sshd[273295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-07 01:17:44,477] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368664.4432175, 'message': 'Dec 7 01:17:44 hqnl0246134 sshd[273295]: Failed password for root from 61.177.173.18 port 47569 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
WARNING [2022-12-07 01:17:50,198] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:17:50,200] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:18:11,695] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:18:12,678] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 1.1224 seconds
INFO [2022-12-07 01:18:18,254] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:18:18,254] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:18:18,274] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:18:18,297] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0391 seconds
INFO [2022-12-07 01:18:21,323] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:18:21,323] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:18:21,332] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:18:21,345] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0203 seconds
INFO [2022-12-07 01:18:28,534] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368708.495776, 'message': 'Dec 7 01:18:26 hqnl0246134 sshd[273336]: Invalid user dell from 165.227.166.207 port 54096', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-07 01:18:28,537] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368708.4963717, 'message': 'Dec 7 01:18:28 hqnl0246134 sshd[273338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-07 01:18:28,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368708.4960322, 'message': 'Dec 7 01:18:26 hqnl0246134 sshd[273336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-07 01:18:28,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368708.4962444, 'message': 'Dec 7 01:18:27 hqnl0246134 sshd[273336]: Failed password for invalid user dell from 165.227.166.207 port 54096 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 01:18:28,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368708.4964802, 'message': 'Dec 7 01:18:28 hqnl0246134 sshd[273336]: Disconnected from invalid user dell 165.227.166.207 port 54096 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-07 01:18:30,569] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368710.4961164, 'message': 'Dec 7 01:18:30 hqnl0246134 sshd[273338]: Failed password for root from 61.177.173.18 port 19799 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0725 seconds
INFO [2022-12-07 01:18:31,623] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:18:31,623] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:18:31,631] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:18:31,645] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-07 01:18:34,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368714.5047529, 'message': 'Dec 7 01:18:34 hqnl0246134 sshd[273338]: Failed password for root from 61.177.173.18 port 19799 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-07 01:18:40,558] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368720.5149083, 'message': 'Dec 7 01:18:36 hqnl0246134 sshd[273338]: Failed password for root from 61.177.173.18 port 19799 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0415 seconds
WARNING [2022-12-07 01:18:50,204] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:18:50,206] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:18:56,552] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368736.5293026, 'message': 'Dec 7 01:18:56 hqnl0246134 sshd[273379]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.123.135 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-07 01:18:56,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368736.5353608, 'message': 'Dec 7 01:18:56 hqnl0246134 sshd[273379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.123.135 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 01:19:00,563] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368740.5331094, 'message': 'Dec 7 01:18:58 hqnl0246134 sshd[273379]: Failed password for root from 46.101.123.135 port 35644 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 01:19:00,563] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.22.246.215', 'timestamp': 1670368740.5333002, 'message': 'Dec 7 01:18:59 hqnl0246134 sshd[273383]: Invalid user teste from 165.22.246.215 port 43522', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 01:19:00,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.22.246.215', 'timestamp': 1670368740.5369043, 'message': 'Dec 7 01:18:59 hqnl0246134 sshd[273383]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.22.246.215 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:19:00,599] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.22.246.215', 'timestamp': 1670368740.5370424, 'message': 'Dec 7 01:18:59 hqnl0246134 sshd[273383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.246.215 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:19:02,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.22.246.215', 'timestamp': 1670368742.5358129, 'message': 'Dec 7 01:19:01 hqnl0246134 sshd[273383]: Failed password for invalid user teste from 165.22.246.215 port 43522 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 01:19:02,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.22.246.215', 'timestamp': 1670368742.5367193, 'message': 'Dec 7 01:19:02 hqnl0246134 sshd[273383]: Disconnected from invalid user teste 165.22.246.215 port 43522 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-07 01:19:11,575] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:19:11,719] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.1579 seconds
INFO [2022-12-07 01:19:12,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368752.5471766, 'message': 'Dec 7 01:19:12 hqnl0246134 sshd[273399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-07 01:19:14,571] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368754.5496185, 'message': 'Dec 7 01:19:14 hqnl0246134 sshd[273399]: Failed password for root from 61.177.173.18 port 30436 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 01:19:18,325] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:19:18,325] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:19:18,333] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:19:18,345] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 01:19:18,578] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368758.5599842, 'message': 'Dec 7 01:19:15 hqnl0246134 sshd[273399]: Failed password for root from 61.177.173.18 port 30436 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 01:19:20,582] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368760.561958, 'message': 'Dec 7 01:19:18 hqnl0246134 sshd[273399]: Failed password for root from 61.177.173.18 port 30436 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 01:19:20,924] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:19:20,925] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:19:20,931] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:19:20,942] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
WARNING [2022-12-07 01:19:50,210] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:19:50,211] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:19:56,625] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368796.599194, 'message': 'Dec 7 01:19:56 hqnl0246134 sshd[273431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-07 01:19:58,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368798.601638, 'message': 'Dec 7 01:19:58 hqnl0246134 sshd[273431]: Failed password for root from 61.177.173.18 port 55059 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0367 seconds
INFO [2022-12-07 01:20:02,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368802.6168725, 'message': 'Dec 7 01:20:00 hqnl0246134 sshd[273431]: Failed password for root from 61.177.173.18 port 55059 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0774 seconds
INFO [2022-12-07 01:20:04,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368804.6166732, 'message': 'Dec 7 01:20:02 hqnl0246134 sshd[273431]: Failed password for root from 61.177.173.18 port 55059 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-07 01:20:08,056] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:20:08,057] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:20:08,067] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:20:08,082] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0241 seconds
WARNING [2022-12-07 01:20:11,576] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:20:11,597] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0280 seconds
INFO [2022-12-07 01:20:18,183] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:20:18,185] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:20:18,202] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:20:18,216] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0295 seconds
INFO [2022-12-07 01:20:20,973] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:20:20,973] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:20:20,982] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:20:20,995] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-07 01:20:24,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368824.64068, 'message': 'Dec 7 01:20:23 hqnl0246134 sshd[273489]: Invalid user dell from 165.227.166.207 port 36150', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0388 seconds
INFO [2022-12-07 01:20:24,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368824.641053, 'message': 'Dec 7 01:20:23 hqnl0246134 sshd[273489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 01:20:26,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368826.6437752, 'message': 'Dec 7 01:20:25 hqnl0246134 sshd[273489]: Failed password for invalid user dell from 165.227.166.207 port 36150 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 01:20:28,675] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368828.646047, 'message': 'Dec 7 01:20:26 hqnl0246134 sshd[273489]: Disconnected from invalid user dell 165.227.166.207 port 36150 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 01:20:38,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.185.26.240', 'timestamp': 1670368838.656791, 'message': 'Dec 7 01:20:36 hqnl0246134 sshd[273494]: Invalid user oracle from 41.185.26.240 port 45360', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-07 01:20:38,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.185.26.240', 'timestamp': 1670368838.6570184, 'message': 'Dec 7 01:20:37 hqnl0246134 sshd[273494]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.185.26.240 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 01:20:38,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.185.26.240', 'timestamp': 1670368838.6571329, 'message': 'Dec 7 01:20:37 hqnl0246134 sshd[273494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.185.26.240 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-07 01:20:38,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.185.26.240', 'timestamp': 1670368838.6572506, 'message': 'Dec 7 01:20:38 hqnl0246134 sshd[273494]: Failed password for invalid user oracle from 41.185.26.240 port 45360 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:20:40,696] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368840.6614556, 'message': 'Dec 7 01:20:39 hqnl0246134 sshd[273496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-07 01:20:40,697] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.185.26.240', 'timestamp': 1670368840.6618218, 'message': 'Dec 7 01:20:40 hqnl0246134 sshd[273494]: Disconnected from invalid user oracle 41.185.26.240 port 45360 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-07 01:20:42,689] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368842.663516, 'message': 'Dec 7 01:20:41 hqnl0246134 sshd[273496]: Failed password for root from 61.177.173.18 port 17579 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0253 seconds
WARNING [2022-12-07 01:20:50,215] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:20:50,216] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:20:54,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368854.6749103, 'message': 'Dec 7 01:20:53 hqnl0246134 sshd[273509]: Invalid user alvin from 46.101.123.135 port 34864', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-07 01:20:54,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368854.6753728, 'message': 'Dec 7 01:20:53 hqnl0246134 sshd[273509]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.123.135 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 01:20:54,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368854.6756032, 'message': 'Dec 7 01:20:53 hqnl0246134 sshd[273509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.123.135 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 01:20:56,714] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368856.6769638, 'message': 'Dec 7 01:20:55 hqnl0246134 sshd[273509]: Failed password for invalid user alvin from 46.101.123.135 port 34864 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-07 01:20:56,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.230.236.11', 'timestamp': 1670368856.6774223, 'message': 'Dec 7 01:20:55 hqnl0246134 sshd[273511]: Invalid user skaner from 45.230.236.11 port 57148', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-07 01:20:56,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368856.6772373, 'message': 'Dec 7 01:20:55 hqnl0246134 sshd[273509]: Disconnected from invalid user alvin 46.101.123.135 port 34864 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-07 01:20:56,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.230.236.11', 'timestamp': 1670368856.677549, 'message': 'Dec 7 01:20:56 hqnl0246134 sshd[273511]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.230.236.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-07 01:20:56,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.230.236.11', 'timestamp': 1670368856.677666, 'message': 'Dec 7 01:20:56 hqnl0246134 sshd[273511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.230.236.11 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 01:20:58,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.230.236.11', 'timestamp': 1670368858.6778853, 'message': 'Dec 7 01:20:57 hqnl0246134 sshd[273511]: Failed password for invalid user skaner from 45.230.236.11 port 57148 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-07 01:21:00,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.230.236.11', 'timestamp': 1670368860.6809754, 'message': 'Dec 7 01:20:59 hqnl0246134 sshd[273511]: Disconnected from invalid user skaner 45.230.236.11 port 57148 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 01:21:02,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368862.6822686, 'message': 'Dec 7 01:21:02 hqnl0246134 sshd[273513]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 01:21:02,720] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368862.682476, 'message': 'Dec 7 01:21:02 hqnl0246134 sshd[273513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 01:21:04,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368864.6890776, 'message': 'Dec 7 01:21:04 hqnl0246134 sshd[273513]: Failed password for root from 61.177.173.46 port 23745 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-07 01:21:06,713] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368866.6931133, 'message': 'Dec 7 01:21:04 hqnl0246134 sshd[273513]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 01:21:07,109] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 01:21:07,179] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 01:21:07,180] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 01:21:07,180] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 01:21:07,180] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 01:21:07,181] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 01:21:07,191] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 01:21:07,209] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0277 seconds
WARNING [2022-12-07 01:21:07,216] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 01:21:07,218] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:21:07,235] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0337 seconds
INFO [2022-12-07 01:21:07,237] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0305 seconds
INFO [2022-12-07 01:21:08,714] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368868.696433, 'message': 'Dec 7 01:21:06 hqnl0246134 sshd[273513]: Failed password for root from 61.177.173.46 port 23745 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 01:21:10,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368870.6990635, 'message': 'Dec 7 01:21:09 hqnl0246134 sshd[273513]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0262 seconds
WARNING [2022-12-07 01:21:11,581] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:21:11,615] defence360agent.internals.the_sink: SensorIncidentList(<16 item(s)>) processed in 0.0430 seconds
INFO [2022-12-07 01:21:12,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368872.702005, 'message': 'Dec 7 01:21:11 hqnl0246134 sshd[273513]: Failed password for root from 61.177.173.46 port 23745 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-07 01:21:12,740] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368872.7023664, 'message': 'Dec 7 01:21:12 hqnl0246134 sshd[273522]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-07 01:21:12,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368872.702543, 'message': 'Dec 7 01:21:12 hqnl0246134 sshd[273522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 01:21:14,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368874.7018437, 'message': 'Dec 7 01:21:13 hqnl0246134 sshd[273525]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0640 seconds
INFO [2022-12-07 01:21:14,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368874.7023287, 'message': 'Dec 7 01:21:14 hqnl0246134 sshd[273522]: Failed password for root from 61.177.173.52 port 46690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0645 seconds
INFO [2022-12-07 01:21:14,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368874.7021294, 'message': 'Dec 7 01:21:14 hqnl0246134 sshd[273525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-07 01:21:15,039] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:21:15,040] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:21:15,053] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:21:15,071] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0294 seconds
INFO [2022-12-07 01:21:16,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368876.7046204, 'message': 'Dec 7 01:21:15 hqnl0246134 sshd[273525]: Failed password for root from 61.177.173.46 port 57746 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-07 01:21:16,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368876.7048793, 'message': 'Dec 7 01:21:16 hqnl0246134 sshd[273522]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-07 01:21:18,737] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368878.708552, 'message': 'Dec 7 01:21:16 hqnl0246134 sshd[273525]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-07 01:21:18,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368878.7088432, 'message': 'Dec 7 01:21:18 hqnl0246134 sshd[273522]: Failed password for root from 61.177.173.52 port 46690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 01:21:18,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368878.7090108, 'message': 'Dec 7 01:21:18 hqnl0246134 sshd[273525]: Failed password for root from 61.177.173.46 port 57746 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 01:21:20,140] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:21:20,143] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:21:20,151] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:21:20,164] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-07 01:21:20,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368880.7145958, 'message': 'Dec 7 01:21:18 hqnl0246134 sshd[273522]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-07 01:21:20,748] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368880.7148893, 'message': 'Dec 7 01:21:19 hqnl0246134 sshd[273525]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 01:21:20,767] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368880.7150953, 'message': 'Dec 7 01:21:20 hqnl0246134 sshd[273522]: Failed password for root from 61.177.173.52 port 46690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 01:21:22,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670368882.7170775, 'message': 'Dec 7 01:21:21 hqnl0246134 sshd[273525]: Failed password for root from 61.177.173.46 port 57746 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-07 01:21:22,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368882.717309, 'message': 'Dec 7 01:21:22 hqnl0246134 sshd[273549]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 01:21:22,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368882.7174308, 'message': 'Dec 7 01:21:22 hqnl0246134 sshd[273549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-07 01:21:24,181] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:21:24,182] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:21:24,189] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:21:24,201] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 01:21:24,740] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368884.7183926, 'message': 'Dec 7 01:21:24 hqnl0246134 sshd[273552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-07 01:21:26,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368886.7204702, 'message': 'Dec 7 01:21:24 hqnl0246134 sshd[273549]: Failed password for root from 61.177.173.52 port 25824 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 01:21:26,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368886.7207427, 'message': 'Dec 7 01:21:25 hqnl0246134 sshd[273552]: Failed password for root from 61.177.173.18 port 44086 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 01:21:28,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368888.7227142, 'message': 'Dec 7 01:21:26 hqnl0246134 sshd[273549]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 01:21:28,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368888.7230124, 'message': 'Dec 7 01:21:28 hqnl0246134 sshd[273552]: Failed password for root from 61.177.173.18 port 44086 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-07 01:21:30,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368890.7268043, 'message': 'Dec 7 01:21:29 hqnl0246134 sshd[273549]: Failed password for root from 61.177.173.52 port 25824 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-07 01:21:32,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368892.7291214, 'message': 'Dec 7 01:21:31 hqnl0246134 sshd[273549]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-07 01:21:32,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368892.736931, 'message': 'Dec 7 01:21:32 hqnl0246134 sshd[273552]: Failed password for root from 61.177.173.18 port 44086 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 01:21:34,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670368894.7322552, 'message': 'Dec 7 01:21:33 hqnl0246134 sshd[273549]: Failed password for root from 61.177.173.52 port 25824 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 01:21:37,307] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 01:21:37,308] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 01:21:37,309] im360.plugins.client360: Waiting 7 minutes before retry...
WARNING [2022-12-07 01:21:50,219] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:21:50,221] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:21:52,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368912.778, 'message': 'Dec 7 01:21:51 hqnl0246134 sshd[273577]: Invalid user bdos from 46.101.123.135 port 51364', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-07 01:21:52,826] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368912.7786334, 'message': 'Dec 7 01:21:51 hqnl0246134 sshd[273577]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.123.135 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 01:21:52,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368912.778842, 'message': 'Dec 7 01:21:51 hqnl0246134 sshd[273577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.123.135 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 01:21:52,866] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368912.7789924, 'message': 'Dec 7 01:21:52 hqnl0246134 sshd[273577]: Failed password for invalid user bdos from 46.101.123.135 port 51364 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-07 01:21:54,102] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-07 01:21:54,808] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368914.777781, 'message': 'Dec 7 01:21:53 hqnl0246134 sshd[273577]: Disconnected from invalid user bdos 46.101.123.135 port 51364 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-07 01:22:10,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368930.806681, 'message': 'Dec 7 01:22:09 hqnl0246134 sshd[273594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0216 seconds
WARNING [2022-12-07 01:22:11,583] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:22:11,612] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0372 seconds
INFO [2022-12-07 01:22:12,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368932.8129177, 'message': 'Dec 7 01:22:11 hqnl0246134 sshd[273594]: Failed password for root from 61.177.173.18 port 13300 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-07 01:22:18,492] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:22:18,493] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:22:18,510] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:22:18,533] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0371 seconds
INFO [2022-12-07 01:22:18,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368938.8191912, 'message': 'Dec 7 01:22:18 hqnl0246134 sshd[273614]: Invalid user dell from 165.227.166.207 port 46396', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 01:22:18,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368938.820003, 'message': 'Dec 7 01:22:18 hqnl0246134 sshd[273614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 01:22:20,822] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:22:20,822] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:22:20,836] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:22:20,856] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0331 seconds
INFO [2022-12-07 01:22:20,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368940.8241673, 'message': 'Dec 7 01:22:20 hqnl0246134 sshd[273614]: Failed password for invalid user dell from 165.227.166.207 port 46396 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-07 01:22:21,864] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:22:21,865] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:22:21,874] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:22:21,887] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-07 01:22:22,854] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670368942.8223407, 'message': 'Dec 7 01:22:21 hqnl0246134 sshd[273614]: Disconnected from invalid user dell 165.227.166.207 port 46396 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-07 01:22:36,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368956.8380961, 'message': 'Dec 7 01:22:34 hqnl0246134 sshd[273626]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-07 01:22:36,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368956.838562, 'message': 'Dec 7 01:22:34 hqnl0246134 sshd[273626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:22:36,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368956.8387442, 'message': 'Dec 7 01:22:36 hqnl0246134 sshd[273626]: Failed password for root from 61.177.173.39 port 18061 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-07 01:22:38,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368958.8381553, 'message': 'Dec 7 01:22:37 hqnl0246134 sshd[273626]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:22:40,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368960.8393743, 'message': 'Dec 7 01:22:39 hqnl0246134 sshd[273626]: Failed password for root from 61.177.173.39 port 18061 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 01:22:42,871] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368962.8455467, 'message': 'Dec 7 01:22:41 hqnl0246134 sshd[273626]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-07 01:22:44,870] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368964.842046, 'message': 'Dec 7 01:22:43 hqnl0246134 sshd[273626]: Failed password for root from 61.177.173.39 port 18061 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 01:22:48,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368968.846466, 'message': 'Dec 7 01:22:47 hqnl0246134 sshd[273637]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-07 01:22:48,912] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368968.8468611, 'message': 'Dec 7 01:22:47 hqnl0246134 sshd[273637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0311 seconds
WARNING [2022-12-07 01:22:50,224] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:22:50,225] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:22:50,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368970.8485904, 'message': 'Dec 7 01:22:49 hqnl0246134 sshd[273637]: Failed password for root from 61.177.173.39 port 20157 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-07 01:22:50,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368970.8488302, 'message': 'Dec 7 01:22:50 hqnl0246134 sshd[273639]: pam_imunify(sshd:auth): [IM360_RBL] The IP 46.101.123.135 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-07 01:22:50,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368970.8489747, 'message': 'Dec 7 01:22:50 hqnl0246134 sshd[273639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.123.135 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 01:22:52,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368972.852674, 'message': 'Dec 7 01:22:51 hqnl0246134 sshd[273637]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-07 01:22:52,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '46.101.123.135', 'timestamp': 1670368972.8530788, 'message': 'Dec 7 01:22:52 hqnl0246134 sshd[273639]: Failed password for root from 46.101.123.135 port 39602 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-07 01:22:54,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368974.8539937, 'message': 'Dec 7 01:22:53 hqnl0246134 sshd[273641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-07 01:22:54,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368974.8542674, 'message': 'Dec 7 01:22:53 hqnl0246134 sshd[273637]: Failed password for root from 61.177.173.39 port 20157 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-07 01:22:56,890] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368976.8560307, 'message': 'Dec 7 01:22:55 hqnl0246134 sshd[273641]: Failed password for root from 61.177.173.18 port 25573 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-07 01:22:56,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368976.8562896, 'message': 'Dec 7 01:22:56 hqnl0246134 sshd[273637]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-07 01:22:58,880] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368978.8577518, 'message': 'Dec 7 01:22:58 hqnl0246134 sshd[273637]: Failed password for root from 61.177.173.39 port 20157 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-07 01:23:00,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368980.8611293, 'message': 'Dec 7 01:22:59 hqnl0246134 sshd[273641]: Failed password for root from 61.177.173.18 port 25573 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 01:23:02,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368982.863584, 'message': 'Dec 7 01:23:01 hqnl0246134 sshd[273644]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0379 seconds
INFO [2022-12-07 01:23:02,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670368982.8639212, 'message': 'Dec 7 01:23:02 hqnl0246134 sshd[273641]: Failed password for root from 61.177.173.18 port 25573 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-07 01:23:02,922] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368982.8638022, 'message': 'Dec 7 01:23:01 hqnl0246134 sshd[273644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 01:23:04,891] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368984.865525, 'message': 'Dec 7 01:23:04 hqnl0246134 sshd[273644]: Failed password for root from 61.177.173.39 port 32757 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0253 seconds
INFO [2022-12-07 01:23:06,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368986.8702893, 'message': 'Dec 7 01:23:06 hqnl0246134 sshd[273644]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 01:23:08,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368988.871643, 'message': 'Dec 7 01:23:07 hqnl0246134 sshd[273644]: Failed password for root from 61.177.173.39 port 32757 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 01:23:08,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368988.871849, 'message': 'Dec 7 01:23:08 hqnl0246134 sshd[273644]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 01:23:10,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670368990.8741293, 'message': 'Dec 7 01:23:10 hqnl0246134 sshd[273644]: Failed password for root from 61.177.173.39 port 32757 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
WARNING [2022-12-07 01:23:11,588] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:23:11,625] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0464 seconds
INFO [2022-12-07 01:23:18,064] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:23:18,065] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:23:18,081] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:23:18,095] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0272 seconds
INFO [2022-12-07 01:23:20,982] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:23:20,982] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:23:20,989] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:23:21,000] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-07 01:23:40,941] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369020.908746, 'message': 'Dec 7 01:23:40 hqnl0246134 sshd[273705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 01:23:42,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369022.9084952, 'message': 'Dec 7 01:23:42 hqnl0246134 sshd[273705]: Failed password for root from 61.177.173.18 port 50086 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0230 seconds
WARNING [2022-12-07 01:23:50,228] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:23:50,229] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:23:54,367] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:23:54,368] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:23:54,381] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:23:54,399] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0304 seconds
WARNING [2022-12-07 01:24:11,604] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:24:11,635] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0484 seconds
INFO [2022-12-07 01:24:18,346] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:24:18,347] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:24:18,362] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:24:18,375] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0273 seconds
INFO [2022-12-07 01:24:18,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369058.9468837, 'message': 'Dec 7 01:24:18 hqnl0246134 sshd[273751]: Invalid user demo from 165.227.166.207 port 56732', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 01:24:18,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369058.947205, 'message': 'Dec 7 01:24:18 hqnl0246134 sshd[273751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 01:24:20,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369060.9500573, 'message': 'Dec 7 01:24:20 hqnl0246134 sshd[273751]: Failed password for invalid user demo from 165.227.166.207 port 56732 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-07 01:24:21,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369060.950343, 'message': 'Dec 7 01:24:20 hqnl0246134 sshd[273751]: Disconnected from invalid user demo 165.227.166.207 port 56732 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-07 01:24:21,589] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:24:21,589] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:24:21,596] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:24:21,609] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-07 01:24:28,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369068.9625828, 'message': 'Dec 7 01:24:27 hqnl0246134 sshd[273759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-07 01:24:30,984] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369070.9647145, 'message': 'Dec 7 01:24:29 hqnl0246134 sshd[273759]: Failed password for root from 61.177.173.18 port 12076 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-07 01:24:50,233] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:24:50,235] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:25:11,603] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:25:11,625] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0335 seconds
INFO [2022-12-07 01:25:15,046] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369115.0206866, 'message': 'Dec 7 01:25:13 hqnl0246134 sshd[273804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-07 01:25:17,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369117.0217092, 'message': 'Dec 7 01:25:16 hqnl0246134 sshd[273804]: Failed password for root from 61.177.173.18 port 30969 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 01:25:18,481] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:25:18,481] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:25:18,488] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:25:18,500] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 01:25:21,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369121.0244007, 'message': 'Dec 7 01:25:20 hqnl0246134 sshd[273804]: Failed password for root from 61.177.173.18 port 30969 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-07 01:25:21,456] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:25:21,457] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:25:21,465] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:25:21,478] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-07 01:25:25,063] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369125.0298839, 'message': 'Dec 7 01:25:24 hqnl0246134 sshd[273804]: Failed password for root from 61.177.173.18 port 30969 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-07 01:25:29,315] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:25:29,316] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:25:29,323] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:25:29,342] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0258 seconds
WARNING [2022-12-07 01:25:50,260] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:25:50,261] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:26:01,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369161.080158, 'message': 'Dec 7 01:26:00 hqnl0246134 sshd[273849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-07 01:26:03,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369163.0822077, 'message': 'Dec 7 01:26:02 hqnl0246134 sshd[273849]: Failed password for root from 61.177.173.18 port 55698 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
WARNING [2022-12-07 01:26:11,601] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:26:11,620] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0262 seconds
INFO [2022-12-07 01:26:17,782] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:26:17,783] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:26:17,791] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:26:17,803] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-07 01:26:20,444] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:26:20,445] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:26:20,452] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:26:20,463] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-07 01:26:21,125] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369181.1051354, 'message': 'Dec 7 01:26:20 hqnl0246134 sshd[273875]: Invalid user demo from 165.227.166.207 port 38774', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 01:26:21,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369181.1053557, 'message': 'Dec 7 01:26:20 hqnl0246134 sshd[273875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-07 01:26:23,128] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369183.10745, 'message': 'Dec 7 01:26:22 hqnl0246134 sshd[273875]: Failed password for invalid user demo from 165.227.166.207 port 38774 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-07 01:26:25,131] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369185.110111, 'message': 'Dec 7 01:26:24 hqnl0246134 sshd[273875]: Disconnected from invalid user demo 165.227.166.207 port 38774 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-07 01:26:35,147] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369195.1252303, 'message': 'Dec 7 01:26:34 hqnl0246134 sshd[273880]: Invalid user eagle from 24.62.135.19 port 58896', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-07 01:26:35,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369195.129816, 'message': 'Dec 7 01:26:34 hqnl0246134 sshd[273880]: pam_imunify(sshd:auth): [IM360_RBL] The IP 24.62.135.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 01:26:35,185] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369195.1300473, 'message': 'Dec 7 01:26:34 hqnl0246134 sshd[273880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.62.135.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:26:37,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369197.12722, 'message': 'Dec 7 01:26:35 hqnl0246134 sshd[273880]: Failed password for invalid user eagle from 24.62.135.19 port 58896 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 01:26:37,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369197.1287477, 'message': 'Dec 7 01:26:35 hqnl0246134 sshd[273880]: Disconnected from invalid user eagle 24.62.135.19 port 58896 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 01:26:38,431] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:26:38,432] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:26:38,445] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:26:38,463] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0304 seconds
INFO [2022-12-07 01:26:45,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369205.1425674, 'message': 'Dec 7 01:26:43 hqnl0246134 sshd[273887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-07 01:26:47,161] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369207.1418655, 'message': 'Dec 7 01:26:45 hqnl0246134 sshd[273887]: Failed password for root from 61.177.173.18 port 58377 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
WARNING [2022-12-07 01:26:50,264] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:26:50,265] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:27:11,613] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:27:11,654] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0552 seconds
INFO [2022-12-07 01:27:17,801] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:27:17,802] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:27:17,811] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:27:17,823] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0201 seconds
INFO [2022-12-07 01:27:20,385] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:27:20,385] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:27:20,393] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:27:20,523] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1371 seconds
INFO [2022-12-07 01:27:31,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369251.2147737, 'message': 'Dec 7 01:27:29 hqnl0246134 sshd[273940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-07 01:27:33,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369253.2165647, 'message': 'Dec 7 01:27:31 hqnl0246134 sshd[273940]: Failed password for root from 61.177.173.18 port 28615 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-07 01:27:50,269] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:27:50,270] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:28:11,618] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:28:11,642] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0357 seconds
INFO [2022-12-07 01:28:15,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369295.2728634, 'message': 'Dec 7 01:28:15 hqnl0246134 sshd[273971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-07 01:28:17,310] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369297.2738812, 'message': 'Dec 7 01:28:15 hqnl0246134 sshd[273982]: Invalid user oracle from 165.227.166.207 port 49084', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-07 01:28:17,311] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369297.274296, 'message': 'Dec 7 01:28:16 hqnl0246134 sshd[273971]: Failed password for root from 61.177.173.18 port 54382 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-07 01:28:17,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369297.2740726, 'message': 'Dec 7 01:28:15 hqnl0246134 sshd[273982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-07 01:28:18,074] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:28:18,075] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:28:18,083] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:28:18,101] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0256 seconds
INFO [2022-12-07 01:28:19,330] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369299.2762089, 'message': 'Dec 7 01:28:17 hqnl0246134 sshd[273982]: Failed password for invalid user oracle from 165.227.166.207 port 49084 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0539 seconds
INFO [2022-12-07 01:28:19,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369299.2764459, 'message': 'Dec 7 01:28:18 hqnl0246134 sshd[273971]: Failed password for root from 61.177.173.18 port 54382 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0545 seconds
INFO [2022-12-07 01:28:19,371] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369299.276577, 'message': 'Dec 7 01:28:19 hqnl0246134 sshd[273982]: Disconnected from invalid user oracle 165.227.166.207 port 49084 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0402 seconds
INFO [2022-12-07 01:28:21,401] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:28:21,402] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:28:21,431] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:28:21,468] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0551 seconds
INFO [2022-12-07 01:28:23,263] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:28:23,264] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:28:23,279] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:28:23,331] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0661 seconds
INFO [2022-12-07 01:28:23,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369303.2802925, 'message': 'Dec 7 01:28:21 hqnl0246134 sshd[273971]: Failed password for root from 61.177.173.18 port 54382 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0660 seconds
WARNING [2022-12-07 01:28:50,273] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:28:50,274] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:29:00,730] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 01:29:00,805] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 01:29:00,807] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 01:29:00,807] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 01:29:00,807] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 01:29:00,808] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 01:29:00,832] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 01:29:00,865] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0545 seconds
WARNING [2022-12-07 01:29:00,877] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 01:29:00,880] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:29:00,896] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0420 seconds
INFO [2022-12-07 01:29:00,897] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0373 seconds
INFO [2022-12-07 01:29:01,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369341.330062, 'message': 'Dec 7 01:29:00 hqnl0246134 sshd[274020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-07 01:29:03,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369343.3323383, 'message': 'Dec 7 01:29:02 hqnl0246134 sshd[274020]: Failed password for root from 61.177.173.18 port 14998 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
WARNING [2022-12-07 01:29:11,618] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:29:11,658] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0477 seconds
INFO [2022-12-07 01:29:17,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.22.246.215', 'timestamp': 1670369357.3470528, 'message': 'Dec 7 01:29:16 hqnl0246134 sshd[274042]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.22.246.215 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 01:29:17,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.22.246.215', 'timestamp': 1670369357.3474042, 'message': 'Dec 7 01:29:16 hqnl0246134 sshd[274042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.246.215 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 01:29:17,960] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:29:17,961] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:29:17,972] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:29:17,990] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0280 seconds
INFO [2022-12-07 01:29:19,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369359.3491118, 'message': 'Dec 7 01:29:18 hqnl0246134 sshd[274047]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-07 01:29:19,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.22.246.215', 'timestamp': 1670369359.349723, 'message': 'Dec 7 01:29:19 hqnl0246134 sshd[274042]: Failed password for root from 165.22.246.215 port 39612 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-07 01:29:19,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369359.349498, 'message': 'Dec 7 01:29:18 hqnl0246134 sshd[274047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 01:29:20,607] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:29:20,607] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:29:20,614] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:29:20,633] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0251 seconds
INFO [2022-12-07 01:29:21,370] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369361.3531444, 'message': 'Dec 7 01:29:20 hqnl0246134 sshd[274047]: Failed password for root from 61.177.173.46 port 20982 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 01:29:21,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369361.3533423, 'message': 'Dec 7 01:29:20 hqnl0246134 sshd[274047]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 01:29:23,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369363.355843, 'message': 'Dec 7 01:29:23 hqnl0246134 sshd[274047]: Failed password for root from 61.177.173.46 port 20982 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 01:29:25,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369365.35788, 'message': 'Dec 7 01:29:24 hqnl0246134 sshd[274047]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 01:29:27,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369367.36013, 'message': 'Dec 7 01:29:27 hqnl0246134 sshd[274047]: Failed password for root from 61.177.173.46 port 20982 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 01:29:30,932] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 01:29:30,933] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 01:29:30,934] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-07 01:29:31,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369371.3652267, 'message': 'Dec 7 01:29:30 hqnl0246134 sshd[274062]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 01:29:31,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369371.3655083, 'message': 'Dec 7 01:29:30 hqnl0246134 sshd[274062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 01:29:32,064] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:29:32,065] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:29:32,072] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:29:32,083] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
INFO [2022-12-07 01:29:33,392] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369373.3660297, 'message': 'Dec 7 01:29:32 hqnl0246134 sshd[274062]: Failed password for root from 61.177.173.46 port 19826 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-07 01:29:33,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369373.3662946, 'message': 'Dec 7 01:29:33 hqnl0246134 sshd[274062]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-07 01:29:33,660] defence360agent.files: Updating all files
INFO [2022-12-07 01:29:34,011] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-07 01:29:34,011] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-07 01:29:34,355] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-07 01:29:34,356] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-07 01:29:34,681] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-07 01:29:34,681] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-07 01:29:35,046] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-07 01:29:35,047] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-07 01:29:35,047] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-07 01:29:35,365] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 23:29:35 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E5818CC7868F3'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-07 01:29:35,367] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-07 01:29:35,367] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-07 01:29:35,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369375.656558, 'message': 'Dec 7 01:29:34 hqnl0246134 sshd[274062]: Failed password for root from 61.177.173.46 port 19826 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-07 01:29:35,921] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-07 01:29:35,922] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-07 01:29:36,236] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-07 01:29:36,236] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-07 01:29:36,505] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-07 01:29:36,505] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-07 01:29:37,078] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-07 01:29:37,079] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-07 01:29:37,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369377.3729494, 'message': 'Dec 7 01:29:35 hqnl0246134 sshd[274062]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-07 01:29:37,623] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-07 01:29:37,624] defence360agent.files: geo files update finished (not updated)
INFO [2022-12-07 01:29:39,395] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670369379.3752286, 'message': 'Dec 7 01:29:37 hqnl0246134 sshd[274062]: Failed password for root from 61.177.173.46 port 19826 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 01:29:45,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369385.3813124, 'message': 'Dec 7 01:29:44 hqnl0246134 sshd[274069]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0386 seconds
INFO [2022-12-07 01:29:45,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369385.3818128, 'message': 'Dec 7 01:29:44 hqnl0246134 sshd[274069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 01:29:47,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369387.3827708, 'message': 'Dec 7 01:29:45 hqnl0246134 sshd[274077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0506 seconds
INFO [2022-12-07 01:29:47,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369387.3833058, 'message': 'Dec 7 01:29:47 hqnl0246134 sshd[274069]: Failed password for root from 61.177.172.19 port 31010 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0510 seconds
INFO [2022-12-07 01:29:47,456] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369387.383125, 'message': 'Dec 7 01:29:47 hqnl0246134 sshd[274077]: Failed password for root from 61.177.173.18 port 31033 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 01:29:49,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369389.3846948, 'message': 'Dec 7 01:29:48 hqnl0246134 sshd[274069]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0267 seconds
WARNING [2022-12-07 01:29:50,278] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:29:50,278] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:29:51,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369391.3863328, 'message': 'Dec 7 01:29:49 hqnl0246134 sshd[274077]: Failed password for root from 61.177.173.18 port 31033 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-07 01:29:51,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369391.3865476, 'message': 'Dec 7 01:29:50 hqnl0246134 sshd[274069]: Failed password for root from 61.177.172.19 port 31010 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-07 01:29:51,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369391.386671, 'message': 'Dec 7 01:29:51 hqnl0246134 sshd[274069]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:29:53,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369393.3883147, 'message': 'Dec 7 01:29:53 hqnl0246134 sshd[274069]: Failed password for root from 61.177.172.19 port 31010 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-07 01:29:55,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369395.3923547, 'message': 'Dec 7 01:29:53 hqnl0246134 sshd[274077]: Failed password for root from 61.177.173.18 port 31033 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 01:29:57,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369397.3951337, 'message': 'Dec 7 01:29:56 hqnl0246134 sshd[274085]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 01:29:57,433] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369397.3953047, 'message': 'Dec 7 01:29:56 hqnl0246134 sshd[274085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 01:29:59,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369399.3984563, 'message': 'Dec 7 01:29:59 hqnl0246134 sshd[274085]: Failed password for root from 61.177.172.19 port 23624 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-07 01:30:01,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369401.4007995, 'message': 'Dec 7 01:30:01 hqnl0246134 sshd[274085]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-07 01:30:05,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369405.4049184, 'message': 'Dec 7 01:30:03 hqnl0246134 sshd[274085]: Failed password for root from 61.177.172.19 port 23624 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-07 01:30:07,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369407.4055061, 'message': 'Dec 7 01:30:05 hqnl0246134 sshd[274085]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-07 01:30:09,446] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369409.414796, 'message': 'Dec 7 01:30:07 hqnl0246134 sshd[274111]: Invalid user deploy from 165.227.166.207 port 59370', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 01:30:09,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369409.4158468, 'message': 'Dec 7 01:30:08 hqnl0246134 sshd[274085]: Failed password for root from 61.177.172.19 port 23624 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-07 01:30:09,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369409.415724, 'message': 'Dec 7 01:30:07 hqnl0246134 sshd[274111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 01:30:11,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369411.4101105, 'message': 'Dec 7 01:30:10 hqnl0246134 sshd[274111]: Failed password for invalid user deploy from 165.227.166.207 port 59370 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
WARNING [2022-12-07 01:30:11,622] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:30:11,649] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0351 seconds
INFO [2022-12-07 01:30:13,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369413.414785, 'message': 'Dec 7 01:30:11 hqnl0246134 sshd[274117]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0441 seconds
INFO [2022-12-07 01:30:13,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369413.4151134, 'message': 'Dec 7 01:30:11 hqnl0246134 sshd[274119]: Invalid user stunnel from 41.185.26.240 port 37630', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0449 seconds
INFO [2022-12-07 01:30:13,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369413.4149985, 'message': 'Dec 7 01:30:11 hqnl0246134 sshd[274117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-07 01:30:13,499] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369413.415468, 'message': 'Dec 7 01:30:12 hqnl0246134 sshd[274111]: Disconnected from invalid user deploy 165.227.166.207 port 59370 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-07 01:30:13,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369413.4152339, 'message': 'Dec 7 01:30:11 hqnl0246134 sshd[274119]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.185.26.240 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0381 seconds
INFO [2022-12-07 01:30:13,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369413.4153657, 'message': 'Dec 7 01:30:11 hqnl0246134 sshd[274119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.185.26.240 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-07 01:30:15,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369415.4168198, 'message': 'Dec 7 01:30:13 hqnl0246134 sshd[274117]: Failed password for root from 61.177.172.19 port 23666 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0707 seconds
INFO [2022-12-07 01:30:15,490] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369415.4173005, 'message': 'Dec 7 01:30:14 hqnl0246134 sshd[274119]: Failed password for invalid user stunnel from 41.185.26.240 port 37630 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0714 seconds
INFO [2022-12-07 01:30:17,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369417.4178152, 'message': 'Dec 7 01:30:15 hqnl0246134 sshd[274117]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-07 01:30:17,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369417.4179819, 'message': 'Dec 7 01:30:16 hqnl0246134 sshd[274119]: Disconnected from invalid user stunnel 41.185.26.240 port 37630 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-07 01:30:17,886] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:30:17,887] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:30:17,894] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:30:17,913] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0246 seconds
INFO [2022-12-07 01:30:19,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369419.4216123, 'message': 'Dec 7 01:30:17 hqnl0246134 sshd[274117]: Failed password for root from 61.177.172.19 port 23666 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 01:30:19,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369419.4218225, 'message': 'Dec 7 01:30:18 hqnl0246134 sshd[274117]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 01:30:20,639] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:30:20,640] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:30:20,647] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:30:20,658] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-07 01:30:21,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369421.425132, 'message': 'Dec 7 01:30:20 hqnl0246134 sshd[274117]: Failed password for root from 61.177.172.19 port 23666 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:30:25,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369425.4285598, 'message': 'Dec 7 01:30:23 hqnl0246134 sshd[274146]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 01:30:25,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369425.428892, 'message': 'Dec 7 01:30:23 hqnl0246134 sshd[274146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 01:30:27,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369427.4300354, 'message': 'Dec 7 01:30:26 hqnl0246134 sshd[274146]: Failed password for root from 61.177.172.19 port 60283 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 01:30:29,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369429.4332304, 'message': 'Dec 7 01:30:28 hqnl0246134 sshd[274146]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 01:30:31,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369431.434162, 'message': 'Dec 7 01:30:30 hqnl0246134 sshd[274146]: Failed password for root from 61.177.172.19 port 60283 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0535 seconds
INFO [2022-12-07 01:30:31,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369431.4344943, 'message': 'Dec 7 01:30:31 hqnl0246134 sshd[274150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0531 seconds
INFO [2022-12-07 01:30:33,487] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369433.437841, 'message': 'Dec 7 01:30:32 hqnl0246134 sshd[274146]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0487 seconds
INFO [2022-12-07 01:30:33,488] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369433.4381797, 'message': 'Dec 7 01:30:33 hqnl0246134 sshd[274150]: Failed password for root from 61.177.173.18 port 51520 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0490 seconds
INFO [2022-12-07 01:30:35,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670369435.4373975, 'message': 'Dec 7 01:30:34 hqnl0246134 sshd[274146]: Failed password for root from 61.177.172.19 port 60283 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 01:30:37,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369437.440911, 'message': 'Dec 7 01:30:35 hqnl0246134 sshd[274150]: Failed password for root from 61.177.173.18 port 51520 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:30:39,589] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:30:39,590] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:30:39,598] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:30:39,609] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-07 01:30:41,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369441.4459105, 'message': 'Dec 7 01:30:40 hqnl0246134 sshd[274150]: Failed password for root from 61.177.173.18 port 51520 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-07 01:30:50,281] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:30:50,283] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:31:11,628] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:31:11,660] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0417 seconds
INFO [2022-12-07 01:31:19,520] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369479.4982815, 'message': 'Dec 7 01:31:18 hqnl0246134 sshd[274193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-07 01:31:19,952] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:31:19,953] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:31:19,964] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:31:19,985] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0309 seconds
INFO [2022-12-07 01:31:21,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369481.5013604, 'message': 'Dec 7 01:31:20 hqnl0246134 sshd[274193]: Failed password for root from 61.177.173.18 port 18264 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-07 01:31:22,795] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:31:22,796] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:31:22,803] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:31:22,815] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-07 01:31:23,529] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369483.5060441, 'message': 'Dec 7 01:31:23 hqnl0246134 sshd[274193]: Failed password for root from 61.177.173.18 port 18264 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-07 01:31:27,539] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369487.512802, 'message': 'Dec 7 01:31:26 hqnl0246134 sshd[274193]: Failed password for root from 61.177.173.18 port 18264 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0261 seconds
WARNING [2022-12-07 01:31:50,288] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:31:50,289] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:31:54,113] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-07 01:31:57,612] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369517.5869765, 'message': 'Dec 7 01:31:57 hqnl0246134 sshd[274246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-07 01:31:57,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369517.587492, 'message': 'Dec 7 01:31:57 hqnl0246134 sshd[274246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 01:31:59,608] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369519.588693, 'message': 'Dec 7 01:31:59 hqnl0246134 sshd[274246]: Failed password for root from 61.177.173.48 port 12981 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 01:31:59,639] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369519.5889657, 'message': 'Dec 7 01:31:59 hqnl0246134 sshd[274246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-07 01:32:01,627] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369521.5966551, 'message': 'Dec 7 01:32:01 hqnl0246134 sshd[274250]: Invalid user design from 165.227.166.207 port 41424', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 01:32:01,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369521.5969462, 'message': 'Dec 7 01:32:01 hqnl0246134 sshd[274250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-07 01:32:03,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369523.604377, 'message': 'Dec 7 01:32:01 hqnl0246134 sshd[274246]: Failed password for root from 61.177.173.48 port 12981 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0522 seconds
INFO [2022-12-07 01:32:03,660] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369523.6049101, 'message': 'Dec 7 01:32:02 hqnl0246134 sshd[274250]: Failed password for invalid user design from 165.227.166.207 port 41424 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0537 seconds
INFO [2022-12-07 01:32:03,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369523.605046, 'message': 'Dec 7 01:32:03 hqnl0246134 sshd[274252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0537 seconds
INFO [2022-12-07 01:32:03,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369523.6047602, 'message': 'Dec 7 01:32:01 hqnl0246134 sshd[274246]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-07 01:32:03,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369523.6051483, 'message': 'Dec 7 01:32:03 hqnl0246134 sshd[274246]: Failed password for root from 61.177.173.48 port 12981 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-07 01:32:05,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369525.606241, 'message': 'Dec 7 01:32:03 hqnl0246134 sshd[274250]: Disconnected from invalid user design 165.227.166.207 port 41424 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0545 seconds
INFO [2022-12-07 01:32:05,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369525.606418, 'message': 'Dec 7 01:32:05 hqnl0246134 sshd[274252]: Failed password for root from 61.177.173.18 port 38131 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0546 seconds
INFO [2022-12-07 01:32:05,662] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369525.60653, 'message': 'Dec 7 01:32:05 hqnl0246134 sshd[274271]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0544 seconds
INFO [2022-12-07 01:32:05,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369525.6066613, 'message': 'Dec 7 01:32:05 hqnl0246134 sshd[274271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 01:32:07,629] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369527.6083012, 'message': 'Dec 7 01:32:07 hqnl0246134 sshd[274271]: Failed password for root from 61.177.173.48 port 27962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 01:32:08,361] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:32:08,362] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:32:08,372] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:32:08,384] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-07 01:32:09,639] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369529.6111515, 'message': 'Dec 7 01:32:07 hqnl0246134 sshd[274271]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-07 01:32:09,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369529.6116972, 'message': 'Dec 7 01:32:09 hqnl0246134 sshd[274252]: Failed password for root from 61.177.173.18 port 38131 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
WARNING [2022-12-07 01:32:11,632] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:32:11,655] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369531.613002, 'message': 'Dec 7 01:32:09 hqnl0246134 sshd[274271]: Failed password for root from 61.177.173.48 port 27962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0419 seconds
INFO [2022-12-07 01:32:11,661] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0406 seconds
INFO [2022-12-07 01:32:13,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369533.6135666, 'message': 'Dec 7 01:32:11 hqnl0246134 sshd[274271]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0261 seconds
INFO [2022-12-07 01:32:15,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369535.6167357, 'message': 'Dec 7 01:32:13 hqnl0246134 sshd[274252]: Failed password for root from 61.177.173.18 port 38131 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0526 seconds
INFO [2022-12-07 01:32:15,672] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369535.61725, 'message': 'Dec 7 01:32:14 hqnl0246134 sshd[274271]: Failed password for root from 61.177.173.48 port 27962 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0529 seconds
INFO [2022-12-07 01:32:17,914] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:32:17,915] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:32:17,922] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:32:17,934] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-07 01:32:19,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369539.6222231, 'message': 'Dec 7 01:32:17 hqnl0246134 sshd[274289]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-07 01:32:19,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369539.622681, 'message': 'Dec 7 01:32:18 hqnl0246134 sshd[274277]: Invalid user weblogic from 24.62.135.19 port 59336', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0426 seconds
INFO [2022-12-07 01:32:19,697] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369539.6225185, 'message': 'Dec 7 01:32:17 hqnl0246134 sshd[274289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-07 01:32:19,698] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369539.6228516, 'message': 'Dec 7 01:32:18 hqnl0246134 sshd[274277]: pam_imunify(sshd:auth): [IM360_RBL] The IP 24.62.135.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 01:32:19,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369539.6230068, 'message': 'Dec 7 01:32:18 hqnl0246134 sshd[274277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.62.135.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 01:32:21,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369541.6220095, 'message': 'Dec 7 01:32:19 hqnl0246134 sshd[274277]: Failed password for invalid user weblogic from 24.62.135.19 port 59336 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-07 01:32:21,653] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369541.6222484, 'message': 'Dec 7 01:32:19 hqnl0246134 sshd[274289]: Failed password for root from 61.177.173.48 port 23458 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-07 01:32:21,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369541.6223588, 'message': 'Dec 7 01:32:20 hqnl0246134 sshd[274277]: Disconnected from invalid user weblogic 24.62.135.19 port 59336 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:32:22,468] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:32:22,468] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:32:22,475] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:32:22,486] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-07 01:32:23,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369543.6269355, 'message': 'Dec 7 01:32:22 hqnl0246134 sshd[274289]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 01:32:25,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369545.6293445, 'message': 'Dec 7 01:32:24 hqnl0246134 sshd[274289]: Failed password for root from 61.177.173.48 port 23458 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 01:32:27,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369547.6391618, 'message': 'Dec 7 01:32:26 hqnl0246134 sshd[274289]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 01:32:29,668] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670369549.6481228, 'message': 'Dec 7 01:32:28 hqnl0246134 sshd[274289]: Failed password for root from 61.177.173.48 port 23458 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 01:32:33,675] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.255.8.153', 'timestamp': 1670369553.6554308, 'message': 'Dec 7 01:32:31 hqnl0246134 sshd[274300]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.255.8.153 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:32:33,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.255.8.153', 'timestamp': 1670369553.6557496, 'message': 'Dec 7 01:32:31 hqnl0246134 sshd[274300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.8.153 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 01:32:35,675] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.255.8.153', 'timestamp': 1670369555.6576624, 'message': 'Dec 7 01:32:34 hqnl0246134 sshd[274300]: Failed password for root from 36.255.8.153 port 57664 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:32:47,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369567.6879413, 'message': 'Dec 7 01:32:46 hqnl0246134 sshd[274312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-07 01:32:49,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369569.69432, 'message': 'Dec 7 01:32:48 hqnl0246134 sshd[274312]: Failed password for root from 61.177.173.18 port 50752 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-07 01:32:50,293] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:32:50,294] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:33:05,751] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.22.246.215', 'timestamp': 1670369585.7291129, 'message': 'Dec 7 01:33:04 hqnl0246134 sshd[274328]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.22.246.215 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 01:33:05,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.22.246.215', 'timestamp': 1670369585.729407, 'message': 'Dec 7 01:33:04 hqnl0246134 sshd[274328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.246.215 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0230 seconds
INFO [2022-12-07 01:33:07,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.22.246.215', 'timestamp': 1670369587.73056, 'message': 'Dec 7 01:33:06 hqnl0246134 sshd[274328]: Failed password for root from 165.22.246.215 port 41762 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 01:33:08,951] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:33:08,951] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:33:08,958] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:33:08,979] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0268 seconds
WARNING [2022-12-07 01:33:11,639] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:33:11,686] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0609 seconds
INFO [2022-12-07 01:33:17,799] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:33:17,800] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:33:17,817] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:33:17,838] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0370 seconds
INFO [2022-12-07 01:33:17,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369597.8027904, 'message': 'Dec 7 01:33:17 hqnl0246134 sshd[274347]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.185.26.240 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-07 01:33:17,857] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369597.8030934, 'message': 'Dec 7 01:33:17 hqnl0246134 sshd[274347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.185.26.240 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:33:19,796] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369599.76276, 'message': 'Dec 7 01:33:19 hqnl0246134 sshd[274347]: Failed password for root from 41.185.26.240 port 51102 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-07 01:33:20,558] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:33:20,559] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:33:20,566] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:33:20,577] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-07 01:33:31,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369611.7869685, 'message': 'Dec 7 01:33:31 hqnl0246134 sshd[274359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-07 01:33:33,831] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369613.7965987, 'message': 'Dec 7 01:33:32 hqnl0246134 sshd[274359]: Failed password for root from 61.177.173.18 port 21818 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-07 01:33:49,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369629.8273504, 'message': 'Dec 7 01:33:48 hqnl0246134 sshd[274372]: Invalid user design from 165.227.166.207 port 51714', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-07 01:33:49,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369629.828712, 'message': 'Dec 7 01:33:48 hqnl0246134 sshd[274372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-07 01:33:50,303] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:33:50,304] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:33:51,844] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369631.8258243, 'message': 'Dec 7 01:33:50 hqnl0246134 sshd[274372]: Failed password for invalid user design from 165.227.166.207 port 51714 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 01:33:51,863] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369631.8260217, 'message': 'Dec 7 01:33:51 hqnl0246134 sshd[274372]: Disconnected from invalid user design 165.227.166.207 port 51714 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-07 01:34:11,636] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:34:11,665] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0372 seconds
INFO [2022-12-07 01:34:17,953] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:34:17,954] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:34:17,968] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:34:17,987] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0315 seconds
INFO [2022-12-07 01:34:17,987] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369657.9563777, 'message': 'Dec 7 01:34:16 hqnl0246134 sshd[274388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 01:34:19,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369659.8851917, 'message': 'Dec 7 01:34:18 hqnl0246134 sshd[274388]: Failed password for root from 61.177.173.18 port 42039 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 01:34:20,461] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:34:20,462] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:34:20,468] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:34:20,479] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-07 01:34:23,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369663.8967056, 'message': 'Dec 7 01:34:22 hqnl0246134 sshd[274388]: Failed password for root from 61.177.173.18 port 42039 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 01:34:25,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369665.8978965, 'message': 'Dec 7 01:34:24 hqnl0246134 sshd[274388]: Failed password for root from 61.177.173.18 port 42039 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:34:27,578] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:34:27,578] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:34:27,587] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:34:27,598] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
WARNING [2022-12-07 01:34:50,307] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:34:50,309] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:34:59,225] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 01:34:59,294] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 01:34:59,294] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 01:34:59,294] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 01:34:59,295] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 01:34:59,295] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 01:34:59,345] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 01:34:59,369] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0732 seconds
WARNING [2022-12-07 01:34:59,381] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 01:34:59,383] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:34:59,409] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0466 seconds
INFO [2022-12-07 01:34:59,411] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0447 seconds
INFO [2022-12-07 01:35:02,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369701.9770856, 'message': 'Dec 7 01:35:00 hqnl0246134 sshd[274428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0545 seconds
INFO [2022-12-07 01:35:03,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369703.9661417, 'message': 'Dec 7 01:35:03 hqnl0246134 sshd[274428]: Failed password for root from 61.177.173.18 port 55874 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-07 01:35:08,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.255.8.153', 'timestamp': 1670369707.9740765, 'message': 'Dec 7 01:35:06 hqnl0246134 sshd[274450]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.255.8.153 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0410 seconds
INFO [2022-12-07 01:35:08,026] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369707.9778454, 'message': 'Dec 7 01:35:06 hqnl0246134 sshd[274428]: Failed password for root from 61.177.173.18 port 55874 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0472 seconds
INFO [2022-12-07 01:35:08,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.255.8.153', 'timestamp': 1670369707.9776947, 'message': 'Dec 7 01:35:06 hqnl0246134 sshd[274450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.8.153 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-07 01:35:10,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369709.9795988, 'message': 'Dec 7 01:35:08 hqnl0246134 sshd[274428]: Failed password for root from 61.177.173.18 port 55874 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0447 seconds
INFO [2022-12-07 01:35:10,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '36.255.8.153', 'timestamp': 1670369709.9798677, 'message': 'Dec 7 01:35:08 hqnl0246134 sshd[274450]: Failed password for root from 36.255.8.153 port 56298 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0444 seconds
WARNING [2022-12-07 01:35:11,638] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:35:11,661] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0300 seconds
INFO [2022-12-07 01:35:18,012] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:35:18,012] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:35:18,027] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:35:18,040] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-07 01:35:20,704] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:35:20,705] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:35:20,711] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:35:20,722] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0166 seconds
INFO [2022-12-07 01:35:40,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369740.0255508, 'message': 'Dec 7 01:35:38 hqnl0246134 sshd[274483]: Invalid user dmkim from 165.227.166.207 port 33744', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:35:40,062] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369740.025821, 'message': 'Dec 7 01:35:38 hqnl0246134 sshd[274483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 01:35:41,733] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 01:35:41,734] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 01:35:41,735] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-07 01:35:42,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369742.0263412, 'message': 'Dec 7 01:35:40 hqnl0246134 sshd[274483]: Failed password for invalid user dmkim from 165.227.166.207 port 33744 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-07 01:35:42,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369742.0265598, 'message': 'Dec 7 01:35:41 hqnl0246134 sshd[274483]: Disconnected from invalid user dmkim 165.227.166.207 port 33744 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 01:35:43,841] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:35:43,842] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:35:43,855] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:35:43,876] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0320 seconds
INFO [2022-12-07 01:35:48,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369748.034327, 'message': 'Dec 7 01:35:48 hqnl0246134 sshd[274499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0262 seconds
WARNING [2022-12-07 01:35:50,312] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:35:50,313] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:35:52,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369752.0377843, 'message': 'Dec 7 01:35:50 hqnl0246134 sshd[274499]: Failed password for root from 61.177.173.18 port 28952 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 01:36:06,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.22.246.215', 'timestamp': 1670369766.0555499, 'message': 'Dec 7 01:36:06 hqnl0246134 sshd[274512]: Invalid user candy from 165.22.246.215 port 48354', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-07 01:36:06,099] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.22.246.215', 'timestamp': 1670369766.0559936, 'message': 'Dec 7 01:36:06 hqnl0246134 sshd[274512]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.22.246.215 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 01:36:06,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.22.246.215', 'timestamp': 1670369766.0561597, 'message': 'Dec 7 01:36:06 hqnl0246134 sshd[274512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.246.215 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:36:10,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.22.246.215', 'timestamp': 1670369770.058722, 'message': 'Dec 7 01:36:08 hqnl0246134 sshd[274512]: Failed password for invalid user candy from 165.22.246.215 port 48354 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-07 01:36:10,098] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.22.246.215', 'timestamp': 1670369770.0591402, 'message': 'Dec 7 01:36:09 hqnl0246134 sshd[274512]: Disconnected from invalid user candy 165.22.246.215 port 48354 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-07 01:36:11,643] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:36:11,666] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0315 seconds
INFO [2022-12-07 01:36:18,246] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:36:18,247] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:36:18,256] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:36:18,269] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-07 01:36:20,979] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:36:20,980] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:36:20,988] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:36:20,999] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 01:36:28,103] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369788.0804777, 'message': 'Dec 7 01:36:27 hqnl0246134 sshd[274533]: Invalid user ding from 41.185.26.240 port 36344', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-07 01:36:28,128] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369788.0807106, 'message': 'Dec 7 01:36:27 hqnl0246134 sshd[274533]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.185.26.240 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-07 01:36:28,158] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369788.0808907, 'message': 'Dec 7 01:36:27 hqnl0246134 sshd[274533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.185.26.240 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-07 01:36:30,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369790.0829, 'message': 'Dec 7 01:36:29 hqnl0246134 sshd[274533]: Failed password for invalid user ding from 41.185.26.240 port 36344 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 01:36:32,117] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.185.26.240', 'timestamp': 1670369792.085077, 'message': 'Dec 7 01:36:30 hqnl0246134 sshd[274533]: Disconnected from invalid user ding 41.185.26.240 port 36344 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-07 01:36:36,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369796.0891232, 'message': 'Dec 7 01:36:34 hqnl0246134 sshd[274537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 01:36:38,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369798.089654, 'message': 'Dec 7 01:36:37 hqnl0246134 sshd[274537]: Failed password for root from 61.177.173.18 port 43067 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-07 01:36:50,316] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:36:50,317] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:37:02,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369822.1192956, 'message': 'Dec 7 01:37:00 hqnl0246134 sshd[274550]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-07 01:37:02,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369822.1198738, 'message': 'Dec 7 01:37:00 hqnl0246134 sshd[274550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 01:37:04,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369824.1224973, 'message': 'Dec 7 01:37:02 hqnl0246134 sshd[274550]: Failed password for root from 61.177.172.104 port 55647 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-07 01:37:06,143] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369826.1250627, 'message': 'Dec 7 01:37:04 hqnl0246134 sshd[274550]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:37:08,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369828.1293545, 'message': 'Dec 7 01:37:07 hqnl0246134 sshd[274550]: Failed password for root from 61.177.172.104 port 55647 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-07 01:37:10,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '196.1.114.254', 'timestamp': 1670369830.1300626, 'message': 'Dec 7 01:37:08 hqnl0246134 sshd[274567]: Invalid user tiina from 196.1.114.254 port 48706', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-07 01:37:10,163] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369830.130545, 'message': 'Dec 7 01:37:08 hqnl0246134 sshd[274550]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-07 01:37:10,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '196.1.114.254', 'timestamp': 1670369830.1302397, 'message': 'Dec 7 01:37:08 hqnl0246134 sshd[274567]: pam_imunify(sshd:auth): [IM360_RBL] The IP 196.1.114.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 01:37:10,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '196.1.114.254', 'timestamp': 1670369830.130388, 'message': 'Dec 7 01:37:08 hqnl0246134 sshd[274567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.114.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
WARNING [2022-12-07 01:37:11,648] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:37:11,676] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0381 seconds
INFO [2022-12-07 01:37:12,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '196.1.114.254', 'timestamp': 1670369832.1326015, 'message': 'Dec 7 01:37:10 hqnl0246134 sshd[274567]: Failed password for invalid user tiina from 196.1.114.254 port 48706 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-07 01:37:12,167] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369832.1330068, 'message': 'Dec 7 01:37:10 hqnl0246134 sshd[274550]: Failed password for root from 61.177.172.104 port 55647 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-07 01:37:12,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '196.1.114.254', 'timestamp': 1670369832.1328874, 'message': 'Dec 7 01:37:10 hqnl0246134 sshd[274567]: Disconnected from invalid user tiina 196.1.114.254 port 48706 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 01:37:13,127] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:37:13,128] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:37:13,135] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:37:13,147] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 01:37:14,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369834.1341789, 'message': 'Dec 7 01:37:12 hqnl0246134 sshd[274573]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 01:37:14,169] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369834.1343708, 'message': 'Dec 7 01:37:12 hqnl0246134 sshd[274573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 01:37:16,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369836.1365488, 'message': 'Dec 7 01:37:15 hqnl0246134 sshd[274573]: Failed password for root from 61.177.172.104 port 41385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0352 seconds
INFO [2022-12-07 01:37:16,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369836.1369874, 'message': 'Dec 7 01:37:15 hqnl0246134 sshd[274569]: pam_imunify(sshd:auth): [IM360_RBL] The IP 24.62.135.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-07 01:37:16,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369836.1371827, 'message': 'Dec 7 01:37:15 hqnl0246134 sshd[274569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.62.135.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-07 01:37:17,834] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:37:17,835] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:37:17,842] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:37:17,853] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-07 01:37:18,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369838.1380208, 'message': 'Dec 7 01:37:17 hqnl0246134 sshd[274573]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-07 01:37:18,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '24.62.135.19', 'timestamp': 1670369838.1381984, 'message': 'Dec 7 01:37:17 hqnl0246134 sshd[274569]: Failed password for root from 24.62.135.19 port 54446 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 01:37:20,167] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369840.1407988, 'message': 'Dec 7 01:37:19 hqnl0246134 sshd[274573]: Failed password for root from 61.177.172.104 port 41385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-07 01:37:20,522] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:37:20,523] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:37:20,529] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:37:20,541] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-07 01:37:22,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369842.210593, 'message': 'Dec 7 01:37:21 hqnl0246134 sshd[274573]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-07 01:37:22,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369842.210846, 'message': 'Dec 7 01:37:21 hqnl0246134 sshd[274597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-07 01:37:24,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369844.1460006, 'message': 'Dec 7 01:37:23 hqnl0246134 sshd[274573]: Failed password for root from 61.177.172.104 port 41385 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0491 seconds
INFO [2022-12-07 01:37:24,197] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369844.146295, 'message': 'Dec 7 01:37:23 hqnl0246134 sshd[274597]: Failed password for root from 61.177.173.18 port 13177 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0494 seconds
INFO [2022-12-07 01:37:26,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369846.1479304, 'message': 'Dec 7 01:37:25 hqnl0246134 sshd[274599]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-07 01:37:26,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369846.1481688, 'message': 'Dec 7 01:37:25 hqnl0246134 sshd[274599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-07 01:37:28,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369848.151026, 'message': 'Dec 7 01:37:26 hqnl0246134 sshd[274597]: Failed password for root from 61.177.173.18 port 13177 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-07 01:37:28,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369848.151216, 'message': 'Dec 7 01:37:27 hqnl0246134 sshd[274599]: Failed password for root from 61.177.172.104 port 37003 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-07 01:37:30,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369850.1548085, 'message': 'Dec 7 01:37:28 hqnl0246134 sshd[274601]: Invalid user dspace from 165.227.166.207 port 44060', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0483 seconds
INFO [2022-12-07 01:37:30,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369850.155238, 'message': 'Dec 7 01:37:29 hqnl0246134 sshd[274599]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0487 seconds
INFO [2022-12-07 01:37:30,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369850.1550627, 'message': 'Dec 7 01:37:28 hqnl0246134 sshd[274601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 01:37:32,202] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369852.1570432, 'message': 'Dec 7 01:37:31 hqnl0246134 sshd[274597]: Failed password for root from 61.177.173.18 port 13177 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0447 seconds
INFO [2022-12-07 01:37:32,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369852.1572776, 'message': 'Dec 7 01:37:31 hqnl0246134 sshd[274601]: Failed password for invalid user dspace from 165.227.166.207 port 44060 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-07 01:37:32,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369852.1574702, 'message': 'Dec 7 01:37:32 hqnl0246134 sshd[274603]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0448 seconds
INFO [2022-12-07 01:37:32,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369852.157613, 'message': 'Dec 7 01:37:32 hqnl0246134 sshd[274603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-07 01:37:34,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369854.1587188, 'message': 'Dec 7 01:37:32 hqnl0246134 sshd[274599]: Failed password for root from 61.177.172.104 port 37003 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0696 seconds
INFO [2022-12-07 01:37:34,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369854.1589727, 'message': 'Dec 7 01:37:33 hqnl0246134 sshd[274601]: Disconnected from invalid user dspace 165.227.166.207 port 44060 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0699 seconds
INFO [2022-12-07 01:37:34,230] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369854.1590867, 'message': 'Dec 7 01:37:33 hqnl0246134 sshd[274603]: Failed password for root from 61.177.173.50 port 24734 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0698 seconds
INFO [2022-12-07 01:37:34,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369854.1592157, 'message': 'Dec 7 01:37:34 hqnl0246134 sshd[274603]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 01:37:36,190] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369856.160314, 'message': 'Dec 7 01:37:34 hqnl0246134 sshd[274599]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-07 01:37:36,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369856.160499, 'message': 'Dec 7 01:37:35 hqnl0246134 sshd[274603]: Failed password for root from 61.177.173.50 port 24734 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 01:37:36,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369856.1606114, 'message': 'Dec 7 01:37:36 hqnl0246134 sshd[274599]: Failed password for root from 61.177.172.104 port 37003 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-07 01:37:38,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369858.1652985, 'message': 'Dec 7 01:37:36 hqnl0246134 sshd[274603]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-07 01:37:40,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369860.166308, 'message': 'Dec 7 01:37:38 hqnl0246134 sshd[274610]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-07 01:37:40,202] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369860.1666107, 'message': 'Dec 7 01:37:38 hqnl0246134 sshd[274603]: Failed password for root from 61.177.173.50 port 24734 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-07 01:37:40,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369860.166496, 'message': 'Dec 7 01:37:38 hqnl0246134 sshd[274610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:37:42,188] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369862.1685038, 'message': 'Dec 7 01:37:40 hqnl0246134 sshd[274610]: Failed password for root from 61.177.172.104 port 30017 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 01:37:42,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369862.1686828, 'message': 'Dec 7 01:37:40 hqnl0246134 sshd[274610]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 01:37:44,202] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369864.1713252, 'message': 'Dec 7 01:37:42 hqnl0246134 sshd[274612]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 01:37:44,203] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369864.1716065, 'message': 'Dec 7 01:37:43 hqnl0246134 sshd[274610]: Failed password for root from 61.177.172.104 port 30017 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-07 01:37:44,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369864.1714954, 'message': 'Dec 7 01:37:42 hqnl0246134 sshd[274612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 01:37:46,206] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369866.1763868, 'message': 'Dec 7 01:37:44 hqnl0246134 sshd[274612]: Failed password for root from 61.177.173.50 port 11878 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 01:37:46,207] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369866.1767387, 'message': 'Dec 7 01:37:44 hqnl0246134 sshd[274610]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-07 01:37:48,209] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369868.1788697, 'message': 'Dec 7 01:37:46 hqnl0246134 sshd[274612]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 01:37:48,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369868.1790407, 'message': 'Dec 7 01:37:46 hqnl0246134 sshd[274610]: Failed password for root from 61.177.172.104 port 30017 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 01:37:50,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369870.1808844, 'message': 'Dec 7 01:37:48 hqnl0246134 sshd[274622]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-07 01:37:50,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369870.1895661, 'message': 'Dec 7 01:37:48 hqnl0246134 sshd[274612]: Failed password for root from 61.177.173.50 port 11878 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 01:37:50,232] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369870.1894174, 'message': 'Dec 7 01:37:48 hqnl0246134 sshd[274622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0212 seconds
WARNING [2022-12-07 01:37:50,320] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:37:50,321] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:37:52,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369872.28998, 'message': 'Dec 7 01:37:50 hqnl0246134 sshd[274612]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 01:37:52,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369872.29021, 'message': 'Dec 7 01:37:51 hqnl0246134 sshd[274622]: Failed password for root from 61.177.172.104 port 54924 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-07 01:37:54,214] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670369874.1824315, 'message': 'Dec 7 01:37:52 hqnl0246134 sshd[274612]: Failed password for root from 61.177.173.50 port 11878 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-07 01:37:54,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369874.18262, 'message': 'Dec 7 01:37:53 hqnl0246134 sshd[274622]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-07 01:37:56,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.255.8.153', 'timestamp': 1670369876.1844661, 'message': 'Dec 7 01:37:54 hqnl0246134 sshd[274625]: Invalid user mas from 36.255.8.153 port 56132', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-07 01:37:56,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369876.1849651, 'message': 'Dec 7 01:37:55 hqnl0246134 sshd[274622]: Failed password for root from 61.177.172.104 port 54924 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-07 01:37:56,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '36.255.8.153', 'timestamp': 1670369876.1846888, 'message': 'Dec 7 01:37:54 hqnl0246134 sshd[274625]: pam_imunify(sshd:auth): [IM360_RBL] The IP 36.255.8.153 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 01:37:56,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '36.255.8.153', 'timestamp': 1670369876.1848576, 'message': 'Dec 7 01:37:54 hqnl0246134 sshd[274625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.8.153 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 01:37:58,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.255.8.153', 'timestamp': 1670369878.1858006, 'message': 'Dec 7 01:37:56 hqnl0246134 sshd[274625]: Failed password for invalid user mas from 36.255.8.153 port 56132 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-07 01:37:58,220] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369878.1861596, 'message': 'Dec 7 01:37:57 hqnl0246134 sshd[274622]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-07 01:37:58,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '36.255.8.153', 'timestamp': 1670369878.1860423, 'message': 'Dec 7 01:37:56 hqnl0246134 sshd[274625]: Disconnected from invalid user mas 36.255.8.153 port 56132 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 01:38:00,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670369880.1898682, 'message': 'Dec 7 01:37:58 hqnl0246134 sshd[274622]: Failed password for root from 61.177.172.104 port 54924 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 01:38:00,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '47.254.201.78', 'timestamp': 1670369880.1900556, 'message': 'Dec 7 01:37:59 hqnl0246134 sshd[274627]: Invalid user gb from 47.254.201.78 port 57762', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-07 01:38:00,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '47.254.201.78', 'timestamp': 1670369880.1901677, 'message': 'Dec 7 01:37:59 hqnl0246134 sshd[274627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.201.78 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-07 01:38:04,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '47.254.201.78', 'timestamp': 1670369884.196362, 'message': 'Dec 7 01:38:02 hqnl0246134 sshd[274627]: Failed password for invalid user gb from 47.254.201.78 port 57762 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-07 01:38:04,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '47.254.201.78', 'timestamp': 1670369884.19683, 'message': 'Dec 7 01:38:02 hqnl0246134 sshd[274627]: Disconnected from invalid user gb 47.254.201.78 port 57762 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 01:38:06,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369886.1974356, 'message': 'Dec 7 01:38:06 hqnl0246134 sshd[274639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 01:38:08,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369888.1995609, 'message': 'Dec 7 01:38:08 hqnl0246134 sshd[274639]: Failed password for root from 61.177.173.18 port 18826 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-07 01:38:11,653] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:38:11,684] defence360agent.internals.the_sink: SensorIncidentList(<19 item(s)>) processed in 0.0410 seconds
INFO [2022-12-07 01:38:17,435] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:38:17,436] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:38:17,446] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:38:17,460] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0230 seconds
INFO [2022-12-07 01:38:17,999] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:38:18,000] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:38:18,007] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:38:18,019] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 01:38:20,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.230.236.11', 'timestamp': 1670369900.2130923, 'message': 'Dec 7 01:38:19 hqnl0246134 sshd[274663]: Invalid user Admin from 45.230.236.11 port 60964', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-07 01:38:20,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.230.236.11', 'timestamp': 1670369900.2134593, 'message': 'Dec 7 01:38:20 hqnl0246134 sshd[274663]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.230.236.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 01:38:20,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.230.236.11', 'timestamp': 1670369900.2136176, 'message': 'Dec 7 01:38:20 hqnl0246134 sshd[274663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.230.236.11 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-07 01:38:20,548] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:38:20,548] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:38:20,556] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:38:20,567] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 01:38:22,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.230.236.11', 'timestamp': 1670369902.214448, 'message': 'Dec 7 01:38:21 hqnl0246134 sshd[274663]: Failed password for invalid user Admin from 45.230.236.11 port 60964 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 01:38:24,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '45.230.236.11', 'timestamp': 1670369904.2180974, 'message': 'Dec 7 01:38:22 hqnl0246134 sshd[274663]: Disconnected from invalid user Admin 45.230.236.11 port 60964 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0224 seconds
WARNING [2022-12-07 01:38:50,325] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:38:50,326] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:38:52,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369932.2586246, 'message': 'Dec 7 01:38:51 hqnl0246134 sshd[274684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-07 01:38:54,294] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369934.260437, 'message': 'Dec 7 01:38:52 hqnl0246134 sshd[274684]: Failed password for root from 61.177.173.18 port 34465 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-07 01:38:55,472] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 01:38:55,542] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 01:38:55,542] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 01:38:55,542] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 01:38:55,543] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 01:38:55,543] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 01:38:55,552] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 01:38:55,569] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0252 seconds
WARNING [2022-12-07 01:38:55,575] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 01:38:55,578] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:38:55,595] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0320 seconds
INFO [2022-12-07 01:38:55,596] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0299 seconds
WARNING [2022-12-07 01:39:11,658] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:39:11,683] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0344 seconds
INFO [2022-12-07 01:39:18,487] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:39:18,489] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:39:18,504] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:39:18,525] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0342 seconds
INFO [2022-12-07 01:39:20,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369960.2867181, 'message': 'Dec 7 01:39:18 hqnl0246134 sshd[274839]: Invalid user ecell from 165.227.166.207 port 54346', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 01:39:20,329] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369960.2870543, 'message': 'Dec 7 01:39:18 hqnl0246134 sshd[274839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 01:39:21,287] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:39:21,287] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:39:21,294] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:39:21,306] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-07 01:39:22,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369962.2910275, 'message': 'Dec 7 01:39:20 hqnl0246134 sshd[274839]: Failed password for invalid user ecell from 165.227.166.207 port 54346 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 01:39:24,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670369964.2941551, 'message': 'Dec 7 01:39:22 hqnl0246134 sshd[274839]: Disconnected from invalid user ecell 165.227.166.207 port 54346 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-07 01:39:24,969] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:39:24,970] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:39:24,978] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:39:24,989] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-07 01:39:31,114] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 01:39:31,114] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 01:39:31,115] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-07 01:39:38,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369978.316967, 'message': 'Dec 7 01:39:37 hqnl0246134 sshd[274855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-07 01:39:40,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670369980.3199666, 'message': 'Dec 7 01:39:39 hqnl0246134 sshd[274855]: Failed password for root from 61.177.173.18 port 59366 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-07 01:39:50,330] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:39:50,331] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:40:11,672] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:40:11,701] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0442 seconds
INFO [2022-12-07 01:40:17,847] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:40:17,847] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:40:17,867] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:40:17,882] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0335 seconds
INFO [2022-12-07 01:40:20,604] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:40:20,616] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:40:20,623] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:40:20,634] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-07 01:40:22,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370022.3695552, 'message': 'Dec 7 01:40:21 hqnl0246134 sshd[274922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-07 01:40:22,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370022.3698218, 'message': 'Dec 7 01:40:21 hqnl0246134 sshd[274926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-07 01:40:22,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370022.3713684, 'message': 'Dec 7 01:40:22 hqnl0246134 sshd[274926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:40:24,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370024.372378, 'message': 'Dec 7 01:40:23 hqnl0246134 sshd[274922]: Failed password for root from 61.177.173.18 port 18336 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 01:40:24,402] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370024.3725467, 'message': 'Dec 7 01:40:23 hqnl0246134 sshd[274926]: Failed password for root from 61.177.172.108 port 42931 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-07 01:40:26,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370026.3775604, 'message': 'Dec 7 01:40:25 hqnl0246134 sshd[274922]: Failed password for root from 61.177.173.18 port 18336 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0372 seconds
INFO [2022-12-07 01:40:26,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370026.3778508, 'message': 'Dec 7 01:40:26 hqnl0246134 sshd[274926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-07 01:40:28,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370028.3777108, 'message': 'Dec 7 01:40:27 hqnl0246134 sshd[274922]: Failed password for root from 61.177.173.18 port 18336 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-07 01:40:28,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370028.3779356, 'message': 'Dec 7 01:40:27 hqnl0246134 sshd[274926]: Failed password for root from 61.177.172.108 port 42931 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0387 seconds
INFO [2022-12-07 01:40:30,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370030.3803763, 'message': 'Dec 7 01:40:28 hqnl0246134 sshd[274926]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 01:40:30,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370030.380561, 'message': 'Dec 7 01:40:30 hqnl0246134 sshd[274926]: Failed password for root from 61.177.172.108 port 42931 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 01:40:32,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370032.382535, 'message': 'Dec 7 01:40:32 hqnl0246134 sshd[274931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:40:32,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370032.3827083, 'message': 'Dec 7 01:40:32 hqnl0246134 sshd[274931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-07 01:40:34,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370034.3851743, 'message': 'Dec 7 01:40:33 hqnl0246134 sshd[274931]: Failed password for root from 61.177.172.108 port 26197 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 01:40:36,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370036.3857055, 'message': 'Dec 7 01:40:34 hqnl0246134 sshd[274931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-07 01:40:38,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370038.3885105, 'message': 'Dec 7 01:40:36 hqnl0246134 sshd[274931]: Failed password for root from 61.177.172.108 port 26197 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-07 01:40:38,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370038.3887115, 'message': 'Dec 7 01:40:36 hqnl0246134 sshd[274931]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-07 01:40:40,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370040.3915505, 'message': 'Dec 7 01:40:39 hqnl0246134 sshd[274931]: Failed password for root from 61.177.172.108 port 26197 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-07 01:40:44,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370044.397653, 'message': 'Dec 7 01:40:42 hqnl0246134 sshd[274933]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 01:40:44,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370044.3978817, 'message': 'Dec 7 01:40:42 hqnl0246134 sshd[274933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 01:40:46,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370046.400218, 'message': 'Dec 7 01:40:44 hqnl0246134 sshd[274933]: Failed password for root from 61.177.172.108 port 12355 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 01:40:48,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370048.403014, 'message': 'Dec 7 01:40:47 hqnl0246134 sshd[274933]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
WARNING [2022-12-07 01:40:50,334] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:40:50,334] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:40:50,425] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370050.4068482, 'message': 'Dec 7 01:40:48 hqnl0246134 sshd[274933]: Failed password for root from 61.177.172.108 port 12355 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 01:40:50,444] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370050.4070263, 'message': 'Dec 7 01:40:49 hqnl0246134 sshd[274933]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 01:40:52,426] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370052.4096632, 'message': 'Dec 7 01:40:50 hqnl0246134 sshd[274933]: Failed password for root from 61.177.172.108 port 12355 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 01:40:54,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370054.4104834, 'message': 'Dec 7 01:40:53 hqnl0246134 sshd[274945]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 01:40:54,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370054.4107263, 'message': 'Dec 7 01:40:53 hqnl0246134 sshd[274945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-07 01:40:56,029] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:40:56,030] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:40:56,037] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:40:56,048] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-07 01:40:56,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370056.4123154, 'message': 'Dec 7 01:40:55 hqnl0246134 sshd[274945]: Failed password for root from 61.177.172.108 port 36276 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:40:58,444] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370058.414695, 'message': 'Dec 7 01:40:57 hqnl0246134 sshd[274945]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-07 01:41:00,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370060.4173322, 'message': 'Dec 7 01:40:59 hqnl0246134 sshd[274945]: Failed password for root from 61.177.172.108 port 36276 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-07 01:41:00,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370060.417587, 'message': 'Dec 7 01:40:59 hqnl0246134 sshd[274945]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-07 01:41:02,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370062.4179163, 'message': 'Dec 7 01:41:01 hqnl0246134 sshd[274945]: Failed password for root from 61.177.172.108 port 36276 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 01:41:08,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370068.429249, 'message': 'Dec 7 01:41:06 hqnl0246134 sshd[274962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 01:41:10,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370070.4317925, 'message': 'Dec 7 01:41:08 hqnl0246134 sshd[274962]: Failed password for root from 61.177.173.18 port 40981 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-07 01:41:11,671] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:41:11,700] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0394 seconds
INFO [2022-12-07 01:41:12,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370072.4339073, 'message': 'Dec 7 01:41:11 hqnl0246134 sshd[274965]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 01:41:12,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370072.434102, 'message': 'Dec 7 01:41:11 hqnl0246134 sshd[274965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 01:41:14,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370074.4364073, 'message': 'Dec 7 01:41:12 hqnl0246134 sshd[274962]: Failed password for root from 61.177.173.18 port 40981 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-07 01:41:14,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370074.436597, 'message': 'Dec 7 01:41:13 hqnl0246134 sshd[274965]: Failed password for root from 61.177.173.35 port 55656 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0425 seconds
INFO [2022-12-07 01:41:14,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370074.4367356, 'message': 'Dec 7 01:41:13 hqnl0246134 sshd[274967]: Invalid user escheduler from 165.227.166.207 port 36402', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-07 01:41:14,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370074.4369054, 'message': 'Dec 7 01:41:13 hqnl0246134 sshd[274967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 01:41:16,517] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370076.4388523, 'message': 'Dec 7 01:41:14 hqnl0246134 sshd[274962]: Failed password for root from 61.177.173.18 port 40981 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0777 seconds
INFO [2022-12-07 01:41:16,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370076.4391944, 'message': 'Dec 7 01:41:15 hqnl0246134 sshd[274967]: Failed password for invalid user escheduler from 165.227.166.207 port 36402 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0779 seconds
INFO [2022-12-07 01:41:16,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370076.439408, 'message': 'Dec 7 01:41:15 hqnl0246134 sshd[274965]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0774 seconds
INFO [2022-12-07 01:41:18,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370078.4414184, 'message': 'Dec 7 01:41:17 hqnl0246134 sshd[274967]: Disconnected from invalid user escheduler 165.227.166.207 port 36402 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-07 01:41:18,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370078.4419742, 'message': 'Dec 7 01:41:17 hqnl0246134 sshd[274965]: Failed password for root from 61.177.173.35 port 55656 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-07 01:41:18,505] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370078.4421597, 'message': 'Dec 7 01:41:18 hqnl0246134 sshd[274965]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 01:41:20,008] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:41:20,009] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:41:20,016] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:41:20,028] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-07 01:41:22,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370082.4440563, 'message': 'Dec 7 01:41:20 hqnl0246134 sshd[274965]: Failed password for root from 61.177.173.35 port 55656 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 01:41:22,813] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:41:22,813] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:41:22,925] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:41:22,936] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.1216 seconds
INFO [2022-12-07 01:41:24,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370084.447278, 'message': 'Dec 7 01:41:24 hqnl0246134 sshd[274988]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 01:41:24,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370084.447613, 'message': 'Dec 7 01:41:24 hqnl0246134 sshd[274988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-07 01:41:26,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370086.4470334, 'message': 'Dec 7 01:41:26 hqnl0246134 sshd[274988]: Failed password for root from 61.177.173.35 port 50260 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 01:41:30,471] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370090.4528491, 'message': 'Dec 7 01:41:28 hqnl0246134 sshd[274988]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 01:41:32,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370092.455474, 'message': 'Dec 7 01:41:30 hqnl0246134 sshd[274988]: Failed password for root from 61.177.173.35 port 50260 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 01:41:34,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370094.4576526, 'message': 'Dec 7 01:41:32 hqnl0246134 sshd[274988]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 01:41:36,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370096.4603, 'message': 'Dec 7 01:41:34 hqnl0246134 sshd[274988]: Failed password for root from 61.177.173.35 port 50260 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 01:41:38,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370098.4618053, 'message': 'Dec 7 01:41:36 hqnl0246134 sshd[274991]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 01:41:38,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370098.4622319, 'message': 'Dec 7 01:41:36 hqnl0246134 sshd[274991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:41:40,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370100.4643836, 'message': 'Dec 7 01:41:39 hqnl0246134 sshd[274991]: Failed password for root from 61.177.173.35 port 42808 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:41:42,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370102.466049, 'message': 'Dec 7 01:41:41 hqnl0246134 sshd[274991]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 01:41:44,489] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370104.4689286, 'message': 'Dec 7 01:41:43 hqnl0246134 sshd[274991]: Failed password for root from 61.177.173.35 port 42808 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 01:41:44,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370104.4731824, 'message': 'Dec 7 01:41:43 hqnl0246134 sshd[274991]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 01:41:46,492] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670370106.4720292, 'message': 'Dec 7 01:41:44 hqnl0246134 sshd[274991]: Failed password for root from 61.177.173.35 port 42808 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
WARNING [2022-12-07 01:41:50,337] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:41:50,338] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:41:52,524] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.230.236.11', 'timestamp': 1670370112.487284, 'message': 'Dec 7 01:41:50 hqnl0246134 sshd[275004]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.230.236.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-07 01:41:52,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370112.4881556, 'message': 'Dec 7 01:41:52 hqnl0246134 sshd[275006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-07 01:41:52,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.230.236.11', 'timestamp': 1670370112.4880285, 'message': 'Dec 7 01:41:50 hqnl0246134 sshd[275004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.230.236.11 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-07 01:41:54,117] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-07 01:41:54,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.230.236.11', 'timestamp': 1670370114.489998, 'message': 'Dec 7 01:41:52 hqnl0246134 sshd[275004]: Failed password for root from 45.230.236.11 port 51088 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-07 01:41:54,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370114.4901788, 'message': 'Dec 7 01:41:54 hqnl0246134 sshd[275006]: Failed password for root from 61.177.173.18 port 64394 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-07 01:41:55,595] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:41:55,596] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:41:55,607] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:41:55,621] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-07 01:41:58,514] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370118.4949791, 'message': 'Dec 7 01:41:57 hqnl0246134 sshd[275006]: Failed password for root from 61.177.173.18 port 64394 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:42:02,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '24.62.135.19', 'timestamp': 1670370122.500381, 'message': 'Dec 7 01:42:00 hqnl0246134 sshd[275015]: Invalid user admin from 24.62.135.19 port 37900', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1077 seconds
INFO [2022-12-07 01:42:02,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370122.500922, 'message': 'Dec 7 01:42:01 hqnl0246134 sshd[275006]: Failed password for root from 61.177.173.18 port 64394 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1090 seconds
INFO [2022-12-07 01:42:02,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '24.62.135.19', 'timestamp': 1670370122.5005543, 'message': 'Dec 7 01:42:00 hqnl0246134 sshd[275015]: pam_imunify(sshd:auth): [IM360_RBL] The IP 24.62.135.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-07 01:42:02,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '24.62.135.19', 'timestamp': 1670370122.500734, 'message': 'Dec 7 01:42:00 hqnl0246134 sshd[275015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.62.135.19 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 01:42:04,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '24.62.135.19', 'timestamp': 1670370124.5029964, 'message': 'Dec 7 01:42:03 hqnl0246134 sshd[275015]: Failed password for invalid user admin from 24.62.135.19 port 37900 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 01:42:06,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '24.62.135.19', 'timestamp': 1670370126.505617, 'message': 'Dec 7 01:42:04 hqnl0246134 sshd[275015]: Disconnected from invalid user admin 24.62.135.19 port 37900 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
WARNING [2022-12-07 01:42:11,679] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:42:11,705] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0342 seconds
INFO [2022-12-07 01:42:17,914] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:42:17,915] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:42:17,927] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:42:17,940] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0235 seconds
INFO [2022-12-07 01:42:22,702] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:42:22,702] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:42:22,710] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:42:22,722] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 01:42:38,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370158.5393472, 'message': 'Dec 7 01:42:38 hqnl0246134 sshd[275059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-07 01:42:40,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370160.5419335, 'message': 'Dec 7 01:42:40 hqnl0246134 sshd[275059]: Failed password for root from 61.177.173.18 port 29114 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0263 seconds
INFO [2022-12-07 01:42:42,561] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '196.1.114.253', 'timestamp': 1670370162.5429566, 'message': 'Dec 7 01:42:41 hqnl0246134 sshd[275061]: pam_imunify(sshd:auth): [IM360_RBL] The IP 196.1.114.253 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 01:42:42,581] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '196.1.114.253', 'timestamp': 1670370162.5431514, 'message': 'Dec 7 01:42:41 hqnl0246134 sshd[275061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.114.253 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 01:42:44,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370164.5441678, 'message': 'Dec 7 01:42:42 hqnl0246134 sshd[275059]: Failed password for root from 61.177.173.18 port 29114 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-07 01:42:44,576] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '196.1.114.253', 'timestamp': 1670370164.5445604, 'message': 'Dec 7 01:42:44 hqnl0246134 sshd[275061]: Failed password for root from 196.1.114.253 port 45507 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 01:42:48,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370168.5486233, 'message': 'Dec 7 01:42:47 hqnl0246134 sshd[275059]: Failed password for root from 61.177.173.18 port 29114 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0259 seconds
WARNING [2022-12-07 01:42:50,341] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:42:50,341] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:43:10,608] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370190.5758421, 'message': 'Dec 7 01:43:09 hqnl0246134 sshd[275112]: Invalid user es from 165.227.166.207 port 46750', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-07 01:43:10,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370190.5761952, 'message': 'Dec 7 01:43:09 hqnl0246134 sshd[275112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
WARNING [2022-12-07 01:43:11,682] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:43:11,712] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0380 seconds
INFO [2022-12-07 01:43:12,608] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370192.576332, 'message': 'Dec 7 01:43:11 hqnl0246134 sshd[275112]: Failed password for invalid user es from 165.227.166.207 port 46750 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 01:43:14,595] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370194.577519, 'message': 'Dec 7 01:43:13 hqnl0246134 sshd[275112]: Disconnected from invalid user es 165.227.166.207 port 46750 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 01:43:16,642] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:43:16,643] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:43:16,652] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:43:16,665] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-07 01:43:17,865] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:43:17,866] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:43:17,874] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:43:17,886] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-07 01:43:18,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370198.5820644, 'message': 'Dec 7 01:43:17 hqnl0246134 sshd[275132]: Invalid user sonos from 109.167.200.10 port 34498', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 01:43:18,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370198.5840132, 'message': 'Dec 7 01:43:17 hqnl0246134 sshd[275132]: pam_imunify(sshd:auth): [IM360_RBL] The IP 109.167.200.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 01:43:18,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370198.584175, 'message': 'Dec 7 01:43:17 hqnl0246134 sshd[275132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.200.10 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 01:43:20,571] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:43:20,571] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:43:20,578] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:43:20,596] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0244 seconds
INFO [2022-12-07 01:43:20,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370200.5816455, 'message': 'Dec 7 01:43:19 hqnl0246134 sshd[275132]: Failed password for invalid user sonos from 109.167.200.10 port 34498 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-07 01:43:22,635] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370202.5856063, 'message': 'Dec 7 01:43:21 hqnl0246134 sshd[275132]: Disconnected from invalid user sonos 109.167.200.10 port 34498 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0492 seconds
INFO [2022-12-07 01:43:22,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370202.585943, 'message': 'Dec 7 01:43:21 hqnl0246134 sshd[275141]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.110.185.60 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0493 seconds
INFO [2022-12-07 01:43:22,663] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370202.5861108, 'message': 'Dec 7 01:43:21 hqnl0246134 sshd[275141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.185.60 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-07 01:43:24,606] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370204.5878913, 'message': 'Dec 7 01:43:23 hqnl0246134 sshd[275141]: Failed password for root from 143.110.185.60 port 48226 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 01:43:26,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370206.5919287, 'message': 'Dec 7 01:43:25 hqnl0246134 sshd[275143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 01:43:28,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370208.5936291, 'message': 'Dec 7 01:43:26 hqnl0246134 sshd[275143]: Failed password for root from 61.177.173.18 port 52225 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-07 01:43:30,616] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370210.5964231, 'message': 'Dec 7 01:43:29 hqnl0246134 sshd[275143]: Failed password for root from 61.177.173.18 port 52225 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 01:43:34,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370214.6005569, 'message': 'Dec 7 01:43:33 hqnl0246134 sshd[275143]: Failed password for root from 61.177.173.18 port 52225 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
WARNING [2022-12-07 01:43:50,345] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:43:50,346] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:44:11,688] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:44:11,723] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0438 seconds
INFO [2022-12-07 01:44:12,666] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370252.6469676, 'message': 'Dec 7 01:44:11 hqnl0246134 sshd[275176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 01:44:14,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370254.6502469, 'message': 'Dec 7 01:44:13 hqnl0246134 sshd[275176]: Failed password for root from 61.177.173.18 port 16023 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-07 01:44:16,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370256.650326, 'message': 'Dec 7 01:44:14 hqnl0246134 sshd[275178]: Invalid user jenkins from 195.239.97.254 port 38592', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 01:44:16,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370256.6508462, 'message': 'Dec 7 01:44:16 hqnl0246134 sshd[275176]: Failed password for root from 61.177.173.18 port 16023 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 01:44:16,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370256.6505556, 'message': 'Dec 7 01:44:14 hqnl0246134 sshd[275178]: pam_imunify(sshd:auth): [IM360_RBL] The IP 195.239.97.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-07 01:44:16,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370256.6507232, 'message': 'Dec 7 01:44:14 hqnl0246134 sshd[275178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.97.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-07 01:44:17,835] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:44:17,836] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:44:17,845] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:44:17,862] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0247 seconds
INFO [2022-12-07 01:44:18,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370258.6530979, 'message': 'Dec 7 01:44:16 hqnl0246134 sshd[275178]: Failed password for invalid user jenkins from 195.239.97.254 port 38592 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-07 01:44:20,556] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:44:20,557] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:44:20,565] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:44:20,585] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0272 seconds
INFO [2022-12-07 01:44:20,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370260.6548457, 'message': 'Dec 7 01:44:18 hqnl0246134 sshd[275178]: Disconnected from invalid user jenkins 195.239.97.254 port 38592 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0551 seconds
INFO [2022-12-07 01:44:20,712] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370260.6552439, 'message': 'Dec 7 01:44:20 hqnl0246134 sshd[275176]: Failed password for root from 61.177.173.18 port 16023 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0555 seconds
INFO [2022-12-07 01:44:25,204] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:44:25,205] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:44:25,213] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:44:25,224] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
WARNING [2022-12-07 01:44:50,349] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:44:50,351] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:44:58,734] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370298.7037024, 'message': 'Dec 7 01:44:57 hqnl0246134 sshd[275226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 01:45:00,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370300.705251, 'message': 'Dec 7 01:44:58 hqnl0246134 sshd[275226]: Failed password for root from 61.177.173.18 port 31690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 01:45:02,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370302.708549, 'message': 'Dec 7 01:45:01 hqnl0246134 sshd[275226]: Failed password for root from 61.177.173.18 port 31690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0496 seconds
INFO [2022-12-07 01:45:02,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370302.7089012, 'message': 'Dec 7 01:45:02 hqnl0246134 sshd[275243]: Invalid user ftpuser from 165.227.166.207 port 56990', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0498 seconds
INFO [2022-12-07 01:45:02,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370302.7091522, 'message': 'Dec 7 01:45:02 hqnl0246134 sshd[275243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 01:45:06,752] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370306.7146614, 'message': 'Dec 7 01:45:04 hqnl0246134 sshd[275243]: Failed password for invalid user ftpuser from 165.227.166.207 port 56990 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0366 seconds
INFO [2022-12-07 01:45:06,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370306.7150638, 'message': 'Dec 7 01:45:05 hqnl0246134 sshd[275226]: Failed password for root from 61.177.173.18 port 31690 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-07 01:45:06,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370306.7148824, 'message': 'Dec 7 01:45:05 hqnl0246134 sshd[275243]: Disconnected from invalid user ftpuser 165.227.166.207 port 56990 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
WARNING [2022-12-07 01:45:11,691] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:45:11,715] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0327 seconds
INFO [2022-12-07 01:45:17,912] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:45:17,913] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:45:17,924] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:45:17,937] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0223 seconds
INFO [2022-12-07 01:45:20,682] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:45:20,683] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:45:20,691] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:45:20,707] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0233 seconds
INFO [2022-12-07 01:45:20,746] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.230.236.11', 'timestamp': 1670370320.7262404, 'message': 'Dec 7 01:45:19 hqnl0246134 sshd[275277]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.230.236.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 01:45:20,764] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.230.236.11', 'timestamp': 1670370320.7264814, 'message': 'Dec 7 01:45:19 hqnl0246134 sshd[275277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.230.236.11 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 01:45:20,798] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.230.236.11', 'timestamp': 1670370320.7266254, 'message': 'Dec 7 01:45:20 hqnl0246134 sshd[275277]: Failed password for root from 45.230.236.11 port 41120 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-07 01:45:26,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370326.7323177, 'message': 'Dec 7 01:45:26 hqnl0246134 sshd[275285]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-07 01:45:26,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370326.7326388, 'message': 'Dec 7 01:45:26 hqnl0246134 sshd[275285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:45:28,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370328.7341683, 'message': 'Dec 7 01:45:28 hqnl0246134 sshd[275285]: Failed password for root from 61.177.173.49 port 43699 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-07 01:45:28,802] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370328.7344465, 'message': 'Dec 7 01:45:28 hqnl0246134 sshd[275285]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-07 01:45:30,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370330.736398, 'message': 'Dec 7 01:45:30 hqnl0246134 sshd[275285]: Failed password for root from 61.177.173.49 port 43699 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:45:34,764] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370334.7420003, 'message': 'Dec 7 01:45:32 hqnl0246134 sshd[275285]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-07 01:45:34,784] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370334.7423282, 'message': 'Dec 7 01:45:34 hqnl0246134 sshd[275285]: Failed password for root from 61.177.173.49 port 43699 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:45:38,094] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:45:38,095] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:45:38,115] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:45:38,138] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0402 seconds
INFO [2022-12-07 01:45:38,775] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370338.7464006, 'message': 'Dec 7 01:45:37 hqnl0246134 sshd[275295]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-07 01:45:38,793] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370338.746627, 'message': 'Dec 7 01:45:37 hqnl0246134 sshd[275295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:45:40,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370340.7493749, 'message': 'Dec 7 01:45:39 hqnl0246134 sshd[275295]: Failed password for root from 61.177.173.49 port 20751 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-07 01:45:40,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370340.7496247, 'message': 'Dec 7 01:45:39 hqnl0246134 sshd[275295]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-07 01:45:42,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370342.7499952, 'message': 'Dec 7 01:45:41 hqnl0246134 sshd[275295]: Failed password for root from 61.177.173.49 port 20751 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-07 01:45:42,792] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370342.7503488, 'message': 'Dec 7 01:45:42 hqnl0246134 sshd[275301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-07 01:45:42,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370342.7501936, 'message': 'Dec 7 01:45:42 hqnl0246134 sshd[275295]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 01:45:44,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670370344.7528427, 'message': 'Dec 7 01:45:44 hqnl0246134 sshd[275295]: Failed password for root from 61.177.173.49 port 20751 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 01:45:44,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370344.7531183, 'message': 'Dec 7 01:45:44 hqnl0246134 sshd[275301]: Failed password for root from 61.177.173.18 port 52191 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0347 seconds
WARNING [2022-12-07 01:45:50,354] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:45:50,355] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:46:04,235] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 01:46:04,309] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 01:46:04,310] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 01:46:04,310] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 01:46:04,310] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 01:46:04,310] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 01:46:04,321] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 01:46:04,337] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0265 seconds
WARNING [2022-12-07 01:46:04,345] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 01:46:04,347] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:46:04,363] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0313 seconds
INFO [2022-12-07 01:46:04,365] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0293 seconds
WARNING [2022-12-07 01:46:11,694] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:46:11,714] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0276 seconds
INFO [2022-12-07 01:46:17,914] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:46:17,915] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:46:18,000] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:46:18,015] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0984 seconds
INFO [2022-12-07 01:46:20,802] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:46:20,803] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:46:20,810] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:46:20,822] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-07 01:46:26,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370386.8105786, 'message': 'Dec 7 01:46:25 hqnl0246134 sshd[275342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 01:46:28,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370388.815634, 'message': 'Dec 7 01:46:27 hqnl0246134 sshd[275342]: Failed password for root from 61.177.173.18 port 63444 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0418 seconds
INFO [2022-12-07 01:46:28,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.93.201.82', 'timestamp': 1670370388.8158753, 'message': 'Dec 7 01:46:27 hqnl0246134 sshd[275345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.93.201.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0420 seconds
INFO [2022-12-07 01:46:28,876] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '45.93.201.82', 'timestamp': 1670370388.8160584, 'message': 'Dec 7 01:46:27 hqnl0246134 sshd[275345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.82 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 01:46:30,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.93.201.82', 'timestamp': 1670370390.8198545, 'message': 'Dec 7 01:46:29 hqnl0246134 sshd[275345]: Failed password for root from 45.93.201.82 port 52408 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-07 01:46:30,852] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370390.8200834, 'message': 'Dec 7 01:46:29 hqnl0246134 sshd[275342]: Failed password for root from 61.177.173.18 port 63444 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-07 01:46:34,456] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 01:46:34,456] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 01:46:34,457] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-07 01:46:34,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370394.8267386, 'message': 'Dec 7 01:46:32 hqnl0246134 sshd[275342]: Failed password for root from 61.177.173.18 port 63444 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-07 01:46:34,861] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.93.201.82', 'timestamp': 1670370394.8270383, 'message': 'Dec 7 01:46:34 hqnl0246134 sshd[275345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.93.201.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-07 01:46:36,846] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.93.201.82', 'timestamp': 1670370396.8262837, 'message': 'Dec 7 01:46:36 hqnl0246134 sshd[275345]: Failed password for root from 45.93.201.82 port 52408 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 01:46:42,854] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '45.93.201.82', 'timestamp': 1670370402.8327787, 'message': 'Dec 7 01:46:41 hqnl0246134 sshd[275345]: pam_imunify(sshd:auth): [IM360_RBL] The IP 45.93.201.82 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-07 01:46:44,868] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '45.93.201.82', 'timestamp': 1670370404.8346546, 'message': 'Dec 7 01:46:43 hqnl0246134 sshd[275345]: Failed password for root from 45.93.201.82 port 52408 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
WARNING [2022-12-07 01:46:50,358] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:46:50,359] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:46:51,932] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:46:51,933] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:46:51,941] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:46:51,953] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-07 01:47:02,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370422.8529787, 'message': 'Dec 7 01:47:01 hqnl0246134 sshd[275386]: Invalid user git from 165.227.166.207 port 39050', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-07 01:47:02,903] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370422.853442, 'message': 'Dec 7 01:47:01 hqnl0246134 sshd[275386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 01:47:04,872] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370424.854422, 'message': 'Dec 7 01:47:03 hqnl0246134 sshd[275386]: Failed password for invalid user git from 165.227.166.207 port 39050 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 01:47:04,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370424.854609, 'message': 'Dec 7 01:47:03 hqnl0246134 sshd[275386]: Disconnected from invalid user git 165.227.166.207 port 39050 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0166 seconds
WARNING [2022-12-07 01:47:11,703] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:47:11,725] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0338 seconds
INFO [2022-12-07 01:47:12,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370432.8664389, 'message': 'Dec 7 01:47:11 hqnl0246134 sshd[275406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:47:14,886] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370434.8690083, 'message': 'Dec 7 01:47:13 hqnl0246134 sshd[275406]: Failed password for root from 61.177.173.18 port 33190 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 01:47:17,753] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:47:17,754] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:47:17,762] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:47:17,774] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-07 01:47:20,493] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:47:20,493] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:47:20,504] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:47:20,517] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
INFO [2022-12-07 01:47:24,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '107.182.17.78', 'timestamp': 1670370444.877037, 'message': 'Dec 7 01:47:23 hqnl0246134 sshd[275427]: pam_imunify(sshd:auth): [IM360_RBL] The IP 107.182.17.78 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 01:47:24,914] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '107.182.17.78', 'timestamp': 1670370444.8773456, 'message': 'Dec 7 01:47:23 hqnl0246134 sshd[275427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.17.78 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 01:47:26,900] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '107.182.17.78', 'timestamp': 1670370446.8808565, 'message': 'Dec 7 01:47:26 hqnl0246134 sshd[275427]: Failed password for root from 107.182.17.78 port 42754 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
WARNING [2022-12-07 01:47:50,364] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:47:50,365] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:47:58,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370478.9232748, 'message': 'Dec 7 01:47:58 hqnl0246134 sshd[275442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-07 01:48:00,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370480.9246647, 'message': 'Dec 7 01:48:00 hqnl0246134 sshd[275442]: Failed password for root from 61.177.173.18 port 57101 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 01:48:02,944] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370482.9261646, 'message': 'Dec 7 01:48:02 hqnl0246134 sshd[275442]: Failed password for root from 61.177.173.18 port 57101 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 01:48:08,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370488.934352, 'message': 'Dec 7 01:48:06 hqnl0246134 sshd[275442]: Failed password for root from 61.177.173.18 port 57101 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 01:48:09,833] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:48:09,834] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:48:09,841] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:48:09,852] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
WARNING [2022-12-07 01:48:11,707] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:48:11,727] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0279 seconds
INFO [2022-12-07 01:48:16,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '196.1.114.252', 'timestamp': 1670370496.9417508, 'message': 'Dec 7 01:48:16 hqnl0246134 sshd[275462]: pam_imunify(sshd:auth): [IM360_RBL] The IP 196.1.114.252 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 01:48:16,984] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '196.1.114.252', 'timestamp': 1670370496.9420164, 'message': 'Dec 7 01:48:16 hqnl0246134 sshd[275462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.114.252 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 01:48:17,730] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:48:17,731] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:48:17,738] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:48:17,751] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-07 01:48:18,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '196.1.114.252', 'timestamp': 1670370498.942715, 'message': 'Dec 7 01:48:18 hqnl0246134 sshd[275462]: Failed password for root from 196.1.114.252 port 58424 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-07 01:48:20,394] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:48:20,394] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:48:20,401] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:48:20,412] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-07 01:48:45,004] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370524.9815423, 'message': 'Dec 7 01:48:43 hqnl0246134 sshd[275486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-07 01:48:47,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370526.9825706, 'message': 'Dec 7 01:48:45 hqnl0246134 sshd[275486]: Failed password for root from 61.177.173.18 port 11787 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
WARNING [2022-12-07 01:48:50,368] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:48:50,369] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:48:59,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370538.997285, 'message': 'Dec 7 01:48:58 hqnl0246134 sshd[275500]: Invalid user git from 165.227.166.207 port 49336', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-07 01:48:59,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370538.9979782, 'message': 'Dec 7 01:48:58 hqnl0246134 sshd[275500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-07 01:49:01,017] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370540.998052, 'message': 'Dec 7 01:49:00 hqnl0246134 sshd[275500]: Failed password for invalid user git from 165.227.166.207 port 49336 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 01:49:01,034] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370540.998293, 'message': 'Dec 7 01:49:00 hqnl0246134 sshd[275500]: Disconnected from invalid user git 165.227.166.207 port 49336 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 01:49:09,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370549.0075917, 'message': 'Dec 7 01:49:07 hqnl0246134 sshd[275510]: Invalid user centor from 43.156.42.200 port 41704', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-07 01:49:09,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370549.007821, 'message': 'Dec 7 01:49:07 hqnl0246134 sshd[275510]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.156.42.200 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-07 01:49:09,098] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370549.0079916, 'message': 'Dec 7 01:49:07 hqnl0246134 sshd[275510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.42.200 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-07 01:49:11,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370551.0095596, 'message': 'Dec 7 01:49:10 hqnl0246134 sshd[275510]: Failed password for invalid user centor from 43.156.42.200 port 41704 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0306 seconds
WARNING [2022-12-07 01:49:11,713] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:49:11,763] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0585 seconds
INFO [2022-12-07 01:49:13,032] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370553.0122888, 'message': 'Dec 7 01:49:12 hqnl0246134 sshd[275510]: Disconnected from invalid user centor 43.156.42.200 port 41704 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 01:49:14,984] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:49:14,985] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:49:14,995] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:49:15,007] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0207 seconds
INFO [2022-12-07 01:49:17,718] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:49:17,718] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:49:17,727] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:49:17,738] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-07 01:49:20,227] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:49:20,228] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:49:20,237] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:49:20,250] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0210 seconds
INFO [2022-12-07 01:49:33,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370573.038151, 'message': 'Dec 7 01:49:31 hqnl0246134 sshd[275539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 01:49:35,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370575.0407357, 'message': 'Dec 7 01:49:33 hqnl0246134 sshd[275539]: Failed password for root from 61.177.173.18 port 27164 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
WARNING [2022-12-07 01:49:50,372] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:49:50,374] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:49:55,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370595.0702758, 'message': 'Dec 7 01:49:53 hqnl0246134 sshd[275553]: pam_imunify(sshd:auth): [IM360_RBL] The IP 109.167.200.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-07 01:49:55,129] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370595.0709143, 'message': 'Dec 7 01:49:53 hqnl0246134 sshd[275553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.200.10 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0335 seconds
INFO [2022-12-07 01:49:57,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370597.0719216, 'message': 'Dec 7 01:49:55 hqnl0246134 sshd[275553]: Failed password for root from 109.167.200.10 port 37094 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-07 01:50:11,719] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:50:11,743] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0338 seconds
INFO [2022-12-07 01:50:17,926] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:50:17,926] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:50:17,933] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:50:17,945] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 01:50:19,130] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370619.1066306, 'message': 'Dec 7 01:50:18 hqnl0246134 sshd[275587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-07 01:50:21,128] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370621.110506, 'message': 'Dec 7 01:50:20 hqnl0246134 sshd[275587]: Failed password for root from 61.177.173.18 port 53813 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 01:50:22,507] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:50:22,508] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:50:22,516] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:50:22,531] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-07 01:50:25,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370625.1175346, 'message': 'Dec 7 01:50:24 hqnl0246134 sshd[275587]: Failed password for root from 61.177.173.18 port 53813 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-07 01:50:29,150] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370629.1263957, 'message': 'Dec 7 01:50:28 hqnl0246134 sshd[275587]: Failed password for root from 61.177.173.18 port 53813 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-07 01:50:37,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370637.1445227, 'message': 'Dec 7 01:50:35 hqnl0246134 sshd[275610]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-07 01:50:37,184] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370637.1448154, 'message': 'Dec 7 01:50:35 hqnl0246134 sshd[275610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 01:50:37,202] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370637.1450374, 'message': 'Dec 7 01:50:37 hqnl0246134 sshd[275610]: Failed password for root from 61.177.173.36 port 21101 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 01:50:39,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370639.1474605, 'message': 'Dec 7 01:50:37 hqnl0246134 sshd[275610]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 01:50:41,169] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370641.150153, 'message': 'Dec 7 01:50:39 hqnl0246134 sshd[275610]: Failed password for root from 61.177.173.36 port 21101 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 01:50:43,171] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370643.1531394, 'message': 'Dec 7 01:50:41 hqnl0246134 sshd[275610]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 01:50:45,186] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370645.1669216, 'message': 'Dec 7 01:50:44 hqnl0246134 sshd[275610]: Failed password for root from 61.177.173.36 port 21101 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 01:50:47,177] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370647.1598172, 'message': 'Dec 7 01:50:46 hqnl0246134 sshd[275615]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 01:50:47,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370647.1600049, 'message': 'Dec 7 01:50:46 hqnl0246134 sshd[275615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:50:48,815] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:50:48,816] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:50:48,826] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:50:48,843] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0263 seconds
INFO [2022-12-07 01:50:49,221] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370649.1631336, 'message': 'Dec 7 01:50:47 hqnl0246134 sshd[275619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0573 seconds
INFO [2022-12-07 01:50:49,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370649.1636536, 'message': 'Dec 7 01:50:48 hqnl0246134 sshd[275615]: Failed password for root from 61.177.172.108 port 25005 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0582 seconds
INFO [2022-12-07 01:50:49,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370649.1634898, 'message': 'Dec 7 01:50:47 hqnl0246134 sshd[275619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0266 seconds
WARNING [2022-12-07 01:50:50,378] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:50:50,379] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:50:51,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370651.1656785, 'message': 'Dec 7 01:50:49 hqnl0246134 sshd[275619]: Failed password for root from 61.177.173.36 port 23023 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-07 01:50:51,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370651.1658835, 'message': 'Dec 7 01:50:49 hqnl0246134 sshd[275632]: Invalid user asecruc from 195.239.97.254 port 35740', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-07 01:50:51,240] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370651.1662533, 'message': 'Dec 7 01:50:50 hqnl0246134 sshd[275619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0449 seconds
INFO [2022-12-07 01:50:51,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370651.1660075, 'message': 'Dec 7 01:50:49 hqnl0246134 sshd[275632]: pam_imunify(sshd:auth): [IM360_RBL] The IP 195.239.97.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0452 seconds
INFO [2022-12-07 01:50:51,241] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370651.1663537, 'message': 'Dec 7 01:50:50 hqnl0246134 sshd[275615]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0452 seconds
INFO [2022-12-07 01:50:51,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370651.1661437, 'message': 'Dec 7 01:50:49 hqnl0246134 sshd[275632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.97.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-07 01:50:53,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370653.1695058, 'message': 'Dec 7 01:50:51 hqnl0246134 sshd[275632]: Failed password for invalid user asecruc from 195.239.97.254 port 35740 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0538 seconds
INFO [2022-12-07 01:50:53,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370653.1697555, 'message': 'Dec 7 01:50:51 hqnl0246134 sshd[275634]: Invalid user git from 165.227.166.207 port 59598', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0543 seconds
INFO [2022-12-07 01:50:53,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370653.170084, 'message': 'Dec 7 01:50:52 hqnl0246134 sshd[275619]: Failed password for root from 61.177.173.36 port 23023 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0546 seconds
INFO [2022-12-07 01:50:53,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370653.1698992, 'message': 'Dec 7 01:50:51 hqnl0246134 sshd[275634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0584 seconds
INFO [2022-12-07 01:50:53,285] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370653.170345, 'message': 'Dec 7 01:50:52 hqnl0246134 sshd[275615]: Failed password for root from 61.177.172.108 port 25005 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0590 seconds
INFO [2022-12-07 01:50:53,286] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370653.1704588, 'message': 'Dec 7 01:50:52 hqnl0246134 sshd[275632]: Disconnected from invalid user asecruc 195.239.97.254 port 35740 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0593 seconds
INFO [2022-12-07 01:50:53,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370653.1702154, 'message': 'Dec 7 01:50:52 hqnl0246134 sshd[275619]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0586 seconds
INFO [2022-12-07 01:50:53,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370653.170581, 'message': 'Dec 7 01:50:52 hqnl0246134 sshd[275615]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 01:50:55,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370655.1713347, 'message': 'Dec 7 01:50:54 hqnl0246134 sshd[275634]: Failed password for invalid user git from 165.227.166.207 port 59598 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0448 seconds
INFO [2022-12-07 01:50:55,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370655.1720235, 'message': 'Dec 7 01:50:54 hqnl0246134 sshd[275619]: Failed password for root from 61.177.173.36 port 23023 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0451 seconds
INFO [2022-12-07 01:50:55,218] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370655.1721382, 'message': 'Dec 7 01:50:55 hqnl0246134 sshd[275615]: Failed password for root from 61.177.172.108 port 25005 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-07 01:50:57,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370657.175392, 'message': 'Dec 7 01:50:55 hqnl0246134 sshd[275634]: Disconnected from invalid user git 165.227.166.207 port 59598 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-07 01:50:59,195] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370659.1770191, 'message': 'Dec 7 01:50:58 hqnl0246134 sshd[275637]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:50:59,212] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370659.1772723, 'message': 'Dec 7 01:50:58 hqnl0246134 sshd[275637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 01:51:01,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370661.179297, 'message': 'Dec 7 01:50:59 hqnl0246134 sshd[275639]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-07 01:51:01,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370661.1797378, 'message': 'Dec 7 01:51:00 hqnl0246134 sshd[275637]: Failed password for root from 61.177.173.36 port 54694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0380 seconds
INFO [2022-12-07 01:51:01,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370661.1795802, 'message': 'Dec 7 01:50:59 hqnl0246134 sshd[275639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-07 01:51:01,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370661.1798592, 'message': 'Dec 7 01:51:00 hqnl0246134 sshd[275637]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-07 01:51:03,225] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370663.1807535, 'message': 'Dec 7 01:51:01 hqnl0246134 sshd[275639]: Failed password for root from 61.177.172.108 port 61404 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0433 seconds
INFO [2022-12-07 01:51:03,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370663.1812692, 'message': 'Dec 7 01:51:02 hqnl0246134 sshd[275637]: Failed password for root from 61.177.173.36 port 54694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0445 seconds
INFO [2022-12-07 01:51:03,282] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370663.1811242, 'message': 'Dec 7 01:51:01 hqnl0246134 sshd[275639]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0566 seconds
INFO [2022-12-07 01:51:03,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370663.1814153, 'message': 'Dec 7 01:51:03 hqnl0246134 sshd[275637]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0555 seconds
INFO [2022-12-07 01:51:05,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370665.182012, 'message': 'Dec 7 01:51:03 hqnl0246134 sshd[275649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-07 01:51:05,216] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370665.1822712, 'message': 'Dec 7 01:51:03 hqnl0246134 sshd[275639]: Failed password for root from 61.177.172.108 port 61404 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-07 01:51:05,235] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370665.1824384, 'message': 'Dec 7 01:51:04 hqnl0246134 sshd[275639]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 01:51:07,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670370667.183853, 'message': 'Dec 7 01:51:05 hqnl0246134 sshd[275637]: Failed password for root from 61.177.173.36 port 54694 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0426 seconds
INFO [2022-12-07 01:51:07,227] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370667.1840446, 'message': 'Dec 7 01:51:05 hqnl0246134 sshd[275649]: Failed password for root from 61.177.173.18 port 11441 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0430 seconds
INFO [2022-12-07 01:51:07,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370667.184157, 'message': 'Dec 7 01:51:06 hqnl0246134 sshd[275639]: Failed password for root from 61.177.172.108 port 61404 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0428 seconds
INFO [2022-12-07 01:51:11,217] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370671.1919599, 'message': 'Dec 7 01:51:10 hqnl0246134 sshd[275649]: Failed password for root from 61.177.173.18 port 11441 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0250 seconds
WARNING [2022-12-07 01:51:11,721] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:51:11,749] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0362 seconds
INFO [2022-12-07 01:51:15,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370675.1999013, 'message': 'Dec 7 01:51:14 hqnl0246134 sshd[275649]: Failed password for root from 61.177.173.18 port 11441 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 01:51:17,882] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:51:17,883] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:51:17,899] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:51:17,918] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0340 seconds
INFO [2022-12-07 01:51:20,584] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:51:20,585] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:51:20,597] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:51:20,611] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0248 seconds
INFO [2022-12-07 01:51:40,134] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-07 01:51:40,136] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-07 01:51:41,006] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-07 01:51:43,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370703.2312613, 'message': 'Dec 7 01:51:42 hqnl0246134 sshd[275678]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-07 01:51:43,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370703.2316585, 'message': 'Dec 7 01:51:42 hqnl0246134 sshd[275678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 01:51:45,251] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370705.2322853, 'message': 'Dec 7 01:51:44 hqnl0246134 sshd[275678]: Failed password for root from 61.177.172.108 port 22274 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 01:51:47,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370707.2353609, 'message': 'Dec 7 01:51:46 hqnl0246134 sshd[275678]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-07 01:51:49,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370709.23765, 'message': 'Dec 7 01:51:48 hqnl0246134 sshd[275695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-07 01:51:49,273] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370709.2380135, 'message': 'Dec 7 01:51:48 hqnl0246134 sshd[275678]: Failed password for root from 61.177.172.108 port 22274 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-07 01:51:49,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370709.2381501, 'message': 'Dec 7 01:51:49 hqnl0246134 sshd[275678]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-07 01:51:50,384] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:51:50,385] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:51:51,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370711.2420022, 'message': 'Dec 7 01:51:49 hqnl0246134 sshd[275695]: Failed password for root from 61.177.173.18 port 23178 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 01:51:53,295] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370713.2481825, 'message': 'Dec 7 01:51:51 hqnl0246134 sshd[275678]: Failed password for root from 61.177.172.108 port 22274 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0457 seconds
INFO [2022-12-07 01:51:53,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.182.17.78', 'timestamp': 1670370713.2484632, 'message': 'Dec 7 01:51:52 hqnl0246134 sshd[275705]: Invalid user damian from 107.182.17.78 port 35950', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0461 seconds
INFO [2022-12-07 01:51:53,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370713.2489414, 'message': 'Dec 7 01:51:52 hqnl0246134 sshd[275695]: Failed password for root from 61.177.173.18 port 23178 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0457 seconds
INFO [2022-12-07 01:51:53,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '107.182.17.78', 'timestamp': 1670370713.2486072, 'message': 'Dec 7 01:51:52 hqnl0246134 sshd[275705]: pam_imunify(sshd:auth): [IM360_RBL] The IP 107.182.17.78 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:51:53,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '107.182.17.78', 'timestamp': 1670370713.2487347, 'message': 'Dec 7 01:51:52 hqnl0246134 sshd[275705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.17.78 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
WARNING [2022-12-07 01:51:54,119] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-07 01:51:55,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.182.17.78', 'timestamp': 1670370715.2504597, 'message': 'Dec 7 01:51:54 hqnl0246134 sshd[275705]: Failed password for invalid user damian from 107.182.17.78 port 35950 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 01:51:55,547] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 01:51:55,612] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 01:51:55,613] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 01:51:55,613] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 01:51:55,613] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 01:51:55,613] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 01:51:55,623] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 01:51:55,639] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0250 seconds
WARNING [2022-12-07 01:51:55,650] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 01:51:55,653] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:51:55,672] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0382 seconds
INFO [2022-12-07 01:51:55,673] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0365 seconds
INFO [2022-12-07 01:51:56,006] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:51:56,007] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:51:56,027] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:51:56,048] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0319 seconds
INFO [2022-12-07 01:51:57,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.182.17.78', 'timestamp': 1670370717.2536154, 'message': 'Dec 7 01:51:55 hqnl0246134 sshd[275705]: Disconnected from invalid user damian 107.182.17.78 port 35950 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-07 01:51:57,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370717.253892, 'message': 'Dec 7 01:51:56 hqnl0246134 sshd[275695]: Failed password for root from 61.177.173.18 port 23178 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
WARNING [2022-12-07 01:52:11,732] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:52:11,762] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0438 seconds
INFO [2022-12-07 01:52:17,318] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370737.2962856, 'message': 'Dec 7 01:52:16 hqnl0246134 sshd[275753]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 01:52:17,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370737.2965455, 'message': 'Dec 7 01:52:16 hqnl0246134 sshd[275753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 01:52:19,354] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370739.3019388, 'message': 'Dec 7 01:52:18 hqnl0246134 sshd[275753]: Failed password for root from 61.177.172.108 port 61921 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-07 01:52:19,834] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:52:19,834] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:52:19,841] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:52:19,852] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-07 01:52:21,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370741.300637, 'message': 'Dec 7 01:52:21 hqnl0246134 sshd[275753]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-07 01:52:22,361] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:52:22,361] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:52:22,369] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:52:22,381] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 01:52:23,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370743.303028, 'message': 'Dec 7 01:52:22 hqnl0246134 sshd[275753]: Failed password for root from 61.177.172.108 port 61921 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-07 01:52:25,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370745.305542, 'message': 'Dec 7 01:52:23 hqnl0246134 sshd[275753]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 01:52:25,747] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 01:52:25,748] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 01:52:25,748] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-07 01:52:27,331] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670370747.310981, 'message': 'Dec 7 01:52:25 hqnl0246134 sshd[275753]: Failed password for root from 61.177.172.108 port 61921 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 01:52:33,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370753.3186705, 'message': 'Dec 7 01:52:33 hqnl0246134 sshd[275775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-07 01:52:35,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370755.3221757, 'message': 'Dec 7 01:52:34 hqnl0246134 sshd[275775]: Failed password for root from 61.177.173.18 port 40241 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-07 01:52:35,351] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370755.322418, 'message': 'Dec 7 01:52:34 hqnl0246134 sshd[275777]: Invalid user server from 109.167.200.10 port 54102', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-07 01:52:35,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370755.3226187, 'message': 'Dec 7 01:52:34 hqnl0246134 sshd[275777]: pam_imunify(sshd:auth): [IM360_RBL] The IP 109.167.200.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 01:52:35,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370755.322753, 'message': 'Dec 7 01:52:34 hqnl0246134 sshd[275777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.200.10 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 01:52:37,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370757.3242714, 'message': 'Dec 7 01:52:36 hqnl0246134 sshd[275777]: Failed password for invalid user server from 109.167.200.10 port 54102 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-07 01:52:37,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370757.3253036, 'message': 'Dec 7 01:52:37 hqnl0246134 sshd[275775]: Failed password for root from 61.177.173.18 port 40241 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 01:52:37,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370757.3244805, 'message': 'Dec 7 01:52:36 hqnl0246134 sshd[275777]: Disconnected from invalid user server 109.167.200.10 port 54102 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 01:52:41,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370761.3294082, 'message': 'Dec 7 01:52:39 hqnl0246134 sshd[275775]: Failed password for root from 61.177.173.18 port 40241 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 01:52:43,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370763.3300798, 'message': 'Dec 7 01:52:42 hqnl0246134 sshd[275781]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.156.42.200 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-07 01:52:43,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370763.3304296, 'message': 'Dec 7 01:52:42 hqnl0246134 sshd[275783]: Invalid user xxaifwq from 165.227.166.207 port 41724', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-07 01:52:43,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370763.3302708, 'message': 'Dec 7 01:52:42 hqnl0246134 sshd[275781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.42.200 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-07 01:52:43,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370763.332994, 'message': 'Dec 7 01:52:42 hqnl0246134 sshd[275783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-07 01:52:45,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370765.334691, 'message': 'Dec 7 01:52:44 hqnl0246134 sshd[275781]: Failed password for root from 43.156.42.200 port 34566 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-07 01:52:45,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370765.335235, 'message': 'Dec 7 01:52:44 hqnl0246134 sshd[275783]: Failed password for invalid user xxaifwq from 165.227.166.207 port 41724 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-07 01:52:47,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370767.3372765, 'message': 'Dec 7 01:52:45 hqnl0246134 sshd[275783]: Disconnected from invalid user xxaifwq 165.227.166.207 port 41724 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0506 seconds
INFO [2022-12-07 01:52:47,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370767.3385577, 'message': 'Dec 7 01:52:47 hqnl0246134 sshd[275786]: Invalid user vikas from 143.110.185.60 port 34482', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0504 seconds
INFO [2022-12-07 01:52:47,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370767.3387613, 'message': 'Dec 7 01:52:47 hqnl0246134 sshd[275786]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.110.185.60 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 01:52:47,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370767.3389602, 'message': 'Dec 7 01:52:47 hqnl0246134 sshd[275786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.185.60 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
WARNING [2022-12-07 01:52:50,388] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:52:50,389] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:52:51,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370771.3426015, 'message': 'Dec 7 01:52:49 hqnl0246134 sshd[275786]: Failed password for invalid user vikas from 143.110.185.60 port 34482 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-07 01:52:51,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370771.3429344, 'message': 'Dec 7 01:52:50 hqnl0246134 sshd[275786]: Disconnected from invalid user vikas 143.110.185.60 port 34482 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
WARNING [2022-12-07 01:53:11,733] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:53:11,762] defence360agent.internals.the_sink: SensorIncidentList(<16 item(s)>) processed in 0.0383 seconds
INFO [2022-12-07 01:53:18,023] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:53:18,024] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:53:18,031] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:53:18,043] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 01:53:19,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370799.390352, 'message': 'Dec 7 01:53:18 hqnl0246134 sshd[275810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-07 01:53:20,683] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:53:20,684] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:53:20,692] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:53:20,704] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-07 01:53:21,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370801.395211, 'message': 'Dec 7 01:53:20 hqnl0246134 sshd[275810]: Failed password for root from 61.177.173.18 port 15007 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 01:53:23,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370803.400877, 'message': 'Dec 7 01:53:22 hqnl0246134 sshd[275810]: Failed password for root from 61.177.173.18 port 15007 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-07 01:53:27,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370807.4070044, 'message': 'Dec 7 01:53:24 hqnl0246134 sshd[275810]: Failed password for root from 61.177.173.18 port 15007 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-07 01:53:27,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370807.4072804, 'message': 'Dec 7 01:53:25 hqnl0246134 sshd[275828]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-07 01:53:27,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370807.4074633, 'message': 'Dec 7 01:53:25 hqnl0246134 sshd[275828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-07 01:53:29,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370809.4100657, 'message': 'Dec 7 01:53:27 hqnl0246134 sshd[275828]: Failed password for root from 61.177.173.46 port 10290 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 01:53:29,954] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:53:29,955] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:53:29,965] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:53:29,978] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-07 01:53:31,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370811.4123921, 'message': 'Dec 7 01:53:29 hqnl0246134 sshd[275828]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 01:53:33,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370813.414048, 'message': 'Dec 7 01:53:31 hqnl0246134 sshd[275828]: Failed password for root from 61.177.173.46 port 10290 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:53:35,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370815.416488, 'message': 'Dec 7 01:53:34 hqnl0246134 sshd[275828]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-07 01:53:37,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370817.4196334, 'message': 'Dec 7 01:53:35 hqnl0246134 sshd[275828]: Failed password for root from 61.177.173.46 port 10290 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-07 01:53:39,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370819.42225, 'message': 'Dec 7 01:53:38 hqnl0246134 sshd[275836]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 01:53:39,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370819.4225564, 'message': 'Dec 7 01:53:38 hqnl0246134 sshd[275836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 01:53:41,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370821.4252138, 'message': 'Dec 7 01:53:39 hqnl0246134 sshd[275836]: Failed password for root from 61.177.173.46 port 63485 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 01:53:41,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370821.4254, 'message': 'Dec 7 01:53:40 hqnl0246134 sshd[275836]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 01:53:43,451] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370823.4288464, 'message': 'Dec 7 01:53:42 hqnl0246134 sshd[275836]: Failed password for root from 61.177.173.46 port 63485 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-07 01:53:43,472] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370823.4291878, 'message': 'Dec 7 01:53:42 hqnl0246134 sshd[275836]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 01:53:45,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670370825.4296243, 'message': 'Dec 7 01:53:44 hqnl0246134 sshd[275836]: Failed password for root from 61.177.173.46 port 63485 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 01:53:47,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370827.4321294, 'message': 'Dec 7 01:53:46 hqnl0246134 sshd[275840]: pam_imunify(sshd:auth): [IM360_RBL] The IP 195.239.97.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 01:53:47,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370827.4323587, 'message': 'Dec 7 01:53:46 hqnl0246134 sshd[275840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.97.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 01:53:49,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '195.239.97.254', 'timestamp': 1670370829.4330356, 'message': 'Dec 7 01:53:48 hqnl0246134 sshd[275840]: Failed password for root from 195.239.97.254 port 52798 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
WARNING [2022-12-07 01:53:50,393] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:53:50,394] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:54:03,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370843.4513533, 'message': 'Dec 7 01:54:03 hqnl0246134 sshd[275861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 01:54:05,471] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370845.4523578, 'message': 'Dec 7 01:54:04 hqnl0246134 sshd[275861]: Failed password for root from 61.177.173.18 port 38514 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-07 01:54:11,738] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:54:11,760] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0297 seconds
INFO [2022-12-07 01:54:17,796] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:54:17,797] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:54:17,806] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:54:17,819] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
INFO [2022-12-07 01:54:20,587] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:54:20,587] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:54:20,596] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:54:20,609] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-07 01:54:39,546] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370879.511294, 'message': 'Dec 7 01:54:38 hqnl0246134 sshd[275892]: Invalid user lsfadmin from 165.227.166.207 port 51976', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-07 01:54:39,584] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370879.51177, 'message': 'Dec 7 01:54:38 hqnl0246134 sshd[275892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-07 01:54:41,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370881.517418, 'message': 'Dec 7 01:54:40 hqnl0246134 sshd[275892]: Failed password for invalid user lsfadmin from 165.227.166.207 port 51976 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 01:54:43,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370883.5177627, 'message': 'Dec 7 01:54:42 hqnl0246134 sshd[275892]: Disconnected from invalid user lsfadmin 165.227.166.207 port 51976 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-07 01:54:44,430] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:54:44,430] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:54:44,437] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:54:44,450] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-07 01:54:49,546] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370889.525903, 'message': 'Dec 7 01:54:48 hqnl0246134 sshd[275899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-07 01:54:50,396] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:54:50,397] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:54:51,550] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370891.5290046, 'message': 'Dec 7 01:54:50 hqnl0246134 sshd[275899]: Failed password for root from 61.177.173.18 port 49453 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
WARNING [2022-12-07 01:55:11,750] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:55:11,784] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0503 seconds
INFO [2022-12-07 01:55:13,585] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370913.5572503, 'message': 'Dec 7 01:55:12 hqnl0246134 sshd[275943]: Invalid user test7 from 109.167.200.10 port 42874', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-07 01:55:13,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370913.5584712, 'message': 'Dec 7 01:55:12 hqnl0246134 sshd[275943]: pam_imunify(sshd:auth): [IM360_RBL] The IP 109.167.200.10 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:55:13,624] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370913.558599, 'message': 'Dec 7 01:55:12 hqnl0246134 sshd[275943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.200.10 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 01:55:15,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370915.5583577, 'message': 'Dec 7 01:55:14 hqnl0246134 sshd[275943]: Failed password for invalid user test7 from 109.167.200.10 port 42874 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 01:55:17,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '109.167.200.10', 'timestamp': 1670370917.5609245, 'message': 'Dec 7 01:55:16 hqnl0246134 sshd[275943]: Disconnected from invalid user test7 109.167.200.10 port 42874 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 01:55:17,982] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:55:17,982] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:55:17,997] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:55:18,020] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0344 seconds
INFO [2022-12-07 01:55:20,620] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:55:20,621] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:55:20,629] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:55:20,642] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-07 01:55:35,615] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370935.5822957, 'message': 'Dec 7 01:55:35 hqnl0246134 sshd[275968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-07 01:55:37,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370937.5837274, 'message': 'Dec 7 01:55:37 hqnl0246134 sshd[275968]: Failed password for root from 61.177.173.18 port 17675 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 01:55:45,620] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370945.5974932, 'message': 'Dec 7 01:55:44 hqnl0246134 sshd[275971]: Invalid user vikas from 43.156.42.200 port 53564', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-07 01:55:45,639] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370945.5977702, 'message': 'Dec 7 01:55:44 hqnl0246134 sshd[275971]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.156.42.200 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 01:55:45,657] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370945.598003, 'message': 'Dec 7 01:55:44 hqnl0246134 sshd[275971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.42.200 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 01:55:47,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370947.5995438, 'message': 'Dec 7 01:55:46 hqnl0246134 sshd[275971]: Failed password for invalid user vikas from 43.156.42.200 port 53564 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-07 01:55:49,623] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.156.42.200', 'timestamp': 1670370949.6038716, 'message': 'Dec 7 01:55:48 hqnl0246134 sshd[275971]: Disconnected from invalid user vikas 43.156.42.200 port 53564 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-07 01:55:50,401] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:55:50,402] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:55:55,632] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370955.6116767, 'message': 'Dec 7 01:55:53 hqnl0246134 sshd[275983]: Invalid user centor from 143.110.185.60 port 46428', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 01:55:55,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370955.6120002, 'message': 'Dec 7 01:55:53 hqnl0246134 sshd[275983]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.110.185.60 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 01:55:55,667] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370955.612135, 'message': 'Dec 7 01:55:53 hqnl0246134 sshd[275983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.185.60 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 01:55:57,649] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370957.6161377, 'message': 'Dec 7 01:55:55 hqnl0246134 sshd[275983]: Failed password for invalid user centor from 143.110.185.60 port 46428 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-07 01:55:57,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '107.182.17.78', 'timestamp': 1670370957.6164968, 'message': 'Dec 7 01:55:56 hqnl0246134 sshd[275985]: pam_imunify(sshd:auth): [IM360_RBL] The IP 107.182.17.78 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-07 01:55:57,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.185.60', 'timestamp': 1670370957.6163507, 'message': 'Dec 7 01:55:56 hqnl0246134 sshd[275983]: Disconnected from invalid user centor 143.110.185.60 port 46428 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 01:55:57,681] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '107.182.17.78', 'timestamp': 1670370957.616618, 'message': 'Dec 7 01:55:56 hqnl0246134 sshd[275985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.17.78 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 01:55:59,651] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '107.182.17.78', 'timestamp': 1670370959.6188416, 'message': 'Dec 7 01:55:58 hqnl0246134 sshd[275985]: Failed password for root from 107.182.17.78 port 53948 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0309 seconds
WARNING [2022-12-07 01:56:11,745] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:56:11,770] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0335 seconds
INFO [2022-12-07 01:56:17,698] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:56:17,699] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:56:17,707] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:56:17,718] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-07 01:56:20,211] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:56:20,211] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:56:20,285] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:56:20,299] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0863 seconds
INFO [2022-12-07 01:56:23,685] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370983.6479118, 'message': 'Dec 7 01:56:22 hqnl0246134 sshd[276016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0364 seconds
INFO [2022-12-07 01:56:25,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370985.6503823, 'message': 'Dec 7 01:56:23 hqnl0246134 sshd[276016]: Failed password for root from 61.177.173.18 port 35998 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-07 01:56:25,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670370985.650631, 'message': 'Dec 7 01:56:23 hqnl0246134 sshd[276018]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-07 01:56:25,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670370985.6507657, 'message': 'Dec 7 01:56:23 hqnl0246134 sshd[276018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 01:56:27,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670370987.655919, 'message': 'Dec 7 01:56:26 hqnl0246134 sshd[276018]: Failed password for root from 61.177.173.52 port 63203 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0275 seconds
INFO [2022-12-07 01:56:27,684] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370987.6562233, 'message': 'Dec 7 01:56:26 hqnl0246134 sshd[276016]: Failed password for root from 61.177.173.18 port 35998 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-07 01:56:29,677] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670370989.6593163, 'message': 'Dec 7 01:56:28 hqnl0246134 sshd[276018]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:56:29,695] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670370989.6595173, 'message': 'Dec 7 01:56:29 hqnl0246134 sshd[276018]: Failed password for root from 61.177.173.52 port 63203 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 01:56:31,693] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670370991.6624935, 'message': 'Dec 7 01:56:29 hqnl0246134 sshd[276016]: Failed password for root from 61.177.173.18 port 35998 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 01:56:31,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670370991.662671, 'message': 'Dec 7 01:56:30 hqnl0246134 sshd[276018]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 01:56:33,299] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:56:33,299] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:56:33,308] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:56:33,320] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-07 01:56:33,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670370993.6652637, 'message': 'Dec 7 01:56:33 hqnl0246134 sshd[276018]: Failed password for root from 61.177.173.52 port 63203 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:56:37,718] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370997.6839623, 'message': 'Dec 7 01:56:36 hqnl0246134 sshd[276028]: Invalid user git from 165.227.166.207 port 34034', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-07 01:56:37,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670370997.6846194, 'message': 'Dec 7 01:56:36 hqnl0246134 sshd[276026]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-07 01:56:37,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370997.684436, 'message': 'Dec 7 01:56:36 hqnl0246134 sshd[276028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0351 seconds
INFO [2022-12-07 01:56:37,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670370997.6847823, 'message': 'Dec 7 01:56:36 hqnl0246134 sshd[276026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-07 01:56:39,721] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670370999.6866791, 'message': 'Dec 7 01:56:38 hqnl0246134 sshd[276028]: Failed password for invalid user git from 165.227.166.207 port 34034 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-07 01:56:39,722] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670370999.6870463, 'message': 'Dec 7 01:56:39 hqnl0246134 sshd[276026]: Failed password for root from 61.177.173.52 port 56031 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-07 01:56:41,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371001.6932807, 'message': 'Dec 7 01:56:40 hqnl0246134 sshd[276028]: Disconnected from invalid user git 165.227.166.207 port 34034 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-07 01:56:41,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670371001.6935947, 'message': 'Dec 7 01:56:41 hqnl0246134 sshd[276026]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0444 seconds
INFO [2022-12-07 01:56:45,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670371005.7052214, 'message': 'Dec 7 01:56:43 hqnl0246134 sshd[276026]: Failed password for root from 61.177.173.52 port 56031 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-07 01:56:45,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670371005.7056751, 'message': 'Dec 7 01:56:45 hqnl0246134 sshd[276026]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-07 01:56:47,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '195.239.97.254', 'timestamp': 1670371007.7180817, 'message': 'Dec 7 01:56:47 hqnl0246134 sshd[276033]: Invalid user admin from 195.239.97.254 port 41618', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 01:56:47,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '195.239.97.254', 'timestamp': 1670371007.718437, 'message': 'Dec 7 01:56:47 hqnl0246134 sshd[276033]: pam_imunify(sshd:auth): [IM360_RBL] The IP 195.239.97.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 01:56:47,780] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '195.239.97.254', 'timestamp': 1670371007.718615, 'message': 'Dec 7 01:56:47 hqnl0246134 sshd[276033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.97.254 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-07 01:56:49,749] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670371009.7199414, 'message': 'Dec 7 01:56:48 hqnl0246134 sshd[276026]: Failed password for root from 61.177.173.52 port 56031 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-07 01:56:49,750] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '195.239.97.254', 'timestamp': 1670371009.7202218, 'message': 'Dec 7 01:56:49 hqnl0246134 sshd[276033]: Failed password for invalid user admin from 195.239.97.254 port 41618 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
WARNING [2022-12-07 01:56:50,404] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:56:50,405] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:56:51,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '195.239.97.254', 'timestamp': 1670371011.723213, 'message': 'Dec 7 01:56:51 hqnl0246134 sshd[276033]: Disconnected from invalid user admin 195.239.97.254 port 41618 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-07 01:56:51,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670371011.7236562, 'message': 'Dec 7 01:56:51 hqnl0246134 sshd[276035]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-07 01:56:51,779] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670371011.7238424, 'message': 'Dec 7 01:56:51 hqnl0246134 sshd[276035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 01:56:53,747] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670371013.727033, 'message': 'Dec 7 01:56:52 hqnl0246134 sshd[276035]: Failed password for root from 61.177.173.52 port 43227 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 01:56:55,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670371015.7302601, 'message': 'Dec 7 01:56:53 hqnl0246134 sshd[276035]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-07 01:56:57,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670371017.733061, 'message': 'Dec 7 01:56:56 hqnl0246134 sshd[276035]: Failed password for root from 61.177.173.52 port 43227 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-07 01:56:59,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670371019.735986, 'message': 'Dec 7 01:56:58 hqnl0246134 sshd[276035]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-07 01:57:01,770] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670371021.7380345, 'message': 'Dec 7 01:57:00 hqnl0246134 sshd[276035]: Failed password for root from 61.177.173.52 port 43227 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-07 01:57:07,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371027.7469857, 'message': 'Dec 7 01:57:07 hqnl0246134 sshd[276065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0238 seconds
WARNING [2022-12-07 01:57:11,749] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:57:11,783] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0425 seconds
INFO [2022-12-07 01:57:11,791] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371031.7518346, 'message': 'Dec 7 01:57:09 hqnl0246134 sshd[276065]: Failed password for root from 61.177.173.18 port 51179 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0395 seconds
INFO [2022-12-07 01:57:17,828] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:57:17,828] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:57:17,839] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:57:17,857] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0275 seconds
INFO [2022-12-07 01:57:20,612] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:57:20,613] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:57:20,624] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:57:20,637] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0235 seconds
WARNING [2022-12-07 01:57:50,411] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:57:50,412] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:57:55,862] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371075.8375812, 'message': 'Dec 7 01:57:53 hqnl0246134 sshd[276102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-07 01:57:57,860] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371077.8401752, 'message': 'Dec 7 01:57:55 hqnl0246134 sshd[276102]: Failed password for root from 61.177.173.18 port 20039 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 01:58:01,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371081.843334, 'message': 'Dec 7 01:58:00 hqnl0246134 sshd[276102]: Failed password for root from 61.177.173.18 port 20039 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-07 01:58:03,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371083.8458564, 'message': 'Dec 7 01:58:02 hqnl0246134 sshd[276102]: Failed password for root from 61.177.173.18 port 20039 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:58:05,275] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:58:05,276] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:58:05,285] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:58:05,296] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
WARNING [2022-12-07 01:58:11,755] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:58:11,777] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0295 seconds
INFO [2022-12-07 01:58:14,283] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 01:58:14,354] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 01:58:14,355] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 01:58:14,355] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 01:58:14,355] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 01:58:14,356] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 01:58:14,369] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 01:58:14,386] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0299 seconds
WARNING [2022-12-07 01:58:14,392] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 01:58:14,395] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:58:14,411] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0303 seconds
INFO [2022-12-07 01:58:14,412] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0283 seconds
INFO [2022-12-07 01:58:18,022] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:58:18,022] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:58:18,030] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:58:18,042] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-07 01:58:20,860] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:58:20,860] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:58:20,870] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:58:20,882] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0209 seconds
INFO [2022-12-07 01:58:29,920] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.185.60', 'timestamp': 1670371109.8950028, 'message': 'Dec 7 01:58:28 hqnl0246134 sshd[276145]: Invalid user cyrus from 143.110.185.60 port 58366', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-07 01:58:29,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '143.110.185.60', 'timestamp': 1670371109.895241, 'message': 'Dec 7 01:58:28 hqnl0246134 sshd[276145]: pam_imunify(sshd:auth): [IM360_RBL] The IP 143.110.185.60 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 01:58:29,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '143.110.185.60', 'timestamp': 1670371109.8953896, 'message': 'Dec 7 01:58:28 hqnl0246134 sshd[276145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.185.60 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 01:58:31,916] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.185.60', 'timestamp': 1670371111.8976657, 'message': 'Dec 7 01:58:30 hqnl0246134 sshd[276145]: Failed password for invalid user cyrus from 143.110.185.60 port 58366 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 01:58:33,927] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '143.110.185.60', 'timestamp': 1670371113.898329, 'message': 'Dec 7 01:58:32 hqnl0246134 sshd[276145]: Disconnected from invalid user cyrus 143.110.185.60 port 58366 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-07 01:58:33,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371113.8985229, 'message': 'Dec 7 01:58:32 hqnl0246134 sshd[276147]: Invalid user gitlab from 165.227.166.207 port 44328', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-07 01:58:33,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371113.8986592, 'message': 'Dec 7 01:58:32 hqnl0246134 sshd[276147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 01:58:35,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371115.9017057, 'message': 'Dec 7 01:58:34 hqnl0246134 sshd[276147]: Failed password for invalid user gitlab from 165.227.166.207 port 44328 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-07 01:58:35,932] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.156.42.200', 'timestamp': 1670371115.9019237, 'message': 'Dec 7 01:58:35 hqnl0246134 sshd[276149]: Invalid user cyrus from 43.156.42.200 port 58216', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0294 seconds
INFO [2022-12-07 01:58:35,962] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371115.902278, 'message': 'Dec 7 01:58:35 hqnl0246134 sshd[276147]: Disconnected from invalid user gitlab 165.227.166.207 port 44328 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-07 01:58:35,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.156.42.200', 'timestamp': 1670371115.9020712, 'message': 'Dec 7 01:58:35 hqnl0246134 sshd[276149]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.156.42.200 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 01:58:35,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.156.42.200', 'timestamp': 1670371115.902176, 'message': 'Dec 7 01:58:35 hqnl0246134 sshd[276149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.42.200 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 01:58:37,934] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.156.42.200', 'timestamp': 1670371117.9025848, 'message': 'Dec 7 01:58:36 hqnl0246134 sshd[276149]: Failed password for invalid user cyrus from 43.156.42.200 port 58216 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-07 01:58:37,958] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '43.156.42.200', 'timestamp': 1670371117.9029005, 'message': 'Dec 7 01:58:37 hqnl0246134 sshd[276149]: Disconnected from invalid user cyrus 43.156.42.200 port 58216 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-07 01:58:41,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371121.908361, 'message': 'Dec 7 01:58:40 hqnl0246134 sshd[276154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 01:58:43,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371123.9104793, 'message': 'Dec 7 01:58:42 hqnl0246134 sshd[276154]: Failed password for root from 61.177.173.18 port 47930 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 01:58:44,481] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 01:58:44,481] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 01:58:44,482] im360.plugins.client360: Waiting 3 minutes before retry...
WARNING [2022-12-07 01:58:50,417] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:58:50,418] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 01:59:11,769] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:59:11,800] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0435 seconds
INFO [2022-12-07 01:59:17,830] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:59:17,830] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:59:17,839] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:59:17,852] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-07 01:59:20,537] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:59:20,537] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:59:20,544] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:59:20,555] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-07 01:59:26,019] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371165.9850783, 'message': 'Dec 7 01:59:24 hqnl0246134 sshd[276195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-07 01:59:28,021] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371167.9861186, 'message': 'Dec 7 01:59:26 hqnl0246134 sshd[276195]: Failed password for root from 61.177.173.18 port 58463 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-07 01:59:32,009] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371171.9924304, 'message': 'Dec 7 01:59:30 hqnl0246134 sshd[276195]: Failed password for root from 61.177.173.18 port 58463 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 01:59:34,017] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371173.997335, 'message': 'Dec 7 01:59:32 hqnl0246134 sshd[276195]: Failed password for root from 61.177.173.18 port 58463 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 01:59:35,865] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 01:59:35,866] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 01:59:35,877] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 01:59:35,897] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0308 seconds
INFO [2022-12-07 01:59:37,628] defence360agent.files: Updating all files
INFO [2022-12-07 01:59:37,967] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-07 01:59:37,968] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-07 01:59:38,250] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-07 01:59:38,251] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-07 01:59:38,513] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-07 01:59:38,514] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-07 01:59:38,788] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-07 01:59:38,788] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-07 01:59:38,789] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-07 01:59:39,050] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Tue, 06 Dec 2022 23:59:39 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'REPLICA'), ('X-Amz-Request-Id', '172E59BCC073D821'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-07 01:59:39,052] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-07 01:59:39,052] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-07 01:59:39,611] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-07 01:59:39,612] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-07 01:59:39,934] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-07 01:59:39,935] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-07 01:59:40,196] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-07 01:59:40,196] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-07 01:59:40,534] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-07 01:59:40,534] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-07 01:59:40,913] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-07 01:59:40,914] defence360agent.files: geo files update finished (not updated)
WARNING [2022-12-07 01:59:50,420] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 01:59:50,421] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 01:59:54,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371194.0304947, 'message': 'Dec 7 01:59:53 hqnl0246134 sshd[276218]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 01:59:54,071] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371194.0309227, 'message': 'Dec 7 01:59:53 hqnl0246134 sshd[276218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 01:59:56,068] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.182.17.78', 'timestamp': 1670371196.034492, 'message': 'Dec 7 01:59:54 hqnl0246134 sshd[276216]: Invalid user ts3 from 107.182.17.78 port 43718', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-07 01:59:56,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371196.035047, 'message': 'Dec 7 01:59:55 hqnl0246134 sshd[276218]: Failed password for root from 61.177.173.36 port 28842 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-07 01:59:56,088] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '107.182.17.78', 'timestamp': 1670371196.0347483, 'message': 'Dec 7 01:59:54 hqnl0246134 sshd[276216]: pam_imunify(sshd:auth): [IM360_RBL] The IP 107.182.17.78 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 01:59:56,110] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '107.182.17.78', 'timestamp': 1670371196.034918, 'message': 'Dec 7 01:59:54 hqnl0246134 sshd[276216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.17.78 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-07 01:59:58,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.182.17.78', 'timestamp': 1670371198.0364466, 'message': 'Dec 7 01:59:56 hqnl0246134 sshd[276216]: Failed password for invalid user ts3 from 107.182.17.78 port 43718 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 01:59:58,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371198.0366247, 'message': 'Dec 7 01:59:57 hqnl0246134 sshd[276218]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-07 02:00:00,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '107.182.17.78', 'timestamp': 1670371200.0538657, 'message': 'Dec 7 01:59:58 hqnl0246134 sshd[276216]: Disconnected from invalid user ts3 107.182.17.78 port 43718 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 02:00:00,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371200.0541265, 'message': 'Dec 7 01:59:59 hqnl0246134 sshd[276218]: Failed password for root from 61.177.173.36 port 28842 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-07 02:00:02,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371202.04345, 'message': 'Dec 7 02:00:00 hqnl0246134 sshd[276218]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1108 seconds
INFO [2022-12-07 02:00:02,231] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371202.0437722, 'message': 'Dec 7 02:00:01 hqnl0246134 sshd[276218]: Failed password for root from 61.177.173.36 port 28842 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0750 seconds
INFO [2022-12-07 02:00:06,084] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371206.0533047, 'message': 'Dec 7 02:00:04 hqnl0246134 sshd[276258]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 02:00:06,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371206.0537403, 'message': 'Dec 7 02:00:04 hqnl0246134 sshd[276258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 02:00:08,091] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371208.0574942, 'message': 'Dec 7 02:00:06 hqnl0246134 sshd[276258]: Failed password for root from 61.177.173.36 port 10746 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-07 02:00:08,123] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371208.057915, 'message': 'Dec 7 02:00:06 hqnl0246134 sshd[276258]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 02:00:10,119] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371210.0604413, 'message': 'Dec 7 02:00:08 hqnl0246134 sshd[276258]: Failed password for root from 61.177.173.36 port 10746 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0576 seconds
INFO [2022-12-07 02:00:10,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371210.061079, 'message': 'Dec 7 02:00:10 hqnl0246134 sshd[276264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0587 seconds
INFO [2022-12-07 02:00:10,154] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371210.0608122, 'message': 'Dec 7 02:00:08 hqnl0246134 sshd[276258]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0341 seconds
WARNING [2022-12-07 02:00:11,781] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:00:11,828] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0660 seconds
INFO [2022-12-07 02:00:12,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371212.0643857, 'message': 'Dec 7 02:00:10 hqnl0246134 sshd[276258]: Failed password for root from 61.177.173.36 port 10746 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-07 02:00:12,094] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371212.0646186, 'message': 'Dec 7 02:00:11 hqnl0246134 sshd[276264]: Failed password for root from 61.177.173.18 port 26189 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 02:00:14,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371214.0676794, 'message': 'Dec 7 02:00:12 hqnl0246134 sshd[276266]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0207 seconds
INFO [2022-12-07 02:00:14,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371214.067963, 'message': 'Dec 7 02:00:12 hqnl0246134 sshd[276266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 02:00:16,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371216.0705755, 'message': 'Dec 7 02:00:14 hqnl0246134 sshd[276264]: Failed password for root from 61.177.173.18 port 26189 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-07 02:00:16,105] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371216.0708234, 'message': 'Dec 7 02:00:14 hqnl0246134 sshd[276266]: Failed password for root from 61.177.173.36 port 29859 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-07 02:00:16,132] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371216.0709996, 'message': 'Dec 7 02:00:14 hqnl0246134 sshd[276266]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 02:00:17,991] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:00:17,991] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:00:17,999] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:00:18,010] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-07 02:00:18,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371218.0729194, 'message': 'Dec 7 02:00:16 hqnl0246134 sshd[276264]: Failed password for root from 61.177.173.18 port 26189 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0273 seconds
INFO [2022-12-07 02:00:18,101] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371218.0730994, 'message': 'Dec 7 02:00:16 hqnl0246134 sshd[276266]: Failed password for root from 61.177.173.36 port 29859 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-07 02:00:18,118] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371218.073211, 'message': 'Dec 7 02:00:17 hqnl0246134 sshd[276266]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 02:00:20,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371220.074012, 'message': 'Dec 7 02:00:19 hqnl0246134 sshd[276266]: Failed password for root from 61.177.173.36 port 29859 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 02:00:20,670] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:00:20,670] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:00:20,678] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:00:20,689] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 02:00:34,126] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371234.1044054, 'message': 'Dec 7 02:00:33 hqnl0246134 sshd[276317]: Invalid user gpadmin from 165.227.166.207 port 54624', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-07 02:00:34,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371234.1047318, 'message': 'Dec 7 02:00:33 hqnl0246134 sshd[276317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-07 02:00:36,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371236.105813, 'message': 'Dec 7 02:00:35 hqnl0246134 sshd[276317]: Failed password for invalid user gpadmin from 165.227.166.207 port 54624 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0432 seconds
INFO [2022-12-07 02:00:36,224] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371236.10601, 'message': 'Dec 7 02:00:36 hqnl0246134 sshd[276317]: Disconnected from invalid user gpadmin 165.227.166.207 port 54624 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0743 seconds
INFO [2022-12-07 02:00:39,738] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:00:39,738] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:00:39,750] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:00:39,767] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0270 seconds
WARNING [2022-12-07 02:00:50,425] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:00:50,426] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:00:58,178] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371258.1547964, 'message': 'Dec 7 02:00:56 hqnl0246134 sshd[276340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-07 02:01:00,181] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371260.159578, 'message': 'Dec 7 02:00:58 hqnl0246134 sshd[276340]: Failed password for root from 61.177.173.18 port 46528 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 02:01:04,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371264.1716497, 'message': 'Dec 7 02:01:02 hqnl0246134 sshd[276340]: Failed password for root from 61.177.173.18 port 46528 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 02:01:06,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371266.1747978, 'message': 'Dec 7 02:01:04 hqnl0246134 sshd[276340]: Failed password for root from 61.177.173.18 port 46528 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0351 seconds
WARNING [2022-12-07 02:01:11,777] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:01:11,813] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0469 seconds
INFO [2022-12-07 02:01:19,436] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:01:19,437] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:01:19,448] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:01:19,461] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0225 seconds
INFO [2022-12-07 02:01:22,151] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:01:22,151] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:01:22,176] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:01:22,196] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0324 seconds
INFO [2022-12-07 02:01:24,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371284.2127876, 'message': 'Dec 7 02:01:22 hqnl0246134 sshd[276361]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-07 02:01:24,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371284.2131019, 'message': 'Dec 7 02:01:22 hqnl0246134 sshd[276361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-07 02:01:24,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371284.2133138, 'message': 'Dec 7 02:01:23 hqnl0246134 sshd[276361]: Failed password for root from 61.177.173.50 port 20504 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:01:26,306] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371286.2792451, 'message': 'Dec 7 02:01:24 hqnl0246134 sshd[276361]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-07 02:01:28,237] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371288.2193542, 'message': 'Dec 7 02:01:26 hqnl0246134 sshd[276361]: Failed password for root from 61.177.173.50 port 20504 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 02:01:28,257] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371288.2195308, 'message': 'Dec 7 02:01:26 hqnl0246134 sshd[276361]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 02:01:30,243] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371290.2238197, 'message': 'Dec 7 02:01:29 hqnl0246134 sshd[276361]: Failed password for root from 61.177.173.50 port 20504 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 02:01:34,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371294.2294436, 'message': 'Dec 7 02:01:33 hqnl0246134 sshd[276375]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-07 02:01:34,294] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371294.2296684, 'message': 'Dec 7 02:01:33 hqnl0246134 sshd[276375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-07 02:01:36,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371296.2339635, 'message': 'Dec 7 02:01:35 hqnl0246134 sshd[276375]: Failed password for root from 61.177.173.50 port 48893 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 02:01:36,272] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371296.2341712, 'message': 'Dec 7 02:01:35 hqnl0246134 sshd[276375]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 02:01:38,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371298.238355, 'message': 'Dec 7 02:01:37 hqnl0246134 sshd[276375]: Failed password for root from 61.177.173.50 port 48893 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-07 02:01:38,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371298.2386038, 'message': 'Dec 7 02:01:37 hqnl0246134 sshd[276375]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 02:01:40,261] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371300.2417803, 'message': 'Dec 7 02:01:39 hqnl0246134 sshd[276378]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 02:01:40,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371300.2420642, 'message': 'Dec 7 02:01:39 hqnl0246134 sshd[276378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 02:01:42,275] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371302.2424536, 'message': 'Dec 7 02:01:40 hqnl0246134 sshd[276375]: Failed password for root from 61.177.173.50 port 48893 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-07 02:01:42,276] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371302.2426465, 'message': 'Dec 7 02:01:41 hqnl0246134 sshd[276378]: Failed password for root from 61.177.172.108 port 34610 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-07 02:01:42,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371302.2427597, 'message': 'Dec 7 02:01:41 hqnl0246134 sshd[276378]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-07 02:01:44,299] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371304.2450693, 'message': 'Dec 7 02:01:43 hqnl0246134 sshd[276380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0536 seconds
INFO [2022-12-07 02:01:44,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371304.245311, 'message': 'Dec 7 02:01:43 hqnl0246134 sshd[276378]: Failed password for root from 61.177.172.108 port 34610 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0541 seconds
INFO [2022-12-07 02:01:46,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371306.247113, 'message': 'Dec 7 02:01:45 hqnl0246134 sshd[276380]: Failed password for root from 61.177.173.18 port 64853 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-07 02:01:46,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371306.2473104, 'message': 'Dec 7 02:01:45 hqnl0246134 sshd[276378]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-07 02:01:48,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371308.2503552, 'message': 'Dec 7 02:01:47 hqnl0246134 sshd[276378]: Failed password for root from 61.177.172.108 port 34610 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:01:50,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371310.2533462, 'message': 'Dec 7 02:01:49 hqnl0246134 sshd[276380]: Failed password for root from 61.177.173.18 port 64853 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 02:01:50,288] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371310.2609315, 'message': 'Dec 7 02:01:49 hqnl0246134 sshd[276383]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 02:01:50,305] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371310.2610877, 'message': 'Dec 7 02:01:49 hqnl0246134 sshd[276383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-07 02:01:50,429] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:01:50,430] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:01:54,122] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-07 02:01:54,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371314.2581925, 'message': 'Dec 7 02:01:52 hqnl0246134 sshd[276383]: Failed password for root from 61.177.172.108 port 56669 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-07 02:01:54,292] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371314.2585561, 'message': 'Dec 7 02:01:53 hqnl0246134 sshd[276380]: Failed password for root from 61.177.173.18 port 64853 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-07 02:01:54,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371314.260927, 'message': 'Dec 7 02:01:54 hqnl0246134 sshd[276383]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:01:54,388] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 02:01:54,454] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 02:01:54,455] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 02:01:54,455] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 02:01:54,455] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 02:01:54,455] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 02:01:54,467] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 02:01:54,484] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0280 seconds
WARNING [2022-12-07 02:01:54,491] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 02:01:54,493] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:01:54,511] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0329 seconds
INFO [2022-12-07 02:01:54,512] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0311 seconds
INFO [2022-12-07 02:01:56,396] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371316.379392, 'message': 'Dec 7 02:01:56 hqnl0246134 sshd[276383]: Failed password for root from 61.177.172.108 port 56669 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 02:02:00,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371320.2668657, 'message': 'Dec 7 02:01:58 hqnl0246134 sshd[276383]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:02:02,287] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371322.26971, 'message': 'Dec 7 02:02:00 hqnl0246134 sshd[276383]: Failed password for root from 61.177.172.108 port 56669 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:02:04,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371324.2747416, 'message': 'Dec 7 02:02:02 hqnl0246134 sshd[276394]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 02:02:04,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371324.2751102, 'message': 'Dec 7 02:02:02 hqnl0246134 sshd[276394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 02:02:06,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371326.2778153, 'message': 'Dec 7 02:02:04 hqnl0246134 sshd[276394]: Failed password for root from 61.177.172.108 port 40763 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-07 02:02:08,302] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371328.2819254, 'message': 'Dec 7 02:02:06 hqnl0246134 sshd[276394]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:02:10,307] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371330.2855418, 'message': 'Dec 7 02:02:08 hqnl0246134 sshd[276394]: Failed password for root from 61.177.172.108 port 40763 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
WARNING [2022-12-07 02:02:11,781] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:02:11,802] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0305 seconds
INFO [2022-12-07 02:02:12,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371332.2854633, 'message': 'Dec 7 02:02:11 hqnl0246134 sshd[276394]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:02:14,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371334.287952, 'message': 'Dec 7 02:02:13 hqnl0246134 sshd[276394]: Failed password for root from 61.177.172.108 port 40763 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-07 02:02:18,067] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:02:18,068] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:02:18,075] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:02:18,087] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-07 02:02:18,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371338.292712, 'message': 'Dec 7 02:02:17 hqnl0246134 sshd[276423]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 02:02:18,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371338.2930555, 'message': 'Dec 7 02:02:17 hqnl0246134 sshd[276423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 02:02:19,080] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:02:19,081] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:02:19,088] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:02:19,100] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-07 02:02:20,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371340.2985914, 'message': 'Dec 7 02:02:19 hqnl0246134 sshd[276423]: Failed password for root from 61.177.172.108 port 29169 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:02:20,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371340.2989476, 'message': 'Dec 7 02:02:19 hqnl0246134 sshd[276423]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:02:22,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371342.3014407, 'message': 'Dec 7 02:02:21 hqnl0246134 sshd[276423]: Failed password for root from 61.177.172.108 port 29169 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-07 02:02:23,739] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:02:23,740] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:02:23,749] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:02:23,762] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-07 02:02:24,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.255.168.152', 'timestamp': 1670371344.3064523, 'message': 'Dec 7 02:02:22 hqnl0246134 sshd[276442]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.255.168.152 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-07 02:02:24,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371344.3068533, 'message': 'Dec 7 02:02:23 hqnl0246134 sshd[276423]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0358 seconds
INFO [2022-12-07 02:02:24,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.255.168.152', 'timestamp': 1670371344.306638, 'message': 'Dec 7 02:02:22 hqnl0246134 sshd[276442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.152 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 02:02:24,582] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 02:02:24,582] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 02:02:24,583] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-07 02:02:26,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.255.168.152', 'timestamp': 1670371346.3087304, 'message': 'Dec 7 02:02:24 hqnl0246134 sshd[276442]: Failed password for root from 51.255.168.152 port 52500 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1281 seconds
INFO [2022-12-07 02:02:26,438] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670371346.3089962, 'message': 'Dec 7 02:02:26 hqnl0246134 sshd[276423]: Failed password for root from 61.177.172.108 port 29169 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1283 seconds
INFO [2022-12-07 02:02:30,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371350.315054, 'message': 'Dec 7 02:02:28 hqnl0246134 sshd[276447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 02:02:32,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371352.3181508, 'message': 'Dec 7 02:02:30 hqnl0246134 sshd[276447]: Failed password for root from 61.177.173.18 port 15317 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 02:02:38,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371358.326789, 'message': 'Dec 7 02:02:35 hqnl0246134 sshd[276447]: Failed password for root from 61.177.173.18 port 15317 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-07 02:02:38,363] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371358.3270068, 'message': 'Dec 7 02:02:37 hqnl0246134 sshd[276450]: Invalid user gpadmin from 165.227.166.207 port 36678', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0359 seconds
INFO [2022-12-07 02:02:38,384] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371358.3271322, 'message': 'Dec 7 02:02:37 hqnl0246134 sshd[276450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 02:02:40,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371360.3299785, 'message': 'Dec 7 02:02:39 hqnl0246134 sshd[276447]: Failed password for root from 61.177.173.18 port 15317 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 02:02:40,361] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371360.3301928, 'message': 'Dec 7 02:02:39 hqnl0246134 sshd[276450]: Failed password for invalid user gpadmin from 165.227.166.207 port 36678 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 02:02:40,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371360.3303177, 'message': 'Dec 7 02:02:40 hqnl0246134 sshd[276450]: Disconnected from invalid user gpadmin 165.227.166.207 port 36678 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
WARNING [2022-12-07 02:02:50,433] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:02:50,433] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:03:11,786] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:03:11,816] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0379 seconds
INFO [2022-12-07 02:03:16,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371396.3702438, 'message': 'Dec 7 02:03:15 hqnl0246134 sshd[276479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-07 02:03:17,799] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:03:17,799] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:03:17,806] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:03:17,819] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 02:03:18,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371398.3730733, 'message': 'Dec 7 02:03:17 hqnl0246134 sshd[276479]: Failed password for root from 61.177.173.18 port 39396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-07 02:03:20,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371400.3733442, 'message': 'Dec 7 02:03:19 hqnl0246134 sshd[276479]: Failed password for root from 61.177.173.18 port 39396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 02:03:20,472] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:03:20,472] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:03:20,479] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:03:20,490] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-07 02:03:24,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371404.3782685, 'message': 'Dec 7 02:03:23 hqnl0246134 sshd[276479]: Failed password for root from 61.177.173.18 port 39396 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-07 02:03:29,225] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:03:29,225] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:03:29,234] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:03:29,245] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-07 02:03:42,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.110.134.13', 'timestamp': 1670371422.415797, 'message': 'Dec 7 02:03:41 hqnl0246134 sshd[276509]: Invalid user alvin from 194.110.134.13 port 58316', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-07 02:03:42,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.110.134.13', 'timestamp': 1670371422.4164274, 'message': 'Dec 7 02:03:42 hqnl0246134 sshd[276509]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.110.134.13 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 02:03:42,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.110.134.13', 'timestamp': 1670371422.4166384, 'message': 'Dec 7 02:03:42 hqnl0246134 sshd[276509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.134.13 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:03:44,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.110.134.13', 'timestamp': 1670371424.4158278, 'message': 'Dec 7 02:03:44 hqnl0246134 sshd[276509]: Failed password for invalid user alvin from 194.110.134.13 port 58316 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-07 02:03:46,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.110.134.13', 'timestamp': 1670371426.4194276, 'message': 'Dec 7 02:03:44 hqnl0246134 sshd[276509]: Disconnected from invalid user alvin 194.110.134.13 port 58316 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0325 seconds
WARNING [2022-12-07 02:03:50,436] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:03:50,437] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:04:02,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371442.458252, 'message': 'Dec 7 02:04:01 hqnl0246134 sshd[276525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-07 02:04:04,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371444.4631698, 'message': 'Dec 7 02:04:03 hqnl0246134 sshd[276525]: Failed password for root from 61.177.173.18 port 55359 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0195 seconds
WARNING [2022-12-07 02:04:11,789] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:04:11,818] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0367 seconds
INFO [2022-12-07 02:04:18,171] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:04:18,172] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:04:18,181] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:04:18,193] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0202 seconds
INFO [2022-12-07 02:04:20,502] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.107.61.88', 'timestamp': 1670371460.4811172, 'message': 'Dec 7 02:04:18 hqnl0246134 sshd[276567]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.107.61.88 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 02:04:20,520] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.107.61.88', 'timestamp': 1670371460.4814122, 'message': 'Dec 7 02:04:18 hqnl0246134 sshd[276567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.107.61.88 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0171 seconds
INFO [2022-12-07 02:04:20,941] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:04:20,942] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:04:20,950] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:04:20,961] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 02:04:22,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.107.61.88', 'timestamp': 1670371462.4822853, 'message': 'Dec 7 02:04:21 hqnl0246134 sshd[276567]: Failed password for root from 20.107.61.88 port 44770 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 02:04:44,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371484.5397801, 'message': 'Dec 7 02:04:43 hqnl0246134 sshd[276593]: Invalid user guojing from 165.227.166.207 port 46968', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-07 02:04:44,594] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371484.5404603, 'message': 'Dec 7 02:04:43 hqnl0246134 sshd[276593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0255 seconds
INFO [2022-12-07 02:04:46,568] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371486.548795, 'message': 'Dec 7 02:04:45 hqnl0246134 sshd[276593]: Failed password for invalid user guojing from 165.227.166.207 port 46968 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 02:04:48,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371488.5572314, 'message': 'Dec 7 02:04:47 hqnl0246134 sshd[276593]: Disconnected from invalid user guojing 165.227.166.207 port 46968 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0730 seconds
INFO [2022-12-07 02:04:48,632] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371488.557559, 'message': 'Dec 7 02:04:47 hqnl0246134 sshd[276595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0735 seconds
INFO [2022-12-07 02:04:50,064] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:04:50,065] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:04:50,073] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:04:50,084] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
WARNING [2022-12-07 02:04:50,446] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:04:50,447] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:04:50,590] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371490.5596697, 'message': 'Dec 7 02:04:49 hqnl0246134 sshd[276595]: Failed password for root from 61.177.173.18 port 22911 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 02:04:52,587] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371492.5622132, 'message': 'Dec 7 02:04:51 hqnl0246134 sshd[276595]: Failed password for root from 61.177.173.18 port 22911 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0248 seconds
INFO [2022-12-07 02:04:56,604] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.19.166', 'timestamp': 1670371496.573286, 'message': 'Dec 7 02:04:56 hqnl0246134 sshd[276613]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.19.166 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-07 02:04:56,605] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371496.5736365, 'message': 'Dec 7 02:04:56 hqnl0246134 sshd[276595]: Failed password for root from 61.177.173.18 port 22911 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-07 02:04:56,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.19.166', 'timestamp': 1670371496.5735009, 'message': 'Dec 7 02:04:56 hqnl0246134 sshd[276613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.19.166 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 02:04:58,600] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.197.19.166', 'timestamp': 1670371498.5755072, 'message': 'Dec 7 02:04:58 hqnl0246134 sshd[276613]: Failed password for root from 138.197.19.166 port 45734 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
WARNING [2022-12-07 02:05:11,795] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:05:11,818] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0312 seconds
INFO [2022-12-07 02:05:17,965] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:05:17,966] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:05:17,974] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:05:17,986] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-07 02:05:20,887] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:05:20,888] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:05:20,895] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:05:20,906] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-07 02:05:22,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.153.40', 'timestamp': 1670371522.602673, 'message': 'Dec 7 02:05:21 hqnl0246134 sshd[276659]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.153.40 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-07 02:05:22,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.153.40', 'timestamp': 1670371522.6030629, 'message': 'Dec 7 02:05:21 hqnl0246134 sshd[276659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.153.40 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:05:24,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.89.8.45', 'timestamp': 1670371524.6047535, 'message': 'Dec 7 02:05:23 hqnl0246134 sshd[276672]: Invalid user nova from 159.89.8.45 port 56760', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-07 02:05:24,640] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '137.184.153.40', 'timestamp': 1670371524.6052675, 'message': 'Dec 7 02:05:23 hqnl0246134 sshd[276659]: Failed password for root from 137.184.153.40 port 36892 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-07 02:05:24,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.89.8.45', 'timestamp': 1670371524.6050076, 'message': 'Dec 7 02:05:23 hqnl0246134 sshd[276672]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.89.8.45 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-07 02:05:24,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.89.8.45', 'timestamp': 1670371524.6051457, 'message': 'Dec 7 02:05:23 hqnl0246134 sshd[276672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.8.45 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 02:05:26,625] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.89.8.45', 'timestamp': 1670371526.605896, 'message': 'Dec 7 02:05:24 hqnl0246134 sshd[276672]: Failed password for invalid user nova from 159.89.8.45 port 56760 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 02:05:26,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.89.8.45', 'timestamp': 1670371526.6066897, 'message': 'Dec 7 02:05:26 hqnl0246134 sshd[276672]: Disconnected from invalid user nova 159.89.8.45 port 56760 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:05:32,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371532.612787, 'message': 'Dec 7 02:05:32 hqnl0246134 sshd[276674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 02:05:34,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371534.6137483, 'message': 'Dec 7 02:05:34 hqnl0246134 sshd[276674]: Failed password for root from 61.177.173.18 port 36386 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-07 02:05:45,782] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 02:05:45,864] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 02:05:45,865] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 02:05:45,865] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 02:05:45,865] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 02:05:45,865] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 02:05:45,877] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 02:05:45,902] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0353 seconds
WARNING [2022-12-07 02:05:45,915] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 02:05:45,919] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:05:45,953] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0620 seconds
INFO [2022-12-07 02:05:45,956] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0583 seconds
WARNING [2022-12-07 02:05:50,450] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:05:50,451] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:06:11,799] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:06:11,841] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0504 seconds
INFO [2022-12-07 02:06:17,806] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:06:17,807] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:06:17,821] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:06:17,835] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0268 seconds
INFO [2022-12-07 02:06:18,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371578.6589732, 'message': 'Dec 7 02:06:17 hqnl0246134 sshd[276701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 02:06:20,443] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:06:20,444] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:06:20,450] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:06:20,463] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-07 02:06:20,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371580.6606362, 'message': 'Dec 7 02:06:19 hqnl0246134 sshd[276701]: Failed password for root from 61.177.173.18 port 59983 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0220 seconds
INFO [2022-12-07 02:06:22,783] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371582.6822686, 'message': 'Dec 7 02:06:22 hqnl0246134 sshd[276701]: Failed password for root from 61.177.173.18 port 59983 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0999 seconds
INFO [2022-12-07 02:06:24,699] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371584.6654668, 'message': 'Dec 7 02:06:24 hqnl0246134 sshd[276701]: Failed password for root from 61.177.173.18 port 59983 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-07 02:06:25,746] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 02:06:25,747] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 02:06:25,749] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-07 02:06:29,157] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:06:29,157] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:06:29,165] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:06:29,176] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
WARNING [2022-12-07 02:06:50,457] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:06:50,459] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:06:52,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371612.7105756, 'message': 'Dec 7 02:06:51 hqnl0246134 sshd[276735]: Invalid user hadoop from 165.227.166.207 port 57254', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 02:06:52,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371612.7113292, 'message': 'Dec 7 02:06:51 hqnl0246134 sshd[276735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 02:06:54,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371614.7182534, 'message': 'Dec 7 02:06:52 hqnl0246134 sshd[276735]: Failed password for invalid user hadoop from 165.227.166.207 port 57254 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-07 02:06:54,763] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371614.7186167, 'message': 'Dec 7 02:06:53 hqnl0246134 sshd[276735]: Disconnected from invalid user hadoop 165.227.166.207 port 57254 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 02:07:04,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371624.7420425, 'message': 'Dec 7 02:07:03 hqnl0246134 sshd[276747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-07 02:07:06,772] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371626.7439227, 'message': 'Dec 7 02:07:05 hqnl0246134 sshd[276747]: Failed password for root from 61.177.173.18 port 17719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-07 02:07:08,768] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '92.118.207.11', 'timestamp': 1670371628.7461631, 'message': 'Dec 7 02:07:06 hqnl0246134 sshd[276764]: pam_imunify(sshd:auth): [IM360_RBL] The IP 92.118.207.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 02:07:08,786] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '92.118.207.11', 'timestamp': 1670371628.7463524, 'message': 'Dec 7 02:07:06 hqnl0246134 sshd[276764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.118.207.11 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 02:07:08,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '92.118.207.11', 'timestamp': 1670371628.7465637, 'message': 'Dec 7 02:07:08 hqnl0246134 sshd[276764]: Failed password for root from 92.118.207.11 port 40760 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:07:10,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371630.749131, 'message': 'Dec 7 02:07:09 hqnl0246134 sshd[276747]: Failed password for root from 61.177.173.18 port 17719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
WARNING [2022-12-07 02:07:11,802] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:07:11,833] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0386 seconds
INFO [2022-12-07 02:07:16,788] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371636.7676284, 'message': 'Dec 7 02:07:13 hqnl0246134 sshd[276747]: Failed password for root from 61.177.173.18 port 17719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 02:07:19,756] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:07:19,757] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:07:19,770] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:07:19,791] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0316 seconds
INFO [2022-12-07 02:07:22,467] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:07:22,467] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:07:22,476] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:07:22,488] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-07 02:07:24,806] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371644.7853346, 'message': 'Dec 7 02:07:24 hqnl0246134 sshd[276789]: Invalid user upgrade from 3.0.202.116 port 55982', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 02:07:26,806] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371646.7875824, 'message': 'Dec 7 02:07:25 hqnl0246134 sshd[276789]: pam_imunify(sshd:auth): [IM360_RBL] The IP 3.0.202.116 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:07:26,827] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371646.7877839, 'message': 'Dec 7 02:07:25 hqnl0246134 sshd[276789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.0.202.116 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:07:28,820] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371648.7941113, 'message': 'Dec 7 02:07:27 hqnl0246134 sshd[276789]: Failed password for invalid user upgrade from 3.0.202.116 port 55982 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-07 02:07:28,852] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371648.794423, 'message': 'Dec 7 02:07:28 hqnl0246134 sshd[276789]: Disconnected from invalid user upgrade 3.0.202.116 port 55982 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-07 02:07:30,901] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:07:30,902] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:07:30,909] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:07:30,920] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-07 02:07:40,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '92.106.169.34', 'timestamp': 1670371660.8262892, 'message': 'Dec 7 02:07:40 hqnl0246134 sshd[276797]: pam_imunify(sshd:auth): [IM360_RBL] The IP 92.106.169.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 02:07:40,867] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '92.106.169.34', 'timestamp': 1670371660.826592, 'message': 'Dec 7 02:07:40 hqnl0246134 sshd[276797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.106.169.34 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 02:07:42,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '92.106.169.34', 'timestamp': 1670371662.8336003, 'message': 'Dec 7 02:07:42 hqnl0246134 sshd[276797]: Failed password for root from 92.106.169.34 port 52774 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
WARNING [2022-12-07 02:07:50,463] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:07:50,464] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:07:50,877] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371670.847686, 'message': 'Dec 7 02:07:49 hqnl0246134 sshd[276800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-07 02:07:52,883] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371672.85294, 'message': 'Dec 7 02:07:51 hqnl0246134 sshd[276800]: Failed password for root from 61.177.173.18 port 39148 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-07 02:08:10,939] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371690.895417, 'message': 'Dec 7 02:08:09 hqnl0246134 sshd[276820]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0419 seconds
INFO [2022-12-07 02:08:10,964] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371690.896081, 'message': 'Dec 7 02:08:09 hqnl0246134 sshd[276820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
WARNING [2022-12-07 02:08:11,805] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:08:11,834] defence360agent.internals.the_sink: SensorIncidentList(<10 item(s)>) processed in 0.0369 seconds
INFO [2022-12-07 02:08:12,917] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371692.8966377, 'message': 'Dec 7 02:08:11 hqnl0246134 sshd[276820]: Failed password for root from 61.177.172.90 port 18365 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 02:08:14,927] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371694.9006224, 'message': 'Dec 7 02:08:14 hqnl0246134 sshd[276820]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-07 02:08:16,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371696.9032805, 'message': 'Dec 7 02:08:16 hqnl0246134 sshd[276820]: Failed password for root from 61.177.172.90 port 18365 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-07 02:08:18,110] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:08:18,110] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:08:18,118] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:08:18,130] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-07 02:08:18,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371698.9063408, 'message': 'Dec 7 02:08:18 hqnl0246134 sshd[276820]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 02:08:20,702] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:08:20,703] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:08:20,712] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:08:20,723] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-07 02:08:20,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371700.9097939, 'message': 'Dec 7 02:08:20 hqnl0246134 sshd[276820]: Failed password for root from 61.177.172.90 port 18365 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 02:08:30,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371710.9224997, 'message': 'Dec 7 02:08:29 hqnl0246134 sshd[276843]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-07 02:08:30,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371710.9231014, 'message': 'Dec 7 02:08:29 hqnl0246134 sshd[276843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 02:08:32,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371712.9244795, 'message': 'Dec 7 02:08:31 hqnl0246134 sshd[276843]: Failed password for root from 61.177.172.90 port 61411 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 02:08:34,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371714.9277048, 'message': 'Dec 7 02:08:33 hqnl0246134 sshd[276843]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-07 02:08:36,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371716.9304736, 'message': 'Dec 7 02:08:35 hqnl0246134 sshd[276845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-07 02:08:36,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371716.9307637, 'message': 'Dec 7 02:08:35 hqnl0246134 sshd[276843]: Failed password for root from 61.177.172.90 port 61411 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-07 02:08:36,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371716.930906, 'message': 'Dec 7 02:08:36 hqnl0246134 sshd[276843]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:08:38,978] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371718.9345582, 'message': 'Dec 7 02:08:37 hqnl0246134 sshd[276845]: Failed password for root from 61.177.173.18 port 53381 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0434 seconds
INFO [2022-12-07 02:08:38,979] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371718.9347444, 'message': 'Dec 7 02:08:38 hqnl0246134 sshd[276843]: Failed password for root from 61.177.172.90 port 61411 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0439 seconds
INFO [2022-12-07 02:08:42,971] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371722.9402735, 'message': 'Dec 7 02:08:41 hqnl0246134 sshd[276845]: Failed password for root from 61.177.173.18 port 53381 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-07 02:08:42,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371722.9405708, 'message': 'Dec 7 02:08:42 hqnl0246134 sshd[276848]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-07 02:08:42,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371722.9406853, 'message': 'Dec 7 02:08:42 hqnl0246134 sshd[276848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 02:08:44,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371724.9409964, 'message': 'Dec 7 02:08:43 hqnl0246134 sshd[276845]: Failed password for root from 61.177.173.18 port 53381 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0447 seconds
INFO [2022-12-07 02:08:44,986] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371724.941165, 'message': 'Dec 7 02:08:44 hqnl0246134 sshd[276848]: Failed password for root from 61.177.172.90 port 37311 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0449 seconds
INFO [2022-12-07 02:08:46,969] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371726.9417326, 'message': 'Dec 7 02:08:46 hqnl0246134 sshd[276848]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-07 02:08:48,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371728.945553, 'message': 'Dec 7 02:08:47 hqnl0246134 sshd[276848]: Failed password for root from 61.177.172.90 port 37311 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:08:48,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371728.9458218, 'message': 'Dec 7 02:08:48 hqnl0246134 sshd[276848]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-07 02:08:50,467] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:08:50,467] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:08:52,970] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371732.9525416, 'message': 'Dec 7 02:08:51 hqnl0246134 sshd[276848]: Failed password for root from 61.177.172.90 port 37311 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 02:08:54,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371734.957263, 'message': 'Dec 7 02:08:54 hqnl0246134 sshd[276885]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-07 02:08:54,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371734.9577382, 'message': 'Dec 7 02:08:54 hqnl0246134 sshd[276885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:08:55,763] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:08:55,763] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:08:55,771] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:08:55,782] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 02:08:56,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371736.9607687, 'message': 'Dec 7 02:08:56 hqnl0246134 sshd[276885]: Failed password for root from 61.177.172.90 port 25979 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-07 02:08:58,980] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371738.963457, 'message': 'Dec 7 02:08:58 hqnl0246134 sshd[276891]: Invalid user hadoop from 165.227.166.207 port 39322', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 02:08:58,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371738.9636486, 'message': 'Dec 7 02:08:58 hqnl0246134 sshd[276891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 02:09:00,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371740.9673545, 'message': 'Dec 7 02:08:59 hqnl0246134 sshd[276885]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-07 02:09:00,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371740.9675398, 'message': 'Dec 7 02:09:00 hqnl0246134 sshd[276891]: Failed password for invalid user hadoop from 165.227.166.207 port 39322 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-07 02:09:03,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371742.9716032, 'message': 'Dec 7 02:09:01 hqnl0246134 sshd[276885]: Failed password for root from 61.177.172.90 port 25979 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-07 02:09:03,022] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371742.971834, 'message': 'Dec 7 02:09:02 hqnl0246134 sshd[276891]: Disconnected from invalid user hadoop 165.227.166.207 port 39322 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0492 seconds
INFO [2022-12-07 02:09:04,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371744.9726818, 'message': 'Dec 7 02:09:03 hqnl0246134 sshd[276885]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-07 02:09:06,993] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371746.97482, 'message': 'Dec 7 02:09:05 hqnl0246134 sshd[276885]: Failed password for root from 61.177.172.90 port 25979 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 02:09:08,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371748.978897, 'message': 'Dec 7 02:09:07 hqnl0246134 sshd[277029]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 02:09:09,016] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371748.9792545, 'message': 'Dec 7 02:09:07 hqnl0246134 sshd[277029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.90 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 02:09:10,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371750.9786775, 'message': 'Dec 7 02:09:09 hqnl0246134 sshd[277029]: Failed password for root from 61.177.172.90 port 13611 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-07 02:09:11,810] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:09:11,837] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0353 seconds
INFO [2022-12-07 02:09:13,011] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371752.9801226, 'message': 'Dec 7 02:09:11 hqnl0246134 sshd[277029]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0303 seconds
INFO [2022-12-07 02:09:13,011] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371752.9803505, 'message': 'Dec 7 02:09:12 hqnl0246134 sshd[277031]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-07 02:09:13,031] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371752.9804752, 'message': 'Dec 7 02:09:12 hqnl0246134 sshd[277031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 02:09:15,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371754.9821284, 'message': 'Dec 7 02:09:14 hqnl0246134 sshd[277029]: Failed password for root from 61.177.172.90 port 13611 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-07 02:09:17,015] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371756.9847815, 'message': 'Dec 7 02:09:15 hqnl0246134 sshd[277031]: Failed password for root from 61.177.173.50 port 64815 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-07 02:09:17,016] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371756.9850528, 'message': 'Dec 7 02:09:16 hqnl0246134 sshd[277029]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.90 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-07 02:09:18,335] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:09:18,336] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:09:18,347] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:09:18,364] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0277 seconds
INFO [2022-12-07 02:09:19,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371758.987356, 'message': 'Dec 7 02:09:17 hqnl0246134 sshd[277031]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0552 seconds
INFO [2022-12-07 02:09:19,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.90', 'timestamp': 1670371758.9875817, 'message': 'Dec 7 02:09:17 hqnl0246134 sshd[277029]: Failed password for root from 61.177.172.90 port 13611 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0553 seconds
INFO [2022-12-07 02:09:19,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371758.987771, 'message': 'Dec 7 02:09:18 hqnl0246134 sshd[277036]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0550 seconds
INFO [2022-12-07 02:09:19,066] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371758.9879823, 'message': 'Dec 7 02:09:18 hqnl0246134 sshd[277036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 02:09:21,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371760.9898536, 'message': 'Dec 7 02:09:19 hqnl0246134 sshd[277031]: Failed password for root from 61.177.173.50 port 64815 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:09:21,025] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371760.9901695, 'message': 'Dec 7 02:09:19 hqnl0246134 sshd[277031]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-07 02:09:21,257] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:09:21,257] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:09:21,265] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:09:21,277] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 02:09:23,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371762.992925, 'message': 'Dec 7 02:09:21 hqnl0246134 sshd[277036]: Failed password for root from 61.177.173.36 port 12945 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0453 seconds
INFO [2022-12-07 02:09:23,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371762.9931526, 'message': 'Dec 7 02:09:21 hqnl0246134 sshd[277031]: Failed password for root from 61.177.173.50 port 64815 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0458 seconds
INFO [2022-12-07 02:09:23,041] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371762.9933047, 'message': 'Dec 7 02:09:21 hqnl0246134 sshd[277044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0459 seconds
INFO [2022-12-07 02:09:23,076] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371762.993421, 'message': 'Dec 7 02:09:22 hqnl0246134 sshd[277036]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0361 seconds
INFO [2022-12-07 02:09:23,076] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371762.9935503, 'message': 'Dec 7 02:09:22 hqnl0246134 sshd[277044]: Failed password for root from 61.177.173.18 port 19899 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0355 seconds
INFO [2022-12-07 02:09:25,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371764.9988706, 'message': 'Dec 7 02:09:23 hqnl0246134 sshd[277049]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-07 02:09:25,043] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371764.9993343, 'message': 'Dec 7 02:09:23 hqnl0246134 sshd[277049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 02:09:27,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371766.9982781, 'message': 'Dec 7 02:09:25 hqnl0246134 sshd[277036]: Failed password for root from 61.177.173.36 port 12945 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0417 seconds
INFO [2022-12-07 02:09:27,044] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371766.9985027, 'message': 'Dec 7 02:09:25 hqnl0246134 sshd[277049]: Failed password for root from 61.177.173.50 port 56719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0452 seconds
INFO [2022-12-07 02:09:27,045] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371766.9986181, 'message': 'Dec 7 02:09:26 hqnl0246134 sshd[277044]: Failed password for root from 61.177.173.18 port 19899 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-07 02:09:29,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371769.0018294, 'message': 'Dec 7 02:09:27 hqnl0246134 sshd[277036]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0525 seconds
INFO [2022-12-07 02:09:29,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371769.0022225, 'message': 'Dec 7 02:09:27 hqnl0246134 sshd[277049]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0527 seconds
INFO [2022-12-07 02:09:31,051] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371771.0033119, 'message': 'Dec 7 02:09:29 hqnl0246134 sshd[277036]: Failed password for root from 61.177.173.36 port 12945 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0470 seconds
INFO [2022-12-07 02:09:31,052] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371771.0035777, 'message': 'Dec 7 02:09:29 hqnl0246134 sshd[277049]: Failed password for root from 61.177.173.50 port 56719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-07 02:09:31,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371771.0038748, 'message': 'Dec 7 02:09:30 hqnl0246134 sshd[277044]: Failed password for root from 61.177.173.18 port 19899 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0472 seconds
INFO [2022-12-07 02:09:31,072] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371771.0037308, 'message': 'Dec 7 02:09:30 hqnl0246134 sshd[277049]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 02:09:33,037] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371773.0055516, 'message': 'Dec 7 02:09:31 hqnl0246134 sshd[277060]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0314 seconds
INFO [2022-12-07 02:09:33,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670371773.0058815, 'message': 'Dec 7 02:09:32 hqnl0246134 sshd[277049]: Failed password for root from 61.177.173.50 port 56719 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-07 02:09:33,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371773.0057557, 'message': 'Dec 7 02:09:31 hqnl0246134 sshd[277060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 02:09:35,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371775.0070202, 'message': 'Dec 7 02:09:33 hqnl0246134 sshd[277060]: Failed password for root from 61.177.173.36 port 62514 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 02:09:35,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.17.16.196', 'timestamp': 1670371775.0074189, 'message': 'Dec 7 02:09:33 hqnl0246134 sshd[277064]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.17.16.196 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0315 seconds
INFO [2022-12-07 02:09:35,073] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371775.0072646, 'message': 'Dec 7 02:09:33 hqnl0246134 sshd[277060]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-07 02:09:35,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.17.16.196', 'timestamp': 1670371775.0076132, 'message': 'Dec 7 02:09:33 hqnl0246134 sshd[277064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.196 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-07 02:09:35,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371775.0077724, 'message': 'Dec 7 02:09:34 hqnl0246134 sshd[277060]: Failed password for root from 61.177.173.36 port 62514 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-07 02:09:35,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '134.17.16.196', 'timestamp': 1670371775.007894, 'message': 'Dec 7 02:09:34 hqnl0246134 sshd[277064]: Failed password for root from 134.17.16.196 port 9393 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-07 02:09:37,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371777.0090232, 'message': 'Dec 7 02:09:35 hqnl0246134 sshd[277060]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-07 02:09:39,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371779.0111194, 'message': 'Dec 7 02:09:37 hqnl0246134 sshd[277060]: Failed password for root from 61.177.173.36 port 62514 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 02:09:43,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371783.0182521, 'message': 'Dec 7 02:09:41 hqnl0246134 sshd[277067]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 02:09:43,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371783.0184405, 'message': 'Dec 7 02:09:41 hqnl0246134 sshd[277067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0234 seconds
INFO [2022-12-07 02:09:45,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371785.020928, 'message': 'Dec 7 02:09:43 hqnl0246134 sshd[277067]: Failed password for root from 61.177.173.36 port 40240 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 02:09:45,065] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371785.021144, 'message': 'Dec 7 02:09:43 hqnl0246134 sshd[277067]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-07 02:09:47,042] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371787.0216508, 'message': 'Dec 7 02:09:45 hqnl0246134 sshd[277067]: Failed password for root from 61.177.173.36 port 40240 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 02:09:47,061] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371787.0218942, 'message': 'Dec 7 02:09:46 hqnl0246134 sshd[277067]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 02:09:49,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670371789.022604, 'message': 'Dec 7 02:09:48 hqnl0246134 sshd[277067]: Failed password for root from 61.177.173.36 port 40240 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0366 seconds
WARNING [2022-12-07 02:09:50,471] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:09:50,471] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:09:51,056] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.38.255.119', 'timestamp': 1670371791.0259826, 'message': 'Dec 7 02:09:50 hqnl0246134 sshd[277070]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.38.255.119 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-07 02:09:51,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.38.255.119', 'timestamp': 1670371791.026261, 'message': 'Dec 7 02:09:50 hqnl0246134 sshd[277070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.255.119 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-07 02:09:53,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.38.255.119', 'timestamp': 1670371793.0261445, 'message': 'Dec 7 02:09:52 hqnl0246134 sshd[277070]: Failed password for root from 103.38.255.119 port 55572 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-07 02:09:57,803] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:09:57,804] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:09:57,814] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:09:57,826] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0212 seconds
INFO [2022-12-07 02:10:07,071] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.17.229.65', 'timestamp': 1670371807.0489502, 'message': 'Dec 7 02:10:06 hqnl0246134 sshd[277106]: Invalid user admin from 185.17.229.65 port 32241', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-07 02:10:07,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.17.229.65', 'timestamp': 1670371807.0491922, 'message': 'Dec 7 02:10:06 hqnl0246134 sshd[277106]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.17.229.65 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0228 seconds
INFO [2022-12-07 02:10:07,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.17.229.65', 'timestamp': 1670371807.0493453, 'message': 'Dec 7 02:10:06 hqnl0246134 sshd[277106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.17.229.65 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-07 02:10:09,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371809.0502915, 'message': 'Dec 7 02:10:07 hqnl0246134 sshd[277108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0356 seconds
INFO [2022-12-07 02:10:09,087] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.17.229.65', 'timestamp': 1670371809.0505283, 'message': 'Dec 7 02:10:08 hqnl0246134 sshd[277106]: Failed password for invalid user admin from 185.17.229.65 port 32241 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0360 seconds
INFO [2022-12-07 02:10:09,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.17.229.65', 'timestamp': 1670371809.0506957, 'message': 'Dec 7 02:10:08 hqnl0246134 sshd[277106]: Disconnected from invalid user admin 185.17.229.65 port 32241 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 02:10:11,086] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371811.051618, 'message': 'Dec 7 02:10:09 hqnl0246134 sshd[277108]: Failed password for root from 61.177.173.18 port 37996 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0338 seconds
WARNING [2022-12-07 02:10:11,815] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:10:11,846] defence360agent.internals.the_sink: SensorIncidentList(<19 item(s)>) processed in 0.0398 seconds
INFO [2022-12-07 02:10:18,666] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:10:18,666] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:10:18,674] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:10:18,686] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-07 02:10:21,323] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:10:21,324] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:10:21,332] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:10:21,355] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0306 seconds
INFO [2022-12-07 02:10:23,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.131.35.194', 'timestamp': 1670371823.0734165, 'message': 'Dec 7 02:10:21 hqnl0246134 sshd[277132]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.131.35.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 02:10:23,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.131.35.194', 'timestamp': 1670371823.073652, 'message': 'Dec 7 02:10:21 hqnl0246134 sshd[277132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.35.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:10:25,107] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.131.35.194', 'timestamp': 1670371825.074388, 'message': 'Dec 7 02:10:23 hqnl0246134 sshd[277132]: Failed password for root from 43.131.35.194 port 40686 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-07 02:10:27,100] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371827.0791671, 'message': 'Dec 7 02:10:26 hqnl0246134 sshd[277142]: pam_imunify(sshd:auth): [IM360_RBL] The IP 3.0.202.116 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-07 02:10:27,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371827.079454, 'message': 'Dec 7 02:10:26 hqnl0246134 sshd[277142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.0.202.116 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 02:10:29,102] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371829.0803628, 'message': 'Dec 7 02:10:28 hqnl0246134 sshd[277142]: Failed password for root from 3.0.202.116 port 39286 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-07 02:10:31,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.16.6', 'timestamp': 1670371831.0847135, 'message': 'Dec 7 02:10:30 hqnl0246134 sshd[277144]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.16.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 02:10:31,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.16.6', 'timestamp': 1670371831.0849347, 'message': 'Dec 7 02:10:30 hqnl0246134 sshd[277144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.16.6 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:10:33,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '128.199.16.6', 'timestamp': 1670371833.0890982, 'message': 'Dec 7 02:10:31 hqnl0246134 sshd[277144]: Failed password for root from 128.199.16.6 port 55486 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
WARNING [2022-12-07 02:10:50,476] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:10:50,478] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:10:51,200] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 02:10:51,269] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 02:10:51,270] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 02:10:51,270] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 02:10:51,270] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 02:10:51,270] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 02:10:51,281] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 02:10:51,298] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0272 seconds
WARNING [2022-12-07 02:10:51,305] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 02:10:51,308] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:10:51,325] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0343 seconds
INFO [2022-12-07 02:10:51,327] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0308 seconds
INFO [2022-12-07 02:10:53,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371853.134589, 'message': 'Dec 7 02:10:52 hqnl0246134 sshd[277148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:10:55,189] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371855.141498, 'message': 'Dec 7 02:10:54 hqnl0246134 sshd[277148]: Failed password for root from 61.177.173.18 port 53057 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0463 seconds
WARNING [2022-12-07 02:11:12,438] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:11:12,556] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.7467 seconds
INFO [2022-12-07 02:11:17,205] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371877.1733747, 'message': 'Dec 7 02:11:15 hqnl0246134 sshd[277171]: Invalid user hadoop from 165.227.166.207 port 49594', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 02:11:17,223] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371877.175672, 'message': 'Dec 7 02:11:15 hqnl0246134 sshd[277171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 02:11:17,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371877.1759155, 'message': 'Dec 7 02:11:16 hqnl0246134 sshd[277171]: Failed password for invalid user hadoop from 165.227.166.207 port 49594 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-07 02:11:17,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670371877.176134, 'message': 'Dec 7 02:11:17 hqnl0246134 sshd[277171]: Disconnected from invalid user hadoop 165.227.166.207 port 49594 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-07 02:11:18,205] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:11:18,205] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:11:18,214] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:11:18,226] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0197 seconds
INFO [2022-12-07 02:11:19,795] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:11:19,796] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:11:19,804] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:11:19,827] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0303 seconds
INFO [2022-12-07 02:11:21,238] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:11:21,239] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:11:21,248] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:11:21,259] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 02:11:21,397] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 02:11:21,398] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 02:11:21,399] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-07 02:11:39,228] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371899.2024782, 'message': 'Dec 7 02:11:37 hqnl0246134 sshd[277197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0249 seconds
INFO [2022-12-07 02:11:41,219] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371901.2014756, 'message': 'Dec 7 02:11:40 hqnl0246134 sshd[277197]: Failed password for root from 61.177.173.18 port 16829 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0171 seconds
WARNING [2022-12-07 02:11:50,483] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:11:50,484] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:11:54,128] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-07 02:12:07,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371927.231002, 'message': 'Dec 7 02:12:06 hqnl0246134 sshd[277228]: Invalid user martin from 3.0.202.116 port 37732', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-07 02:12:07,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371927.231613, 'message': 'Dec 7 02:12:06 hqnl0246134 sshd[277228]: pam_imunify(sshd:auth): [IM360_RBL] The IP 3.0.202.116 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 02:12:07,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371927.2318754, 'message': 'Dec 7 02:12:06 hqnl0246134 sshd[277228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.0.202.116 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 02:12:09,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371929.2318149, 'message': 'Dec 7 02:12:08 hqnl0246134 sshd[277228]: Failed password for invalid user martin from 3.0.202.116 port 37732 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:12:09,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '3.0.202.116', 'timestamp': 1670371929.2320414, 'message': 'Dec 7 02:12:08 hqnl0246134 sshd[277228]: Disconnected from invalid user martin 3.0.202.116 port 37732 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
WARNING [2022-12-07 02:12:11,819] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:12:11,843] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0322 seconds
INFO [2022-12-07 02:12:17,930] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:12:17,930] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:12:17,937] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:12:17,948] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-07 02:12:20,800] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:12:20,801] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:12:20,809] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:12:20,823] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-07 02:12:23,262] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371943.245087, 'message': 'Dec 7 02:12:22 hqnl0246134 sshd[277241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 02:12:25,269] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371945.247345, 'message': 'Dec 7 02:12:24 hqnl0246134 sshd[277241]: Failed password for root from 61.177.173.18 port 37658 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-07 02:12:29,268] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371949.2503216, 'message': 'Dec 7 02:12:26 hqnl0246134 sshd[277241]: Failed password for root from 61.177.173.18 port 37658 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 02:12:31,281] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371951.251644, 'message': 'Dec 7 02:12:29 hqnl0246134 sshd[277241]: Failed password for root from 61.177.173.18 port 37658 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-07 02:12:35,274] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371955.254382, 'message': 'Dec 7 02:12:34 hqnl0246134 sshd[277252]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:12:35,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371955.2547007, 'message': 'Dec 7 02:12:34 hqnl0246134 sshd[277252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.124 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-07 02:12:37,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371957.255829, 'message': 'Dec 7 02:12:36 hqnl0246134 sshd[277252]: Failed password for root from 61.177.172.124 port 44070 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-07 02:12:37,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371957.2562358, 'message': 'Dec 7 02:12:37 hqnl0246134 sshd[277252]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:12:39,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371959.2578294, 'message': 'Dec 7 02:12:39 hqnl0246134 sshd[277252]: Failed password for root from 61.177.172.124 port 44070 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 02:12:41,280] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371961.262076, 'message': 'Dec 7 02:12:39 hqnl0246134 sshd[277252]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 02:12:41,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371961.262371, 'message': 'Dec 7 02:12:40 hqnl0246134 sshd[277252]: Failed password for root from 61.177.172.124 port 44070 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:12:45,296] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371965.265601, 'message': 'Dec 7 02:12:43 hqnl0246134 sshd[277256]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 02:12:45,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371965.2659423, 'message': 'Dec 7 02:12:43 hqnl0246134 sshd[277256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.124 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 02:12:47,291] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371967.2679825, 'message': 'Dec 7 02:12:45 hqnl0246134 sshd[277256]: Failed password for root from 61.177.172.124 port 61953 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-07 02:12:49,300] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371969.2711158, 'message': 'Dec 7 02:12:47 hqnl0246134 sshd[277256]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-07 02:12:49,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.110.134.13', 'timestamp': 1670371969.271363, 'message': 'Dec 7 02:12:47 hqnl0246134 sshd[277259]: Invalid user impala from 194.110.134.13 port 47766', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-07 02:12:49,321] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.110.134.13', 'timestamp': 1670371969.2715657, 'message': 'Dec 7 02:12:47 hqnl0246134 sshd[277259]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.110.134.13 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 02:12:49,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.110.134.13', 'timestamp': 1670371969.2716846, 'message': 'Dec 7 02:12:47 hqnl0246134 sshd[277259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.134.13 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
WARNING [2022-12-07 02:12:50,489] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:12:50,489] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:12:51,303] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371971.2729914, 'message': 'Dec 7 02:12:49 hqnl0246134 sshd[277256]: Failed password for root from 61.177.172.124 port 61953 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-07 02:12:51,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.110.134.13', 'timestamp': 1670371971.273202, 'message': 'Dec 7 02:12:49 hqnl0246134 sshd[277259]: Failed password for invalid user impala from 194.110.134.13 port 47766 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 02:12:51,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371971.273314, 'message': 'Dec 7 02:12:49 hqnl0246134 sshd[277256]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-07 02:12:51,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.110.134.13', 'timestamp': 1670371971.2734177, 'message': 'Dec 7 02:12:50 hqnl0246134 sshd[277259]: Disconnected from invalid user impala 194.110.134.13 port 47766 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 02:12:53,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371973.273768, 'message': 'Dec 7 02:12:51 hqnl0246134 sshd[277256]: Failed password for root from 61.177.172.124 port 61953 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0231 seconds
INFO [2022-12-07 02:12:53,671] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:12:53,672] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:12:53,687] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:12:53,702] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0245 seconds
INFO [2022-12-07 02:12:55,301] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371975.2757778, 'message': 'Dec 7 02:12:53 hqnl0246134 sshd[277263]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0250 seconds
INFO [2022-12-07 02:12:55,321] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371975.2761228, 'message': 'Dec 7 02:12:53 hqnl0246134 sshd[277263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.124 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 02:12:57,297] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371977.276829, 'message': 'Dec 7 02:12:55 hqnl0246134 sshd[277263]: Failed password for root from 61.177.172.124 port 34587 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:12:57,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371977.277056, 'message': 'Dec 7 02:12:56 hqnl0246134 sshd[277263]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:12:59,298] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371979.2795691, 'message': 'Dec 7 02:12:58 hqnl0246134 sshd[277263]: Failed password for root from 61.177.172.124 port 34587 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 02:12:59,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371979.2797916, 'message': 'Dec 7 02:12:58 hqnl0246134 sshd[277263]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 02:13:01,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371981.2836976, 'message': 'Dec 7 02:13:00 hqnl0246134 sshd[277263]: Failed password for root from 61.177.172.124 port 34587 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-07 02:13:03,275] defence360agent.simple_rpc: Response: method - ['health'], data - {'result': 'success', 'messages': [], 'data': {'healthy': True, 'why': 'not registered', 'strategy': 'PRIMARY_IDS', 'version': '6.7.3-1', 'eula': None, 'license': {'status': False, 'redirect_url': None}}}
WARNING [2022-12-07 02:13:03,282] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:13:03,301] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['health'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/sbin/imunify360-watchdog', '1200']}) processed in 0.0249 seconds
INFO [2022-12-07 02:13:03,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371983.285073, 'message': 'Dec 7 02:13:02 hqnl0246134 sshd[277278]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-07 02:13:03,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371983.2852237, 'message': 'Dec 7 02:13:02 hqnl0246134 sshd[277278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.124 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 02:13:05,323] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371985.2892063, 'message': 'Dec 7 02:13:04 hqnl0246134 sshd[277278]: Failed password for root from 61.177.172.124 port 45474 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-07 02:13:07,324] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.17.16.196', 'timestamp': 1670371987.2930245, 'message': 'Dec 7 02:13:05 hqnl0246134 sshd[277298]: Invalid user hb from 134.17.16.196 port 9395', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-07 02:13:07,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371987.2934666, 'message': 'Dec 7 02:13:06 hqnl0246134 sshd[277278]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 02:13:07,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.17.16.196', 'timestamp': 1670371987.293219, 'message': 'Dec 7 02:13:05 hqnl0246134 sshd[277298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.17.16.196 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:13:07,359] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.17.16.196', 'timestamp': 1670371987.2933626, 'message': 'Dec 7 02:13:05 hqnl0246134 sshd[277298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.196 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-07 02:13:07,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.17.16.196', 'timestamp': 1670371987.2935667, 'message': 'Dec 7 02:13:06 hqnl0246134 sshd[277298]: Failed password for invalid user hb from 134.17.16.196 port 9395 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 02:13:09,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.17.16.196', 'timestamp': 1670371989.296085, 'message': 'Dec 7 02:13:08 hqnl0246134 sshd[277298]: Disconnected from invalid user hb 134.17.16.196 port 9395 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0429 seconds
INFO [2022-12-07 02:13:09,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371989.2963364, 'message': 'Dec 7 02:13:08 hqnl0246134 sshd[277278]: Failed password for root from 61.177.172.124 port 45474 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0434 seconds
INFO [2022-12-07 02:13:09,341] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371989.2965577, 'message': 'Dec 7 02:13:08 hqnl0246134 sshd[277300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0433 seconds
INFO [2022-12-07 02:13:09,358] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371989.2964506, 'message': 'Dec 7 02:13:08 hqnl0246134 sshd[277278]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.124 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 02:13:11,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.124', 'timestamp': 1670371991.2977934, 'message': 'Dec 7 02:13:10 hqnl0246134 sshd[277278]: Failed password for root from 61.177.172.124 port 45474 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-07 02:13:11,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371991.2979863, 'message': 'Dec 7 02:13:10 hqnl0246134 sshd[277300]: Failed password for root from 61.177.173.18 port 60585 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0271 seconds
WARNING [2022-12-07 02:13:11,827] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:13:11,849] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0335 seconds
INFO [2022-12-07 02:13:17,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670371997.3091288, 'message': 'Dec 7 02:13:15 hqnl0246134 sshd[277300]: Failed password for root from 61.177.173.18 port 60585 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:13:20,001] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:13:20,001] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:13:20,008] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:13:20,022] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-07 02:13:21,349] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372001.3143911, 'message': 'Dec 7 02:13:19 hqnl0246134 sshd[277300]: Failed password for root from 61.177.173.18 port 60585 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-07 02:13:21,350] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.107.61.88', 'timestamp': 1670372001.3145907, 'message': 'Dec 7 02:13:19 hqnl0246134 sshd[277308]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.107.61.88 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-07 02:13:21,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.107.61.88', 'timestamp': 1670372001.3147297, 'message': 'Dec 7 02:13:19 hqnl0246134 sshd[277308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.107.61.88 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0251 seconds
INFO [2022-12-07 02:13:22,737] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:13:22,737] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:13:22,744] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:13:22,755] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-07 02:13:23,334] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.107.61.88', 'timestamp': 1670372003.316609, 'message': 'Dec 7 02:13:21 hqnl0246134 sshd[277308]: Failed password for root from 20.107.61.88 port 48984 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 02:13:25,347] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372005.320273, 'message': 'Dec 7 02:13:23 hqnl0246134 sshd[277316]: Invalid user hadoop from 165.227.166.207 port 59880', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-07 02:13:25,375] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372005.3206263, 'message': 'Dec 7 02:13:23 hqnl0246134 sshd[277316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0265 seconds
INFO [2022-12-07 02:13:27,338] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372007.3212712, 'message': 'Dec 7 02:13:25 hqnl0246134 sshd[277316]: Failed password for invalid user hadoop from 165.227.166.207 port 59880 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:13:27,357] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372007.321447, 'message': 'Dec 7 02:13:27 hqnl0246134 sshd[277316]: Disconnected from invalid user hadoop 165.227.166.207 port 59880 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 02:13:29,356] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372009.3217063, 'message': 'Dec 7 02:13:27 hqnl0246134 sshd[277326]: Invalid user user from 185.233.36.187 port 42832', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-07 02:13:29,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372009.32202, 'message': 'Dec 7 02:13:28 hqnl0246134 sshd[277326]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.233.36.187 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0221 seconds
INFO [2022-12-07 02:13:29,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372009.3246543, 'message': 'Dec 7 02:13:28 hqnl0246134 sshd[277326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.233.36.187 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 02:13:31,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.19.166', 'timestamp': 1670372011.3227031, 'message': 'Dec 7 02:13:29 hqnl0246134 sshd[277329]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.19.166 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0593 seconds
INFO [2022-12-07 02:13:31,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.153.40', 'timestamp': 1670372011.3232615, 'message': 'Dec 7 02:13:30 hqnl0246134 sshd[277331]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.153.40 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0601 seconds
INFO [2022-12-07 02:13:31,386] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372011.323513, 'message': 'Dec 7 02:13:30 hqnl0246134 sshd[277326]: Failed password for invalid user user from 185.233.36.187 port 42832 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0600 seconds
INFO [2022-12-07 02:13:31,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.19.166', 'timestamp': 1670372011.323096, 'message': 'Dec 7 02:13:29 hqnl0246134 sshd[277329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.19.166 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-07 02:13:31,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.153.40', 'timestamp': 1670372011.323395, 'message': 'Dec 7 02:13:30 hqnl0246134 sshd[277331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.153.40 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-07 02:13:33,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.197.19.166', 'timestamp': 1670372013.3266203, 'message': 'Dec 7 02:13:31 hqnl0246134 sshd[277329]: Failed password for root from 138.197.19.166 port 45328 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0499 seconds
INFO [2022-12-07 02:13:33,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372013.3268802, 'message': 'Dec 7 02:13:31 hqnl0246134 sshd[277326]: Disconnected from invalid user user 185.233.36.187 port 42832 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0507 seconds
INFO [2022-12-07 02:13:33,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '137.184.153.40', 'timestamp': 1670372013.3270414, 'message': 'Dec 7 02:13:32 hqnl0246134 sshd[277331]: Failed password for root from 137.184.153.40 port 54220 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0508 seconds
INFO [2022-12-07 02:13:49,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '3.0.202.116', 'timestamp': 1670372029.351279, 'message': 'Dec 7 02:13:47 hqnl0246134 sshd[277334]: Invalid user ubuntu from 3.0.202.116 port 36180', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-07 02:13:49,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '3.0.202.116', 'timestamp': 1670372029.351855, 'message': 'Dec 7 02:13:47 hqnl0246134 sshd[277334]: pam_imunify(sshd:auth): [IM360_RBL] The IP 3.0.202.116 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 02:13:49,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '3.0.202.116', 'timestamp': 1670372029.3520374, 'message': 'Dec 7 02:13:47 hqnl0246134 sshd[277334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.0.202.116 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 02:13:49,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '3.0.202.116', 'timestamp': 1670372029.3521922, 'message': 'Dec 7 02:13:49 hqnl0246134 sshd[277334]: Failed password for invalid user ubuntu from 3.0.202.116 port 36180 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-07 02:13:50,492] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:13:50,493] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:13:51,409] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.255.168.152', 'timestamp': 1670372031.3537283, 'message': 'Dec 7 02:13:49 hqnl0246134 sshd[277336]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.255.168.152 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0547 seconds
INFO [2022-12-07 02:13:51,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '3.0.202.116', 'timestamp': 1670372031.3573384, 'message': 'Dec 7 02:13:50 hqnl0246134 sshd[277334]: Disconnected from invalid user ubuntu 3.0.202.116 port 36180 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0549 seconds
INFO [2022-12-07 02:13:51,444] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.255.168.152', 'timestamp': 1670372031.3540652, 'message': 'Dec 7 02:13:49 hqnl0246134 sshd[277336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.152 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-07 02:13:53,376] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.255.168.152', 'timestamp': 1670372033.3572164, 'message': 'Dec 7 02:13:51 hqnl0246134 sshd[277336]: Failed password for root from 51.255.168.152 port 47722 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 02:13:55,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372035.3584924, 'message': 'Dec 7 02:13:55 hqnl0246134 sshd[277340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 02:13:55,930] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:13:55,931] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:13:55,938] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:13:55,950] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-07 02:13:59,394] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372039.3648114, 'message': 'Dec 7 02:13:57 hqnl0246134 sshd[277340]: Failed password for root from 61.177.173.18 port 21787 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-07 02:14:03,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372043.3702383, 'message': 'Dec 7 02:14:01 hqnl0246134 sshd[277340]: Failed password for root from 61.177.173.18 port 21787 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 02:14:05,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372045.372478, 'message': 'Dec 7 02:14:04 hqnl0246134 sshd[277353]: Invalid user guest1 from 159.89.8.45 port 50408', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 02:14:05,408] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372045.372654, 'message': 'Dec 7 02:14:04 hqnl0246134 sshd[277353]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.89.8.45 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 02:14:05,426] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372045.3728855, 'message': 'Dec 7 02:14:04 hqnl0246134 sshd[277353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.8.45 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:14:07,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372047.3746288, 'message': 'Dec 7 02:14:05 hqnl0246134 sshd[277353]: Failed password for invalid user guest1 from 159.89.8.45 port 50408 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-07 02:14:07,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372047.3750176, 'message': 'Dec 7 02:14:06 hqnl0246134 sshd[277340]: Failed password for root from 61.177.173.18 port 21787 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 02:14:07,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372047.3748276, 'message': 'Dec 7 02:14:05 hqnl0246134 sshd[277353]: Disconnected from invalid user guest1 159.89.8.45 port 50408 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-07 02:14:11,827] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:14:11,865] defence360agent.internals.the_sink: SensorIncidentList(<26 item(s)>) processed in 0.0463 seconds
INFO [2022-12-07 02:14:17,850] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:14:17,850] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:14:17,857] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:14:17,867] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0165 seconds
INFO [2022-12-07 02:14:20,523] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:14:20,523] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:14:20,530] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:14:20,540] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0165 seconds
INFO [2022-12-07 02:14:23,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '92.106.169.34', 'timestamp': 1670372063.3941116, 'message': 'Dec 7 02:14:23 hqnl0246134 sshd[277395]: pam_imunify(sshd:auth): [IM360_RBL] The IP 92.106.169.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:14:23,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '92.106.169.34', 'timestamp': 1670372063.3944013, 'message': 'Dec 7 02:14:23 hqnl0246134 sshd[277395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.106.169.34 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-07 02:14:25,432] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '92.106.169.34', 'timestamp': 1670372065.401212, 'message': 'Dec 7 02:14:25 hqnl0246134 sshd[277395]: Failed password for root from 92.106.169.34 port 57042 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 02:14:43,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372083.441168, 'message': 'Dec 7 02:14:41 hqnl0246134 sshd[277407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-07 02:14:45,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372085.445045, 'message': 'Dec 7 02:14:43 hqnl0246134 sshd[277407]: Failed password for root from 61.177.173.18 port 34728 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
WARNING [2022-12-07 02:14:50,496] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:14:50,497] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:14:51,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372091.4505885, 'message': 'Dec 7 02:14:48 hqnl0246134 sshd[277407]: Failed password for root from 61.177.173.18 port 34728 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0513 seconds
INFO [2022-12-07 02:14:51,504] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.131.35.194', 'timestamp': 1670372091.450952, 'message': 'Dec 7 02:14:50 hqnl0246134 sshd[277412]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.131.35.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0513 seconds
INFO [2022-12-07 02:14:51,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.131.35.194', 'timestamp': 1670372091.4511926, 'message': 'Dec 7 02:14:50 hqnl0246134 sshd[277412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.35.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 02:14:53,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372093.4525692, 'message': 'Dec 7 02:14:52 hqnl0246134 sshd[277407]: Failed password for root from 61.177.173.18 port 34728 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 02:14:53,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.131.35.194', 'timestamp': 1670372093.4528108, 'message': 'Dec 7 02:14:53 hqnl0246134 sshd[277412]: Failed password for root from 43.131.35.194 port 39766 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-07 02:14:55,476] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.17.229.65', 'timestamp': 1670372095.455741, 'message': 'Dec 7 02:14:55 hqnl0246134 sshd[277424]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.17.229.65 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:14:55,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.17.229.65', 'timestamp': 1670372095.4561827, 'message': 'Dec 7 02:14:55 hqnl0246134 sshd[277424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.17.229.65 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 02:14:57,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '185.17.229.65', 'timestamp': 1670372097.4589128, 'message': 'Dec 7 02:14:57 hqnl0246134 sshd[277424]: Failed password for root from 185.17.229.65 port 59512 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 02:15:05,496] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372105.4717593, 'message': 'Dec 7 02:15:04 hqnl0246134 sshd[277445]: Invalid user gerrit from 92.118.207.11 port 49174', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-07 02:15:05,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372105.4732761, 'message': 'Dec 7 02:15:04 hqnl0246134 sshd[277445]: pam_imunify(sshd:auth): [IM360_RBL] The IP 92.118.207.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 02:15:05,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372105.473397, 'message': 'Dec 7 02:15:04 hqnl0246134 sshd[277445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.118.207.11 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:15:07,495] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372107.477977, 'message': 'Dec 7 02:15:06 hqnl0246134 sshd[277445]: Failed password for invalid user gerrit from 92.118.207.11 port 49174 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 02:15:09,503] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372109.4827166, 'message': 'Dec 7 02:15:07 hqnl0246134 sshd[277445]: Disconnected from invalid user gerrit 92.118.207.11 port 49174 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
WARNING [2022-12-07 02:15:11,837] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:15:11,875] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0480 seconds
INFO [2022-12-07 02:15:12,659] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:15:12,660] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:15:12,669] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:15:12,680] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
INFO [2022-12-07 02:15:17,847] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:15:17,848] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:15:17,855] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:15:17,867] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 02:15:20,692] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:15:20,692] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:15:20,705] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:15:20,723] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0299 seconds
INFO [2022-12-07 02:15:29,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372129.5165708, 'message': 'Dec 7 02:15:29 hqnl0246134 sshd[277483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:15:33,548] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372133.5264845, 'message': 'Dec 7 02:15:31 hqnl0246134 sshd[277483]: Failed password for root from 61.177.173.18 port 56497 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
INFO [2022-12-07 02:15:35,586] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372135.5291562, 'message': 'Dec 7 02:15:34 hqnl0246134 sshd[277485]: Invalid user hp from 165.227.166.207 port 41952', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0565 seconds
INFO [2022-12-07 02:15:35,592] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.17.16.196', 'timestamp': 1670372135.533414, 'message': 'Dec 7 02:15:35 hqnl0246134 sshd[277487]: Invalid user ken from 134.17.16.196 port 9396', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0564 seconds
INFO [2022-12-07 02:15:35,624] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372135.5331962, 'message': 'Dec 7 02:15:34 hqnl0246134 sshd[277485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0375 seconds
INFO [2022-12-07 02:15:35,626] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.17.16.196', 'timestamp': 1670372135.5336385, 'message': 'Dec 7 02:15:35 hqnl0246134 sshd[277487]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.17.16.196 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-07 02:15:35,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.17.16.196', 'timestamp': 1670372135.5338159, 'message': 'Dec 7 02:15:35 hqnl0246134 sshd[277487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.196 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 02:15:37,609] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372137.5353794, 'message': 'Dec 7 02:15:35 hqnl0246134 sshd[277483]: Failed password for root from 61.177.173.18 port 56497 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0734 seconds
INFO [2022-12-07 02:15:37,611] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372137.535665, 'message': 'Dec 7 02:15:36 hqnl0246134 sshd[277485]: Failed password for invalid user hp from 165.227.166.207 port 41952 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0738 seconds
INFO [2022-12-07 02:15:37,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.17.16.196', 'timestamp': 1670372137.5367808, 'message': 'Dec 7 02:15:37 hqnl0246134 sshd[277487]: Failed password for invalid user ken from 134.17.16.196 port 9396 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0737 seconds
INFO [2022-12-07 02:15:37,639] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372137.5358937, 'message': 'Dec 7 02:15:36 hqnl0246134 sshd[277485]: Disconnected from invalid user hp 165.227.166.207 port 41952 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0279 seconds
INFO [2022-12-07 02:15:39,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.17.16.196', 'timestamp': 1670372139.5382755, 'message': 'Dec 7 02:15:38 hqnl0246134 sshd[277487]: Disconnected from invalid user ken 134.17.16.196 port 9396 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-07 02:15:39,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372139.538488, 'message': 'Dec 7 02:15:38 hqnl0246134 sshd[277483]: Failed password for root from 61.177.173.18 port 56497 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-07 02:15:41,574] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.110.134.13', 'timestamp': 1670372141.5407991, 'message': 'Dec 7 02:15:41 hqnl0246134 sshd[277491]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.110.134.13 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0331 seconds
INFO [2022-12-07 02:15:41,607] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.110.134.13', 'timestamp': 1670372141.5410194, 'message': 'Dec 7 02:15:41 hqnl0246134 sshd[277491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.134.13 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-07 02:15:45,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '194.110.134.13', 'timestamp': 1670372145.5457225, 'message': 'Dec 7 02:15:43 hqnl0246134 sshd[277491]: Failed password for root from 194.110.134.13 port 56546 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0256 seconds
WARNING [2022-12-07 02:15:50,501] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:15:50,503] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:16:03,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.107.61.88', 'timestamp': 1670372163.5739403, 'message': 'Dec 7 02:16:01 hqnl0246134 sshd[277513]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.107.61.88 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 02:16:03,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.107.61.88', 'timestamp': 1670372163.5744038, 'message': 'Dec 7 02:16:01 hqnl0246134 sshd[277513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.107.61.88 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 02:16:03,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.107.61.88', 'timestamp': 1670372163.5745416, 'message': 'Dec 7 02:16:03 hqnl0246134 sshd[277513]: Failed password for root from 20.107.61.88 port 38816 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0168 seconds
WARNING [2022-12-07 02:16:11,842] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:16:11,881] defence360agent.internals.the_sink: SensorIncidentList(<13 item(s)>) processed in 0.0486 seconds
INFO [2022-12-07 02:16:17,613] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372177.5948896, 'message': 'Dec 7 02:16:16 hqnl0246134 sshd[277516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:16:17,977] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:16:17,978] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:16:17,987] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:16:17,998] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-07 02:16:19,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372179.597929, 'message': 'Dec 7 02:16:17 hqnl0246134 sshd[277520]: Invalid user vz from 128.199.16.6 port 43734', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0462 seconds
INFO [2022-12-07 02:16:19,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372179.598379, 'message': 'Dec 7 02:16:18 hqnl0246134 sshd[277516]: Failed password for root from 61.177.173.18 port 16637 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0470 seconds
INFO [2022-12-07 02:16:19,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.153.40', 'timestamp': 1670372179.5984848, 'message': 'Dec 7 02:16:19 hqnl0246134 sshd[277527]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.153.40 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0472 seconds
INFO [2022-12-07 02:16:19,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372179.5981162, 'message': 'Dec 7 02:16:17 hqnl0246134 sshd[277520]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.16.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 02:16:19,682] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.153.40', 'timestamp': 1670372179.5985932, 'message': 'Dec 7 02:16:19 hqnl0246134 sshd[277527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.153.40 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-07 02:16:19,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372179.5982409, 'message': 'Dec 7 02:16:17 hqnl0246134 sshd[277520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.16.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 02:16:20,851] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:16:20,851] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:16:20,858] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:16:20,871] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-07 02:16:21,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372181.6001005, 'message': 'Dec 7 02:16:20 hqnl0246134 sshd[277520]: Failed password for invalid user vz from 128.199.16.6 port 43734 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0405 seconds
INFO [2022-12-07 02:16:21,642] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '137.184.153.40', 'timestamp': 1670372181.6005292, 'message': 'Dec 7 02:16:21 hqnl0246134 sshd[277527]: Failed password for root from 137.184.153.40 port 43740 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0403 seconds
INFO [2022-12-07 02:16:21,658] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372181.600378, 'message': 'Dec 7 02:16:21 hqnl0246134 sshd[277520]: Disconnected from invalid user vz 128.199.16.6 port 43734 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 02:16:22,013] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 02:16:22,187] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 02:16:22,187] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 02:16:22,188] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 02:16:22,188] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 02:16:22,188] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 02:16:22,197] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 02:16:22,212] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0233 seconds
WARNING [2022-12-07 02:16:22,221] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 02:16:22,224] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:16:22,242] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0352 seconds
INFO [2022-12-07 02:16:22,243] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0337 seconds
INFO [2022-12-07 02:16:23,631] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372183.6009822, 'message': 'Dec 7 02:16:21 hqnl0246134 sshd[277516]: Failed password for root from 61.177.173.18 port 16637 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-07 02:16:23,632] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.19.166', 'timestamp': 1670372183.6012177, 'message': 'Dec 7 02:16:22 hqnl0246134 sshd[277534]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.19.166 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-07 02:16:23,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.19.166', 'timestamp': 1670372183.6013331, 'message': 'Dec 7 02:16:22 hqnl0246134 sshd[277534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.19.166 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:16:25,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.197.19.166', 'timestamp': 1670372185.604904, 'message': 'Dec 7 02:16:24 hqnl0246134 sshd[277534]: Failed password for root from 138.197.19.166 port 34488 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0417 seconds
INFO [2022-12-07 02:16:25,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372185.605289, 'message': 'Dec 7 02:16:24 hqnl0246134 sshd[277516]: Failed password for root from 61.177.173.18 port 16637 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0419 seconds
INFO [2022-12-07 02:16:37,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372197.6254132, 'message': 'Dec 7 02:16:36 hqnl0246134 sshd[277546]: Invalid user rex from 185.233.36.187 port 43616', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 02:16:37,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372197.6261578, 'message': 'Dec 7 02:16:36 hqnl0246134 sshd[277546]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.233.36.187 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 02:16:37,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372197.626266, 'message': 'Dec 7 02:16:36 hqnl0246134 sshd[277546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.233.36.187 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:16:39,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372199.6262586, 'message': 'Dec 7 02:16:39 hqnl0246134 sshd[277546]: Failed password for invalid user rex from 185.233.36.187 port 43616 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 02:16:41,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372201.6287427, 'message': 'Dec 7 02:16:40 hqnl0246134 sshd[277546]: Disconnected from invalid user rex 185.233.36.187 port 43616 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 02:16:44,437] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:16:44,437] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:16:44,444] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:16:44,456] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-07 02:16:47,675] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.255.168.152', 'timestamp': 1670372207.6550987, 'message': 'Dec 7 02:16:46 hqnl0246134 sshd[277553]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.255.168.152 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 02:16:47,693] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.255.168.152', 'timestamp': 1670372207.6554341, 'message': 'Dec 7 02:16:46 hqnl0246134 sshd[277553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.152 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 02:16:49,701] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.255.168.152', 'timestamp': 1670372209.66645, 'message': 'Dec 7 02:16:48 hqnl0246134 sshd[277553]: Failed password for root from 51.255.168.152 port 45102 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0339 seconds
WARNING [2022-12-07 02:16:50,513] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:16:50,514] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:16:52,336] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 02:16:52,337] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 02:16:52,338] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-07 02:17:03,716] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372223.6906474, 'message': 'Dec 7 02:17:02 hqnl0246134 sshd[277566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0246 seconds
INFO [2022-12-07 02:17:03,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372223.6912723, 'message': 'Dec 7 02:17:03 hqnl0246134 sshd[277566]: Failed password for root from 61.177.173.18 port 31958 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-07 02:17:11,852] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:17:11,882] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0428 seconds
INFO [2022-12-07 02:17:18,002] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:17:18,002] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:17:18,009] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:17:18,020] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0168 seconds
INFO [2022-12-07 02:17:21,705] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:17:21,706] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:17:21,714] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:17:21,725] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-07 02:17:27,753] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '92.106.169.34', 'timestamp': 1670372247.7334678, 'message': 'Dec 7 02:17:27 hqnl0246134 sshd[277608]: pam_imunify(sshd:auth): [IM360_RBL] The IP 92.106.169.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 02:17:27,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '92.106.169.34', 'timestamp': 1670372247.7338312, 'message': 'Dec 7 02:17:27 hqnl0246134 sshd[277608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.106.169.34 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 02:17:29,757] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '92.106.169.34', 'timestamp': 1670372249.7361758, 'message': 'Dec 7 02:17:29 hqnl0246134 sshd[277608]: Failed password for root from 92.106.169.34 port 46420 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 02:17:33,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.131.35.194', 'timestamp': 1670372253.7428086, 'message': 'Dec 7 02:17:32 hqnl0246134 sshd[277611]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.131.35.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-07 02:17:33,807] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.131.35.194', 'timestamp': 1670372253.7431364, 'message': 'Dec 7 02:17:32 hqnl0246134 sshd[277611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.35.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 02:17:35,765] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.131.35.194', 'timestamp': 1670372255.746982, 'message': 'Dec 7 02:17:34 hqnl0246134 sshd[277611]: Failed password for root from 43.131.35.194 port 59214 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:17:41,790] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372261.7571976, 'message': 'Dec 7 02:17:41 hqnl0246134 sshd[277613]: Invalid user ubuntu from 92.118.207.11 port 53242', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 02:17:41,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372261.7574217, 'message': 'Dec 7 02:17:41 hqnl0246134 sshd[277613]: pam_imunify(sshd:auth): [IM360_RBL] The IP 92.118.207.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-07 02:17:41,850] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372261.7576523, 'message': 'Dec 7 02:17:41 hqnl0246134 sshd[277613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.118.207.11 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0256 seconds
INFO [2022-12-07 02:17:43,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372263.7606447, 'message': 'Dec 7 02:17:43 hqnl0246134 sshd[277613]: Failed password for invalid user ubuntu from 92.118.207.11 port 53242 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-07 02:17:43,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372263.761024, 'message': 'Dec 7 02:17:43 hqnl0246134 sshd[277613]: Disconnected from invalid user ubuntu 92.118.207.11 port 53242 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 02:17:47,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372267.7727523, 'message': 'Dec 7 02:17:47 hqnl0246134 sshd[277617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-07 02:17:49,805] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372269.777338, 'message': 'Dec 7 02:17:49 hqnl0246134 sshd[277617]: Failed password for root from 61.177.173.18 port 54337 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0275 seconds
WARNING [2022-12-07 02:17:50,518] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:17:50,519] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:17:51,801] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372271.781093, 'message': 'Dec 7 02:17:51 hqnl0246134 sshd[277620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 02:17:53,833] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372273.7851906, 'message': 'Dec 7 02:17:53 hqnl0246134 sshd[277620]: Failed password for root from 165.227.166.207 port 52246 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0472 seconds
INFO [2022-12-07 02:17:53,834] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.17.229.65', 'timestamp': 1670372273.785368, 'message': 'Dec 7 02:17:53 hqnl0246134 sshd[277622]: Invalid user steam from 185.17.229.65 port 10005', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0476 seconds
INFO [2022-12-07 02:17:53,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372273.785798, 'message': 'Dec 7 02:17:53 hqnl0246134 sshd[277617]: Failed password for root from 61.177.173.18 port 54337 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0473 seconds
INFO [2022-12-07 02:17:53,854] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.17.229.65', 'timestamp': 1670372273.7855043, 'message': 'Dec 7 02:17:53 hqnl0246134 sshd[277622]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.17.229.65 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 02:17:53,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.17.229.65', 'timestamp': 1670372273.78565, 'message': 'Dec 7 02:17:53 hqnl0246134 sshd[277622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.17.229.65 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:17:55,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.17.229.65', 'timestamp': 1670372275.7891817, 'message': 'Dec 7 02:17:55 hqnl0246134 sshd[277622]: Failed password for invalid user steam from 185.17.229.65 port 10005 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 02:17:57,543] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:17:57,544] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:17:57,553] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:17:57,564] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-07 02:17:57,839] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372277.7906861, 'message': 'Dec 7 02:17:55 hqnl0246134 sshd[277617]: Failed password for root from 61.177.173.18 port 54337 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0479 seconds
INFO [2022-12-07 02:17:57,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.17.16.196', 'timestamp': 1670372277.7916973, 'message': 'Dec 7 02:17:56 hqnl0246134 sshd[277634]: Invalid user mysqler from 134.17.16.196 port 9397', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0475 seconds
INFO [2022-12-07 02:17:57,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '185.17.229.65', 'timestamp': 1670372277.7922008, 'message': 'Dec 7 02:17:57 hqnl0246134 sshd[277622]: Disconnected from invalid user steam 185.17.229.65 port 10005 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0467 seconds
INFO [2022-12-07 02:17:57,858] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.17.16.196', 'timestamp': 1670372277.7918406, 'message': 'Dec 7 02:17:56 hqnl0246134 sshd[277634]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.17.16.196 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:17:57,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.17.16.196', 'timestamp': 1670372277.7920322, 'message': 'Dec 7 02:17:56 hqnl0246134 sshd[277634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.196 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 02:17:59,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.17.16.196', 'timestamp': 1670372279.793001, 'message': 'Dec 7 02:17:58 hqnl0246134 sshd[277634]: Failed password for invalid user mysqler from 134.17.16.196 port 9397 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:17:59,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.17.16.196', 'timestamp': 1670372279.793203, 'message': 'Dec 7 02:17:58 hqnl0246134 sshd[277634]: Disconnected from invalid user mysqler 134.17.16.196 port 9397 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0186 seconds
WARNING [2022-12-07 02:18:11,853] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:18:11,859] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372291.8234046, 'message': 'Dec 7 02:18:09 hqnl0246134 sshd[277672]: Invalid user user2 from 159.89.8.45 port 39676', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0348 seconds
INFO [2022-12-07 02:18:11,899] defence360agent.internals.the_sink: SensorIncidentList(<21 item(s)>) processed in 0.0586 seconds
INFO [2022-12-07 02:18:11,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372291.8238802, 'message': 'Dec 7 02:18:10 hqnl0246134 sshd[277672]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.89.8.45 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0482 seconds
INFO [2022-12-07 02:18:11,926] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372291.824031, 'message': 'Dec 7 02:18:10 hqnl0246134 sshd[277672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.8.45 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:18:13,847] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372293.8280828, 'message': 'Dec 7 02:18:11 hqnl0246134 sshd[277672]: Failed password for invalid user user2 from 159.89.8.45 port 39676 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 02:18:13,865] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372293.8284035, 'message': 'Dec 7 02:18:12 hqnl0246134 sshd[277672]: Disconnected from invalid user user2 159.89.8.45 port 39676 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 02:18:17,755] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:18:17,755] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:18:17,762] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:18:17,773] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-07 02:18:20,569] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:18:20,570] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:18:20,579] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:18:20,593] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-07 02:18:27,902] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372307.843464, 'message': 'Dec 7 02:18:26 hqnl0246134 sshd[277687]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0571 seconds
INFO [2022-12-07 02:18:27,905] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.110.134.13', 'timestamp': 1670372307.844317, 'message': 'Dec 7 02:18:27 hqnl0246134 sshd[277697]: Invalid user mukesh from 194.110.134.13 port 37096', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0575 seconds
INFO [2022-12-07 02:18:27,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372307.8440669, 'message': 'Dec 7 02:18:26 hqnl0246134 sshd[277687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0384 seconds
INFO [2022-12-07 02:18:27,943] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '194.110.134.13', 'timestamp': 1670372307.844595, 'message': 'Dec 7 02:18:27 hqnl0246134 sshd[277697]: pam_imunify(sshd:auth): [IM360_RBL] The IP 194.110.134.13 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0376 seconds
INFO [2022-12-07 02:18:27,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.110.134.13', 'timestamp': 1670372307.84482, 'message': 'Dec 7 02:18:27 hqnl0246134 sshd[277697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.134.13 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 02:18:29,874] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372309.842897, 'message': 'Dec 7 02:18:28 hqnl0246134 sshd[277687]: Failed password for root from 61.177.173.39 port 40945 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 02:18:29,875] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.110.134.13', 'timestamp': 1670372309.8431108, 'message': 'Dec 7 02:18:28 hqnl0246134 sshd[277697]: Failed password for invalid user mukesh from 194.110.134.13 port 37096 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 02:18:31,892] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.110.134.13', 'timestamp': 1670372311.8463893, 'message': 'Dec 7 02:18:29 hqnl0246134 sshd[277697]: Disconnected from invalid user mukesh 194.110.134.13 port 37096 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0452 seconds
INFO [2022-12-07 02:18:31,893] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372311.8466473, 'message': 'Dec 7 02:18:30 hqnl0246134 sshd[277687]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0456 seconds
INFO [2022-12-07 02:18:31,893] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372311.8468146, 'message': 'Dec 7 02:18:31 hqnl0246134 sshd[277700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0454 seconds
INFO [2022-12-07 02:18:33,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372313.8460917, 'message': 'Dec 7 02:18:32 hqnl0246134 sshd[277687]: Failed password for root from 61.177.173.39 port 40945 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-07 02:18:33,879] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372313.8463736, 'message': 'Dec 7 02:18:33 hqnl0246134 sshd[277700]: Failed password for root from 61.177.173.18 port 63260 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-07 02:18:35,881] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372315.852364, 'message': 'Dec 7 02:18:34 hqnl0246134 sshd[277687]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-07 02:18:35,882] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372315.8532336, 'message': 'Dec 7 02:18:35 hqnl0246134 sshd[277700]: Failed password for root from 61.177.173.18 port 63260 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-07 02:18:37,904] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372317.8542688, 'message': 'Dec 7 02:18:36 hqnl0246134 sshd[277687]: Failed password for root from 61.177.173.39 port 40945 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0500 seconds
INFO [2022-12-07 02:18:37,908] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372317.8578951, 'message': 'Dec 7 02:18:37 hqnl0246134 sshd[277700]: Failed password for root from 61.177.173.18 port 63260 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0496 seconds
INFO [2022-12-07 02:18:45,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '20.107.61.88', 'timestamp': 1670372325.8704736, 'message': 'Dec 7 02:18:45 hqnl0246134 sshd[277704]: pam_imunify(sshd:auth): [IM360_RBL] The IP 20.107.61.88 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:18:45,909] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '20.107.61.88', 'timestamp': 1670372325.8706703, 'message': 'Dec 7 02:18:45 hqnl0246134 sshd[277704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.107.61.88 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 02:18:47,889] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '20.107.61.88', 'timestamp': 1670372327.8715658, 'message': 'Dec 7 02:18:47 hqnl0246134 sshd[277704]: Failed password for root from 20.107.61.88 port 56882 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-07 02:18:50,526] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:18:50,526] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:19:01,938] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372341.8972216, 'message': 'Dec 7 02:19:00 hqnl0246134 sshd[277719]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0396 seconds
INFO [2022-12-07 02:19:01,940] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.153.40', 'timestamp': 1670372341.8977368, 'message': 'Dec 7 02:19:00 hqnl0246134 sshd[277721]: Invalid user vncuser from 137.184.153.40 port 34294', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0397 seconds
INFO [2022-12-07 02:19:01,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372341.8975744, 'message': 'Dec 7 02:19:00 hqnl0246134 sshd[277719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-07 02:19:01,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '137.184.153.40', 'timestamp': 1670372341.8978446, 'message': 'Dec 7 02:19:00 hqnl0246134 sshd[277721]: pam_imunify(sshd:auth): [IM360_RBL] The IP 137.184.153.40 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-07 02:19:01,992] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '137.184.153.40', 'timestamp': 1670372341.8980072, 'message': 'Dec 7 02:19:00 hqnl0246134 sshd[277721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.153.40 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 02:19:03,948] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372343.8983078, 'message': 'Dec 7 02:19:02 hqnl0246134 sshd[277719]: Failed password for root from 61.177.173.39 port 36168 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0498 seconds
INFO [2022-12-07 02:19:03,949] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.153.40', 'timestamp': 1670372343.8985837, 'message': 'Dec 7 02:19:03 hqnl0246134 sshd[277721]: Failed password for invalid user vncuser from 137.184.153.40 port 34294 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0500 seconds
INFO [2022-12-07 02:19:05,950] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372345.901686, 'message': 'Dec 7 02:19:04 hqnl0246134 sshd[277719]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0475 seconds
INFO [2022-12-07 02:19:05,956] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '137.184.153.40', 'timestamp': 1670372345.9122443, 'message': 'Dec 7 02:19:05 hqnl0246134 sshd[277721]: Disconnected from invalid user vncuser 137.184.153.40 port 34294 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0438 seconds
INFO [2022-12-07 02:19:07,937] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:19:07,938] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:19:07,951] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:19:07,972] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0328 seconds
INFO [2022-12-07 02:19:07,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372347.9400675, 'message': 'Dec 7 02:19:06 hqnl0246134 sshd[277719]: Failed password for root from 61.177.173.39 port 36168 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-07 02:19:09,930] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372349.9084756, 'message': 'Dec 7 02:19:08 hqnl0246134 sshd[277719]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
WARNING [2022-12-07 02:19:11,852] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:19:11,881] defence360agent.internals.the_sink: SensorIncidentList(<17 item(s)>) processed in 0.0373 seconds
INFO [2022-12-07 02:19:11,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372351.9097867, 'message': 'Dec 7 02:19:10 hqnl0246134 sshd[277719]: Failed password for root from 61.177.173.39 port 36168 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 02:19:13,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.19.166', 'timestamp': 1670372353.91304, 'message': 'Dec 7 02:19:12 hqnl0246134 sshd[277737]: Invalid user jan from 138.197.19.166 port 51890', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0337 seconds
INFO [2022-12-07 02:19:13,950] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372353.9134357, 'message': 'Dec 7 02:19:12 hqnl0246134 sshd[277739]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.233.36.187 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 02:19:13,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.197.19.166', 'timestamp': 1670372353.913218, 'message': 'Dec 7 02:19:12 hqnl0246134 sshd[277737]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.197.19.166 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0342 seconds
INFO [2022-12-07 02:19:13,983] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372353.9138212, 'message': 'Dec 7 02:19:12 hqnl0246134 sshd[277739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.233.36.187 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0333 seconds
INFO [2022-12-07 02:19:14,003] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.197.19.166', 'timestamp': 1670372353.9133308, 'message': 'Dec 7 02:19:12 hqnl0246134 sshd[277737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.19.166 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 02:19:15,959] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.19.166', 'timestamp': 1670372355.9166622, 'message': 'Dec 7 02:19:13 hqnl0246134 sshd[277737]: Failed password for invalid user jan from 138.197.19.166 port 51890 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0418 seconds
INFO [2022-12-07 02:19:15,960] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372355.9169488, 'message': 'Dec 7 02:19:14 hqnl0246134 sshd[277739]: Failed password for root from 185.233.36.187 port 56222 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0424 seconds
INFO [2022-12-07 02:19:15,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372355.9170632, 'message': 'Dec 7 02:19:14 hqnl0246134 sshd[277736]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0426 seconds
INFO [2022-12-07 02:19:15,994] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '138.197.19.166', 'timestamp': 1670372355.9173, 'message': 'Dec 7 02:19:15 hqnl0246134 sshd[277737]: Disconnected from invalid user jan 138.197.19.166 port 51890 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-07 02:19:15,995] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372355.917196, 'message': 'Dec 7 02:19:14 hqnl0246134 sshd[277736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-07 02:19:17,810] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:19:17,811] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:19:17,820] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:19:17,835] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0236 seconds
INFO [2022-12-07 02:19:17,954] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372357.9189067, 'message': 'Dec 7 02:19:17 hqnl0246134 sshd[277736]: Failed password for root from 61.177.173.39 port 63519 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-07 02:19:17,955] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372357.9191916, 'message': 'Dec 7 02:19:17 hqnl0246134 sshd[277744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-07 02:19:19,973] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372359.921206, 'message': 'Dec 7 02:19:19 hqnl0246134 sshd[277736]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0515 seconds
INFO [2022-12-07 02:19:19,974] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372359.921449, 'message': 'Dec 7 02:19:19 hqnl0246134 sshd[277744]: Failed password for root from 61.177.173.18 port 31256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0517 seconds
INFO [2022-12-07 02:19:20,852] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:19:20,852] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:19:20,859] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:19:20,871] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 02:19:21,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372361.9225597, 'message': 'Dec 7 02:19:20 hqnl0246134 sshd[277752]: Invalid user ts3srv from 128.199.16.6 port 33056', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0377 seconds
INFO [2022-12-07 02:19:21,963] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372361.9230626, 'message': 'Dec 7 02:19:21 hqnl0246134 sshd[277736]: Failed password for root from 61.177.173.39 port 63519 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-07 02:19:21,997] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372361.9227798, 'message': 'Dec 7 02:19:20 hqnl0246134 sshd[277752]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.16.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-07 02:19:21,998] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372361.923192, 'message': 'Dec 7 02:19:21 hqnl0246134 sshd[277736]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-07 02:19:22,018] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372361.9229198, 'message': 'Dec 7 02:19:20 hqnl0246134 sshd[277752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.16.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 02:19:22,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372361.9233346, 'message': 'Dec 7 02:19:21 hqnl0246134 sshd[277752]: Failed password for invalid user ts3srv from 128.199.16.6 port 33056 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:19:24,006] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372363.9294434, 'message': 'Dec 7 02:19:22 hqnl0246134 sshd[277752]: Disconnected from invalid user ts3srv 128.199.16.6 port 33056 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0749 seconds
INFO [2022-12-07 02:19:24,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670372363.9298768, 'message': 'Dec 7 02:19:23 hqnl0246134 sshd[277736]: Failed password for root from 61.177.173.39 port 63519 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0754 seconds
INFO [2022-12-07 02:19:24,008] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372363.9301143, 'message': 'Dec 7 02:19:23 hqnl0246134 sshd[277744]: Failed password for root from 61.177.173.18 port 31256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0748 seconds
INFO [2022-12-07 02:19:29,981] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372369.9436316, 'message': 'Dec 7 02:19:27 hqnl0246134 sshd[277744]: Failed password for root from 61.177.173.18 port 31256 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-07 02:19:31,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '51.255.168.152', 'timestamp': 1670372371.9486465, 'message': 'Dec 7 02:19:31 hqnl0246134 sshd[277769]: pam_imunify(sshd:auth): [IM360_RBL] The IP 51.255.168.152 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 02:19:31,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '51.255.168.152', 'timestamp': 1670372371.9488766, 'message': 'Dec 7 02:19:31 hqnl0246134 sshd[277769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.152 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 02:19:33,972] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '51.255.168.152', 'timestamp': 1670372373.9525936, 'message': 'Dec 7 02:19:32 hqnl0246134 sshd[277769]: Failed password for root from 51.255.168.152 port 41258 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
WARNING [2022-12-07 02:19:50,532] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:19:50,533] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:20:04,023] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372404.001531, 'message': 'Dec 7 02:20:03 hqnl0246134 sshd[277806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-07 02:20:06,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372406.0060208, 'message': 'Dec 7 02:20:04 hqnl0246134 sshd[277809]: Invalid user huawei from 165.227.166.207 port 34300', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 02:20:06,048] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372406.006215, 'message': 'Dec 7 02:20:04 hqnl0246134 sshd[277809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 02:20:08,039] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372408.008519, 'message': 'Dec 7 02:20:06 hqnl0246134 sshd[277806]: Failed password for root from 61.177.173.18 port 49539 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-07 02:20:08,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372408.0087237, 'message': 'Dec 7 02:20:07 hqnl0246134 sshd[277809]: Failed password for invalid user huawei from 165.227.166.207 port 34300 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-07 02:20:10,028] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372410.011904, 'message': 'Dec 7 02:20:09 hqnl0246134 sshd[277809]: Disconnected from invalid user huawei 165.227.166.207 port 34300 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0166 seconds
WARNING [2022-12-07 02:20:11,860] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:20:11,889] defence360agent.internals.the_sink: SensorIncidentList(<19 item(s)>) processed in 0.0390 seconds
INFO [2022-12-07 02:20:12,036] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372412.0152895, 'message': 'Dec 7 02:20:10 hqnl0246134 sshd[277806]: Failed password for root from 61.177.173.18 port 49539 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-07 02:20:14,053] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372414.0176275, 'message': 'Dec 7 02:20:12 hqnl0246134 sshd[277821]: pam_imunify(sshd:auth): [IM360_RBL] The IP 92.118.207.11 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0346 seconds
INFO [2022-12-07 02:20:14,054] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372414.0181642, 'message': 'Dec 7 02:20:12 hqnl0246134 sshd[277806]: Failed password for root from 61.177.173.18 port 49539 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0349 seconds
INFO [2022-12-07 02:20:14,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372414.01794, 'message': 'Dec 7 02:20:12 hqnl0246134 sshd[277821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.118.207.11 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 02:20:16,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '92.118.207.11', 'timestamp': 1670372416.0187628, 'message': 'Dec 7 02:20:15 hqnl0246134 sshd[277821]: Failed password for root from 92.118.207.11 port 50572 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0362 seconds
INFO [2022-12-07 02:20:17,555] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:20:17,556] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:20:17,572] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:20:17,604] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0427 seconds
INFO [2022-12-07 02:20:18,040] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '43.131.35.194', 'timestamp': 1670372418.0207913, 'message': 'Dec 7 02:20:17 hqnl0246134 sshd[277830]: pam_imunify(sshd:auth): [IM360_RBL] The IP 43.131.35.194 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 02:20:18,059] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '43.131.35.194', 'timestamp': 1670372418.0209856, 'message': 'Dec 7 02:20:17 hqnl0246134 sshd[277830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.35.194 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:20:18,218] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:20:18,219] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:20:18,226] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:20:18,237] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-07 02:20:20,055] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '43.131.35.194', 'timestamp': 1670372420.0219269, 'message': 'Dec 7 02:20:19 hqnl0246134 sshd[277830]: Failed password for root from 43.131.35.194 port 39514 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0327 seconds
INFO [2022-12-07 02:20:20,818] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:20:20,818] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:20:20,826] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:20:20,839] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-07 02:20:34,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '92.106.169.34', 'timestamp': 1670372434.0451798, 'message': 'Dec 7 02:20:33 hqnl0246134 sshd[277852]: pam_imunify(sshd:auth): [IM360_RBL] The IP 92.106.169.34 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-07 02:20:34,089] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '92.106.169.34', 'timestamp': 1670372434.0456975, 'message': 'Dec 7 02:20:33 hqnl0246134 sshd[277852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.106.169.34 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 02:20:36,070] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '92.106.169.34', 'timestamp': 1670372436.0480452, 'message': 'Dec 7 02:20:35 hqnl0246134 sshd[277852]: Failed password for root from 92.106.169.34 port 35802 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0218 seconds
WARNING [2022-12-07 02:20:50,537] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:20:50,538] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:20:52,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372452.0934358, 'message': 'Dec 7 02:20:50 hqnl0246134 sshd[277857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-07 02:20:52,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.17.229.65', 'timestamp': 1670372452.0937636, 'message': 'Dec 7 02:20:51 hqnl0246134 sshd[277860]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.17.229.65 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-07 02:20:52,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.17.229.65', 'timestamp': 1670372452.0939622, 'message': 'Dec 7 02:20:51 hqnl0246134 sshd[277860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.17.229.65 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-07 02:20:54,135] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372454.1062067, 'message': 'Dec 7 02:20:52 hqnl0246134 sshd[277857]: Failed password for root from 61.177.173.18 port 11379 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 02:20:54,136] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '185.17.229.65', 'timestamp': 1670372454.10655, 'message': 'Dec 7 02:20:53 hqnl0246134 sshd[277860]: Failed password for root from 185.17.229.65 port 59871 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 02:20:58,144] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372458.122723, 'message': 'Dec 7 02:20:56 hqnl0246134 sshd[277857]: Failed password for root from 61.177.173.18 port 11379 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 02:21:02,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372462.1390545, 'message': 'Dec 7 02:21:01 hqnl0246134 sshd[277857]: Failed password for root from 61.177.173.18 port 11379 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
WARNING [2022-12-07 02:21:11,864] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:21:11,891] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.0367 seconds
INFO [2022-12-07 02:21:17,791] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:21:17,791] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:21:17,798] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:21:17,810] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 02:21:20,711] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:21:20,712] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:21:20,721] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:21:20,736] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
INFO [2022-12-07 02:21:38,233] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372498.2027593, 'message': 'Dec 7 02:21:37 hqnl0246134 sshd[277905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-07 02:21:40,229] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372500.2040782, 'message': 'Dec 7 02:21:39 hqnl0246134 sshd[277905]: Failed password for root from 61.177.173.18 port 24462 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0243 seconds
WARNING [2022-12-07 02:21:50,541] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:21:50,543] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:21:50,674] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:21:50,674] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:21:50,682] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:21:50,693] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
WARNING [2022-12-07 02:21:54,136] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
INFO [2022-12-07 02:21:54,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372514.2228138, 'message': 'Dec 7 02:21:53 hqnl0246134 sshd[277913]: pam_imunify(sshd:auth): [IM360_RBL] The IP 185.233.36.187 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 02:21:54,264] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372514.2245488, 'message': 'Dec 7 02:21:53 hqnl0246134 sshd[277913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.233.36.187 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 02:21:56,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '185.233.36.187', 'timestamp': 1670372516.2431667, 'message': 'Dec 7 02:21:55 hqnl0246134 sshd[277913]: Failed password for root from 185.233.36.187 port 48240 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-07 02:22:00,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372520.233825, 'message': 'Dec 7 02:21:59 hqnl0246134 sshd[277915]: Invalid user sampserver from 159.89.8.45 port 57176', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:22:00,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372520.2340584, 'message': 'Dec 7 02:21:59 hqnl0246134 sshd[277915]: pam_imunify(sshd:auth): [IM360_RBL] The IP 159.89.8.45 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:22:00,289] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372520.2342176, 'message': 'Dec 7 02:21:59 hqnl0246134 sshd[277915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.8.45 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 02:22:02,254] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372522.2339106, 'message': 'Dec 7 02:22:01 hqnl0246134 sshd[277915]: Failed password for invalid user sampserver from 159.89.8.45 port 57176 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 02:22:04,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '159.89.8.45', 'timestamp': 1670372524.2369404, 'message': 'Dec 7 02:22:02 hqnl0246134 sshd[277915]: Disconnected from invalid user sampserver 159.89.8.45 port 57176 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0207 seconds
WARNING [2022-12-07 02:22:11,868] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:22:11,889] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0283 seconds
INFO [2022-12-07 02:22:17,694] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:22:17,695] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:22:17,703] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:22:17,714] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 02:22:20,272] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:22:20,273] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:22:20,285] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:22:20,303] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0292 seconds
INFO [2022-12-07 02:22:20,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372540.2749808, 'message': 'Dec 7 02:22:19 hqnl0246134 sshd[277952]: Invalid user huawei from 165.227.166.207 port 44586', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-07 02:22:20,322] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372540.2751393, 'message': 'Dec 7 02:22:19 hqnl0246134 sshd[277952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:22:22,293] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372542.2758255, 'message': 'Dec 7 02:22:21 hqnl0246134 sshd[277952]: Failed password for invalid user huawei from 165.227.166.207 port 44586 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 02:22:22,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372542.2760487, 'message': 'Dec 7 02:22:21 hqnl0246134 sshd[277952]: Disconnected from invalid user huawei 165.227.166.207 port 44586 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:22:26,383] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372546.3047187, 'message': 'Dec 7 02:22:24 hqnl0246134 sshd[277960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0778 seconds
INFO [2022-12-07 02:22:28,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372548.284814, 'message': 'Dec 7 02:22:26 hqnl0246134 sshd[277960]: Failed password for root from 61.177.173.18 port 38589 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-07 02:22:28,320] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372548.2852159, 'message': 'Dec 7 02:22:26 hqnl0246134 sshd[277962]: Invalid user openhab from 128.199.16.6 port 50608', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-07 02:22:28,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372548.285372, 'message': 'Dec 7 02:22:27 hqnl0246134 sshd[277962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 128.199.16.6 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:22:28,359] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372548.2854996, 'message': 'Dec 7 02:22:27 hqnl0246134 sshd[277962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.16.6 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:22:30,304] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372550.286695, 'message': 'Dec 7 02:22:28 hqnl0246134 sshd[277962]: Failed password for invalid user openhab from 128.199.16.6 port 50608 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:22:32,339] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '128.199.16.6', 'timestamp': 1670372552.2897468, 'message': 'Dec 7 02:22:30 hqnl0246134 sshd[277962]: Disconnected from invalid user openhab 128.199.16.6 port 50608 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0486 seconds
INFO [2022-12-07 02:22:32,340] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372552.2900994, 'message': 'Dec 7 02:22:30 hqnl0246134 sshd[277960]: Failed password for root from 61.177.173.18 port 38589 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0488 seconds
INFO [2022-12-07 02:22:36,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372556.293166, 'message': 'Dec 7 02:22:34 hqnl0246134 sshd[277960]: Failed password for root from 61.177.173.18 port 38589 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0224 seconds
WARNING [2022-12-07 02:22:50,548] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:22:50,551] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:23:05,325] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 02:23:05,397] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 02:23:05,398] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 02:23:05,398] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 02:23:05,398] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 02:23:05,399] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 02:23:05,410] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 02:23:05,428] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0288 seconds
WARNING [2022-12-07 02:23:05,435] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 02:23:05,438] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:23:05,455] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0329 seconds
INFO [2022-12-07 02:23:05,456] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0307 seconds
WARNING [2022-12-07 02:23:11,875] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:23:11,895] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0273 seconds
INFO [2022-12-07 02:23:12,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372592.358071, 'message': 'Dec 7 02:23:10 hqnl0246134 sshd[278018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 02:23:12,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372592.3583353, 'message': 'Dec 7 02:23:12 hqnl0246134 sshd[278018]: Failed password for root from 61.177.173.18 port 58414 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 02:23:18,694] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:23:18,695] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:23:18,702] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:23:18,713] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-07 02:23:20,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372600.3665867, 'message': 'Dec 7 02:23:15 hqnl0246134 sshd[278018]: Failed password for root from 61.177.173.18 port 58414 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-07 02:23:20,406] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372600.3730373, 'message': 'Dec 7 02:23:19 hqnl0246134 sshd[278023]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0328 seconds
INFO [2022-12-07 02:23:20,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372600.3669567, 'message': 'Dec 7 02:23:19 hqnl0246134 sshd[278018]: Failed password for root from 61.177.173.18 port 58414 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0324 seconds
INFO [2022-12-07 02:23:20,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372600.3731933, 'message': 'Dec 7 02:23:19 hqnl0246134 sshd[278023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 02:23:21,738] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:23:21,739] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:23:21,748] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:23:21,763] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0233 seconds
INFO [2022-12-07 02:23:22,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372602.368449, 'message': 'Dec 7 02:23:20 hqnl0246134 sshd[278023]: Failed password for root from 61.177.172.104 port 28720 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 02:23:22,406] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372602.3686655, 'message': 'Dec 7 02:23:21 hqnl0246134 sshd[278023]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 02:23:23,922] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:23:23,922] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:23:23,930] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:23:23,941] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 02:23:24,389] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372604.3697922, 'message': 'Dec 7 02:23:23 hqnl0246134 sshd[278023]: Failed password for root from 61.177.172.104 port 28720 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 02:23:24,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372604.3699932, 'message': 'Dec 7 02:23:23 hqnl0246134 sshd[278023]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:23:26,390] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372606.3711157, 'message': 'Dec 7 02:23:25 hqnl0246134 sshd[278023]: Failed password for root from 61.177.172.104 port 28720 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 02:23:28,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372608.374905, 'message': 'Dec 7 02:23:27 hqnl0246134 sshd[278039]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-07 02:23:28,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372608.3758953, 'message': 'Dec 7 02:23:27 hqnl0246134 sshd[278039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:23:30,400] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372610.376389, 'message': 'Dec 7 02:23:29 hqnl0246134 sshd[278039]: Failed password for root from 61.177.172.104 port 41841 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-07 02:23:30,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372610.3766546, 'message': 'Dec 7 02:23:30 hqnl0246134 sshd[278039]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:23:32,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372612.3784986, 'message': 'Dec 7 02:23:32 hqnl0246134 sshd[278039]: Failed password for root from 61.177.172.104 port 41841 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 02:23:34,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372614.3813484, 'message': 'Dec 7 02:23:32 hqnl0246134 sshd[278039]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-07 02:23:34,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372614.3817575, 'message': 'Dec 7 02:23:34 hqnl0246134 sshd[278039]: Failed password for root from 61.177.172.104 port 41841 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 02:23:36,122] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 02:23:36,123] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 02:23:36,124] im360.plugins.client360: Waiting 5 minutes before retry...
INFO [2022-12-07 02:23:42,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372622.3938935, 'message': 'Dec 7 02:23:41 hqnl0246134 sshd[278050]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-07 02:23:42,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372622.394355, 'message': 'Dec 7 02:23:41 hqnl0246134 sshd[278050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 02:23:44,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372624.3937802, 'message': 'Dec 7 02:23:43 hqnl0246134 sshd[278050]: Failed password for root from 61.177.172.104 port 30425 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:23:44,431] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372624.3940053, 'message': 'Dec 7 02:23:43 hqnl0246134 sshd[278050]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 02:23:46,415] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372626.3937688, 'message': 'Dec 7 02:23:45 hqnl0246134 sshd[278050]: Failed password for root from 61.177.172.104 port 30425 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-07 02:23:46,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372626.3939693, 'message': 'Dec 7 02:23:46 hqnl0246134 sshd[278050]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-07 02:23:48,417] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372628.3973258, 'message': 'Dec 7 02:23:47 hqnl0246134 sshd[278050]: Failed password for root from 61.177.172.104 port 30425 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:23:50,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372630.3982348, 'message': 'Dec 7 02:23:49 hqnl0246134 sshd[278054]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 02:23:50,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372630.3984773, 'message': 'Dec 7 02:23:49 hqnl0246134 sshd[278054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
WARNING [2022-12-07 02:23:50,554] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:23:50,554] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:23:52,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372632.4027896, 'message': 'Dec 7 02:23:51 hqnl0246134 sshd[278054]: Failed password for root from 61.177.172.104 port 44712 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0232 seconds
INFO [2022-12-07 02:23:52,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372632.4032128, 'message': 'Dec 7 02:23:52 hqnl0246134 sshd[278054]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:23:54,425] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372634.4059885, 'message': 'Dec 7 02:23:54 hqnl0246134 sshd[278054]: Failed password for root from 61.177.172.104 port 44712 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 02:23:54,443] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372634.4062436, 'message': 'Dec 7 02:23:54 hqnl0246134 sshd[278054]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:23:56,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372636.408431, 'message': 'Dec 7 02:23:54 hqnl0246134 sshd[278056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 02:23:58,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372638.4116578, 'message': 'Dec 7 02:23:56 hqnl0246134 sshd[278054]: Failed password for root from 61.177.172.104 port 44712 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0394 seconds
INFO [2022-12-07 02:23:58,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372638.412051, 'message': 'Dec 7 02:23:57 hqnl0246134 sshd[278056]: Failed password for root from 61.177.173.18 port 14942 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0396 seconds
INFO [2022-12-07 02:24:00,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372640.412337, 'message': 'Dec 7 02:24:00 hqnl0246134 sshd[278067]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-07 02:24:00,471] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372640.4126105, 'message': 'Dec 7 02:24:00 hqnl0246134 sshd[278067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.104 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 02:24:02,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372642.4142947, 'message': 'Dec 7 02:24:01 hqnl0246134 sshd[278056]: Failed password for root from 61.177.173.18 port 14942 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0496 seconds
INFO [2022-12-07 02:24:04,436] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372644.4172227, 'message': 'Dec 7 02:24:02 hqnl0246134 sshd[278067]: Failed password for root from 61.177.172.104 port 20750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 02:24:06,449] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372646.4183424, 'message': 'Dec 7 02:24:04 hqnl0246134 sshd[278067]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 02:24:06,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372646.418564, 'message': 'Dec 7 02:24:05 hqnl0246134 sshd[278056]: Failed password for root from 61.177.173.18 port 14942 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 02:24:06,467] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372646.4186764, 'message': 'Dec 7 02:24:06 hqnl0246134 sshd[278067]: Failed password for root from 61.177.172.104 port 20750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:24:08,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372648.4215684, 'message': 'Dec 7 02:24:06 hqnl0246134 sshd[278067]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.104 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 02:24:10,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.104', 'timestamp': 1670372650.4243784, 'message': 'Dec 7 02:24:09 hqnl0246134 sshd[278067]: Failed password for root from 61.177.172.104 port 20750 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-07 02:24:11,879] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:24:11,902] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0302 seconds
INFO [2022-12-07 02:24:17,924] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:24:17,925] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:24:17,932] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:24:17,943] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-07 02:24:21,634] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:24:21,635] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:24:21,646] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:24:21,658] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0217 seconds
INFO [2022-12-07 02:24:26,464] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372666.4433599, 'message': 'Dec 7 02:24:25 hqnl0246134 sshd[278097]: Invalid user huawei from 165.227.166.207 port 54864', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 02:24:26,485] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372666.4435916, 'message': 'Dec 7 02:24:25 hqnl0246134 sshd[278097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
INFO [2022-12-07 02:24:28,472] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372668.4466846, 'message': 'Dec 7 02:24:27 hqnl0246134 sshd[278097]: Failed password for invalid user huawei from 165.227.166.207 port 54864 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0243 seconds
INFO [2022-12-07 02:24:28,494] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372668.44733, 'message': 'Dec 7 02:24:27 hqnl0246134 sshd[278097]: Disconnected from invalid user huawei 165.227.166.207 port 54864 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 02:24:30,103] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:24:30,104] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:24:30,111] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:24:30,122] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0179 seconds
INFO [2022-12-07 02:24:40,487] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372680.4604893, 'message': 'Dec 7 02:24:39 hqnl0246134 sshd[278116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-07 02:24:42,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372682.4618447, 'message': 'Dec 7 02:24:41 hqnl0246134 sshd[278116]: Failed password for root from 61.177.173.18 port 36807 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-07 02:24:50,558] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:24:50,560] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:25:11,893] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:25:11,921] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0437 seconds
INFO [2022-12-07 02:25:17,783] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:25:17,784] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:25:17,791] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:25:17,802] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0172 seconds
INFO [2022-12-07 02:25:20,577] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:25:20,578] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:25:20,588] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:25:20,593] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372720.5012186, 'message': 'Dec 7 02:25:20 hqnl0246134 sshd[278169]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0917 seconds
INFO [2022-12-07 02:25:20,610] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0313 seconds
INFO [2022-12-07 02:25:20,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372720.5014758, 'message': 'Dec 7 02:25:20 hqnl0246134 sshd[278169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-07 02:25:22,522] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372722.5022326, 'message': 'Dec 7 02:25:22 hqnl0246134 sshd[278169]: Failed password for root from 61.177.173.49 port 18817 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 02:25:24,523] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372724.504018, 'message': 'Dec 7 02:25:22 hqnl0246134 sshd[278169]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:25:26,534] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372726.5059204, 'message': 'Dec 7 02:25:24 hqnl0246134 sshd[278169]: Failed password for root from 61.177.173.49 port 18817 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0280 seconds
INFO [2022-12-07 02:25:26,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372726.5061066, 'message': 'Dec 7 02:25:24 hqnl0246134 sshd[278175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0283 seconds
INFO [2022-12-07 02:25:26,553] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372726.506219, 'message': 'Dec 7 02:25:25 hqnl0246134 sshd[278169]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 02:25:28,539] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372728.5088205, 'message': 'Dec 7 02:25:26 hqnl0246134 sshd[278169]: Failed password for root from 61.177.173.49 port 18817 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 02:25:28,540] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372728.5091584, 'message': 'Dec 7 02:25:27 hqnl0246134 sshd[278175]: Failed password for root from 61.177.173.18 port 51322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0299 seconds
INFO [2022-12-07 02:25:30,541] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372730.5103703, 'message': 'Dec 7 02:25:29 hqnl0246134 sshd[278186]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-07 02:25:30,570] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372730.5105867, 'message': 'Dec 7 02:25:29 hqnl0246134 sshd[278186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.49 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 02:25:32,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372732.5122874, 'message': 'Dec 7 02:25:30 hqnl0246134 sshd[278175]: Failed password for root from 61.177.173.18 port 51322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-07 02:25:32,545] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372732.5124674, 'message': 'Dec 7 02:25:31 hqnl0246134 sshd[278186]: Failed password for root from 61.177.173.49 port 40372 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-07 02:25:32,564] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372732.5126019, 'message': 'Dec 7 02:25:31 hqnl0246134 sshd[278186]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:25:34,544] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372734.5153592, 'message': 'Dec 7 02:25:33 hqnl0246134 sshd[278175]: Failed password for root from 61.177.173.18 port 51322 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 02:25:34,545] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372734.5155625, 'message': 'Dec 7 02:25:33 hqnl0246134 sshd[278186]: Failed password for root from 61.177.173.49 port 40372 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-07 02:25:34,562] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372734.5156884, 'message': 'Dec 7 02:25:33 hqnl0246134 sshd[278186]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.49 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 02:25:36,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.49', 'timestamp': 1670372736.5179906, 'message': 'Dec 7 02:25:35 hqnl0246134 sshd[278186]: Failed password for root from 61.177.173.49 port 40372 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-07 02:25:50,565] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:25:50,567] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:26:11,895] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:26:11,922] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0397 seconds
INFO [2022-12-07 02:26:12,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372772.558045, 'message': 'Dec 7 02:26:10 hqnl0246134 sshd[278214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 02:26:12,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372772.5583398, 'message': 'Dec 7 02:26:12 hqnl0246134 sshd[278214]: Failed password for root from 61.177.173.18 port 19778 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:26:17,872] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:26:17,873] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:26:17,882] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:26:17,895] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-07 02:26:20,105] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:26:20,105] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:26:20,112] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:26:20,123] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-07 02:26:20,701] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:26:20,702] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:26:20,709] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:26:20,721] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-07 02:26:36,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372796.5823529, 'message': 'Dec 7 02:26:34 hqnl0246134 sshd[278245]: Invalid user informix from 165.227.166.207 port 36932', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0350 seconds
INFO [2022-12-07 02:26:36,652] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372796.5829034, 'message': 'Dec 7 02:26:34 hqnl0246134 sshd[278245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-07 02:26:38,603] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372798.5841007, 'message': 'Dec 7 02:26:36 hqnl0246134 sshd[278245]: Failed password for invalid user informix from 165.227.166.207 port 36932 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 02:26:38,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372798.5842993, 'message': 'Dec 7 02:26:38 hqnl0246134 sshd[278245]: Disconnected from invalid user informix 165.227.166.207 port 36932 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
WARNING [2022-12-07 02:26:50,575] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:26:50,576] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:26:58,638] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372818.614438, 'message': 'Dec 7 02:26:56 hqnl0246134 sshd[278252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0227 seconds
INFO [2022-12-07 02:27:00,634] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372820.6171799, 'message': 'Dec 7 02:26:58 hqnl0246134 sshd[278252]: Failed password for root from 61.177.173.18 port 33389 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 02:27:04,645] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372824.6210222, 'message': 'Dec 7 02:27:03 hqnl0246134 sshd[278252]: Failed password for root from 61.177.173.18 port 33389 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0235 seconds
INFO [2022-12-07 02:27:10,650] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372830.6291473, 'message': 'Dec 7 02:27:07 hqnl0246134 sshd[278252]: Failed password for root from 61.177.173.18 port 33389 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
WARNING [2022-12-07 02:27:11,897] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:27:11,938] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0532 seconds
INFO [2022-12-07 02:27:17,838] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:27:17,839] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:27:17,848] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:27:17,859] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
INFO [2022-12-07 02:27:20,340] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:27:20,340] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:27:20,349] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:27:20,360] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 02:27:38,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372858.6698923, 'message': 'Dec 7 02:27:37 hqnl0246134 sshd[278303]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:27:38,708] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372858.6702633, 'message': 'Dec 7 02:27:37 hqnl0246134 sshd[278303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 02:27:40,690] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372860.6727555, 'message': 'Dec 7 02:27:40 hqnl0246134 sshd[278303]: Failed password for root from 61.177.173.36 port 43363 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:27:42,692] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372862.674751, 'message': 'Dec 7 02:27:41 hqnl0246134 sshd[278303]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:27:44,708] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372864.676948, 'message': 'Dec 7 02:27:43 hqnl0246134 sshd[278303]: Failed password for root from 61.177.173.36 port 43363 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 02:27:44,709] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372864.6771798, 'message': 'Dec 7 02:27:43 hqnl0246134 sshd[278306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-07 02:27:44,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372864.6773038, 'message': 'Dec 7 02:27:44 hqnl0246134 sshd[278303]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 02:27:46,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372866.678933, 'message': 'Dec 7 02:27:46 hqnl0246134 sshd[278303]: Failed password for root from 61.177.173.36 port 43363 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0281 seconds
INFO [2022-12-07 02:27:46,708] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372866.679169, 'message': 'Dec 7 02:27:46 hqnl0246134 sshd[278306]: Failed password for root from 61.177.173.18 port 46846 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-07 02:27:48,707] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372868.6805246, 'message': 'Dec 7 02:27:48 hqnl0246134 sshd[278310]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 02:27:48,743] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372868.6807506, 'message': 'Dec 7 02:27:48 hqnl0246134 sshd[278310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0345 seconds
INFO [2022-12-07 02:27:48,992] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:27:48,993] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:27:49,002] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:27:49,014] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0196 seconds
WARNING [2022-12-07 02:27:50,578] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:27:50,579] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:27:50,713] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372870.6822164, 'message': 'Dec 7 02:27:50 hqnl0246134 sshd[278310]: Failed password for root from 61.177.173.36 port 25661 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 02:27:50,713] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372870.6825411, 'message': 'Dec 7 02:27:50 hqnl0246134 sshd[278306]: Failed password for root from 61.177.173.18 port 46846 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 02:27:52,706] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372872.684528, 'message': 'Dec 7 02:27:52 hqnl0246134 sshd[278310]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 02:27:56,725] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372876.6927285, 'message': 'Dec 7 02:27:54 hqnl0246134 sshd[278310]: Failed password for root from 61.177.173.36 port 25661 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 02:27:56,726] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372876.6930337, 'message': 'Dec 7 02:27:54 hqnl0246134 sshd[278306]: Failed password for root from 61.177.173.18 port 46846 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-07 02:27:58,715] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372878.6954353, 'message': 'Dec 7 02:27:56 hqnl0246134 sshd[278310]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 02:28:00,717] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372880.6985917, 'message': 'Dec 7 02:27:58 hqnl0246134 sshd[278310]: Failed password for root from 61.177.173.36 port 25661 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 02:28:02,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372882.7020445, 'message': 'Dec 7 02:28:00 hqnl0246134 sshd[278350]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 02:28:02,752] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372882.702466, 'message': 'Dec 7 02:28:00 hqnl0246134 sshd[278350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.36 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 02:28:04,723] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372884.7020044, 'message': 'Dec 7 02:28:02 hqnl0246134 sshd[278350]: Failed password for root from 61.177.173.36 port 25943 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 02:28:06,725] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372886.704955, 'message': 'Dec 7 02:28:05 hqnl0246134 sshd[278350]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 02:28:08,739] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372888.7060316, 'message': 'Dec 7 02:28:07 hqnl0246134 sshd[278350]: Failed password for root from 61.177.173.36 port 25943 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-07 02:28:10,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372890.7082949, 'message': 'Dec 7 02:28:09 hqnl0246134 sshd[278350]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.36 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-07 02:28:10,738] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '103.38.255.119', 'timestamp': 1670372890.7085536, 'message': 'Dec 7 02:28:09 hqnl0246134 sshd[278359]: pam_imunify(sshd:auth): [IM360_RBL] The IP 103.38.255.119 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-07 02:28:10,759] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '103.38.255.119', 'timestamp': 1670372890.7087052, 'message': 'Dec 7 02:28:09 hqnl0246134 sshd[278359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.255.119 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0198 seconds
WARNING [2022-12-07 02:28:11,905] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:28:11,929] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0386 seconds
INFO [2022-12-07 02:28:12,741] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.36', 'timestamp': 1670372892.7111402, 'message': 'Dec 7 02:28:11 hqnl0246134 sshd[278350]: Failed password for root from 61.177.173.36 port 25943 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-07 02:28:12,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '103.38.255.119', 'timestamp': 1670372892.7113748, 'message': 'Dec 7 02:28:12 hqnl0246134 sshd[278359]: Failed password for root from 103.38.255.119 port 42246 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0302 seconds
INFO [2022-12-07 02:28:18,023] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:28:18,023] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:28:18,032] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:28:18,055] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0307 seconds
INFO [2022-12-07 02:28:18,742] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.169.175.102', 'timestamp': 1670372898.720701, 'message': 'Dec 7 02:28:17 hqnl0246134 sshd[278373]: Invalid user ftpuser from 194.169.175.102 port 50350', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 02:28:18,762] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '194.169.175.102', 'timestamp': 1670372898.7210264, 'message': 'Dec 7 02:28:18 hqnl0246134 sshd[278373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:28:20,706] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:28:20,706] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:28:20,714] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:28:20,733] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0251 seconds
INFO [2022-12-07 02:28:20,744] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.169.175.102', 'timestamp': 1670372900.7217503, 'message': 'Dec 7 02:28:20 hqnl0246134 sshd[278373]: Failed password for invalid user ftpuser from 194.169.175.102 port 50350 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0219 seconds
INFO [2022-12-07 02:28:20,760] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '194.169.175.102', 'timestamp': 1670372900.721932, 'message': 'Dec 7 02:28:20 hqnl0246134 sshd[278373]: Disconnected from invalid user ftpuser 194.169.175.102 port 50350 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-07 02:28:30,754] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11203, 'attackers_ip': '34.76.158.233', 'timestamp': 1670372910.7338288, 'message': '2022-12-07 02:28:29,748 hqnl0246134.online-vm.com proftpd[278393] hqnl0246134.online-vm.com (233.158.76.34.bc.googleusercontent.com[34.76.158.233]): USER anonymous: no such user found from 233.158.76.34.bc.googleusercontent.com [34.76.158.233] to ::ffff:31.131.20.181:21', 'severity': 3, 'name': 'Attempt to login using a non-existent user.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:28:32,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372912.7375, 'message': 'Dec 7 02:28:30 hqnl0246134 sshd[278391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 02:28:34,761] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372914.7408268, 'message': 'Dec 7 02:28:33 hqnl0246134 sshd[278391]: Failed password for root from 61.177.173.18 port 13472 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 02:28:42,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372922.7537954, 'message': 'Dec 7 02:28:42 hqnl0246134 sshd[278397]: Invalid user init from 165.227.166.207 port 47214', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:28:42,789] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372922.753995, 'message': 'Dec 7 02:28:42 hqnl0246134 sshd[278397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 02:28:44,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372924.7538865, 'message': 'Dec 7 02:28:44 hqnl0246134 sshd[278397]: Failed password for invalid user init from 165.227.166.207 port 47214 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 02:28:46,781] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670372926.757623, 'message': 'Dec 7 02:28:45 hqnl0246134 sshd[278397]: Disconnected from invalid user init 165.227.166.207 port 47214 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0235 seconds
WARNING [2022-12-07 02:28:50,581] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:28:50,582] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:29:11,911] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:29:11,948] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0521 seconds
INFO [2022-12-07 02:29:17,964] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:29:17,965] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:29:17,974] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:29:17,985] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-07 02:29:18,821] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372958.800611, 'message': 'Dec 7 02:29:18 hqnl0246134 sshd[278421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 02:29:20,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372960.8030376, 'message': 'Dec 7 02:29:20 hqnl0246134 sshd[278421]: Failed password for root from 61.177.173.18 port 35801 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 02:29:21,472] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:29:21,472] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:29:21,481] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:29:21,496] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
INFO [2022-12-07 02:29:24,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372964.8096673, 'message': 'Dec 7 02:29:24 hqnl0246134 sshd[278421]: Failed password for root from 61.177.173.18 port 35801 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 02:29:28,367] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 02:29:28,440] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 02:29:28,440] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 02:29:28,440] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 02:29:28,441] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 02:29:28,441] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 02:29:28,451] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 02:29:28,468] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0263 seconds
WARNING [2022-12-07 02:29:28,474] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 02:29:28,477] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:29:28,493] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0318 seconds
INFO [2022-12-07 02:29:28,495] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0288 seconds
INFO [2022-12-07 02:29:28,833] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670372968.814088, 'message': 'Dec 7 02:29:26 hqnl0246134 sshd[278421]: Failed password for root from 61.177.173.18 port 35801 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:29:29,598] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:29:29,598] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:29:29,612] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:29:29,623] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0230 seconds
INFO [2022-12-07 02:29:40,917] defence360agent.files: Updating all files
INFO [2022-12-07 02:29:41,196] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-07 02:29:41,196] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-07 02:29:41,545] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-07 02:29:41,545] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-07 02:29:41,811] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-07 02:29:41,812] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-07 02:29:42,147] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-07 02:29:42,147] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-07 02:29:42,148] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-07 02:29:42,469] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Wed, 07 Dec 2022 00:29:42 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E5B60A49D26CB'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-07 02:29:42,471] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-07 02:29:42,472] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-07 02:29:43,009] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-07 02:29:43,009] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-07 02:29:43,357] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-07 02:29:43,358] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-07 02:29:43,614] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-07 02:29:43,615] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-07 02:29:43,956] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-07 02:29:43,956] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-07 02:29:44,343] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-07 02:29:44,344] defence360agent.files: geo files update finished (not updated)
WARNING [2022-12-07 02:29:50,587] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:29:50,588] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:29:58,573] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 02:29:58,574] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 02:29:58,575] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-07 02:30:04,878] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373004.8530736, 'message': 'Dec 7 02:30:03 hqnl0246134 sshd[278473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-07 02:30:04,896] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373004.853559, 'message': 'Dec 7 02:30:04 hqnl0246134 sshd[278473]: Failed password for root from 61.177.173.18 port 43276 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-07 02:30:11,908] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:30:11,926] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0266 seconds
INFO [2022-12-07 02:30:18,295] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:30:18,296] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:30:18,304] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:30:18,315] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
INFO [2022-12-07 02:30:20,940] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:30:20,940] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:30:20,952] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:30:20,969] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0275 seconds
INFO [2022-12-07 02:30:48,928] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373048.9031458, 'message': 'Dec 7 02:30:48 hqnl0246134 sshd[278517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0237 seconds
WARNING [2022-12-07 02:30:50,590] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:30:50,590] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:30:50,925] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373050.9051049, 'message': 'Dec 7 02:30:50 hqnl0246134 sshd[278517]: Failed password for root from 61.177.173.18 port 61169 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 02:30:54,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373054.9103997, 'message': 'Dec 7 02:30:52 hqnl0246134 sshd[278517]: Failed password for root from 61.177.173.18 port 61169 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0308 seconds
INFO [2022-12-07 02:30:54,942] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373054.9106023, 'message': 'Dec 7 02:30:54 hqnl0246134 sshd[278520]: Invalid user inspur from 165.227.166.207 port 57480', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0310 seconds
INFO [2022-12-07 02:30:54,971] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373054.9107969, 'message': 'Dec 7 02:30:54 hqnl0246134 sshd[278520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0284 seconds
INFO [2022-12-07 02:30:56,933] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373056.9110594, 'message': 'Dec 7 02:30:55 hqnl0246134 sshd[278517]: Failed password for root from 61.177.173.18 port 61169 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 02:30:58,952] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373058.9144292, 'message': 'Dec 7 02:30:57 hqnl0246134 sshd[278520]: Failed password for invalid user inspur from 165.227.166.207 port 57480 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0370 seconds
INFO [2022-12-07 02:31:00,936] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373060.9177675, 'message': 'Dec 7 02:30:59 hqnl0246134 sshd[278520]: Disconnected from invalid user inspur 165.227.166.207 port 57480 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 02:31:02,099] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:31:02,099] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:31:02,107] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:31:02,119] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0185 seconds
WARNING [2022-12-07 02:31:11,913] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:31:11,936] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0311 seconds
INFO [2022-12-07 02:31:19,825] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:31:19,826] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:31:19,834] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:31:19,846] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 02:31:24,408] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:31:24,409] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:31:24,417] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:31:24,429] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0199 seconds
INFO [2022-12-07 02:31:34,999] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373094.9573572, 'message': 'Dec 7 02:31:34 hqnl0246134 sshd[278565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-07 02:31:36,989] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373096.9581237, 'message': 'Dec 7 02:31:36 hqnl0246134 sshd[278565]: Failed password for root from 61.177.173.18 port 27039 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
WARNING [2022-12-07 02:31:50,593] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:31:50,594] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:31:54,139] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-07 02:32:11,924] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:32:11,962] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0513 seconds
INFO [2022-12-07 02:32:18,062] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:32:18,063] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:32:18,070] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:32:18,085] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-07 02:32:20,771] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:32:20,771] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:32:20,779] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:32:20,794] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-07 02:32:21,037] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373141.009818, 'message': 'Dec 7 02:32:20 hqnl0246134 sshd[278604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0266 seconds
INFO [2022-12-07 02:32:23,035] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373143.0160904, 'message': 'Dec 7 02:32:21 hqnl0246134 sshd[278604]: Failed password for root from 61.177.173.18 port 36568 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 02:32:29,475] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:32:29,476] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:32:29,483] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:32:29,496] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0195 seconds
WARNING [2022-12-07 02:32:50,597] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:32:50,598] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:32:57,081] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373177.0609252, 'message': 'Dec 7 02:32:56 hqnl0246134 sshd[278629]: Invalid user inspur from 165.227.166.207 port 39558', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:32:57,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373177.0612793, 'message': 'Dec 7 02:32:57 hqnl0246134 sshd[278629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0262 seconds
INFO [2022-12-07 02:33:01,088] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373181.0633466, 'message': 'Dec 7 02:32:59 hqnl0246134 sshd[278629]: Failed password for invalid user inspur from 165.227.166.207 port 39558 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-07 02:33:01,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373181.0637186, 'message': 'Dec 7 02:32:59 hqnl0246134 sshd[278629]: Disconnected from invalid user inspur 165.227.166.207 port 39558 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 02:33:09,095] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373189.07441, 'message': 'Dec 7 02:33:07 hqnl0246134 sshd[278646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 02:33:11,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373191.0735981, 'message': 'Dec 7 02:33:09 hqnl0246134 sshd[278646]: Failed password for root from 61.177.173.18 port 56389 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
WARNING [2022-12-07 02:33:11,921] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:33:11,945] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0319 seconds
INFO [2022-12-07 02:33:15,120] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373195.0788822, 'message': 'Dec 7 02:33:13 hqnl0246134 sshd[278646]: Failed password for root from 61.177.173.18 port 56389 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0407 seconds
INFO [2022-12-07 02:33:15,121] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373195.0791745, 'message': 'Dec 7 02:33:14 hqnl0246134 sshd[278649]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0412 seconds
INFO [2022-12-07 02:33:15,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373195.079291, 'message': 'Dec 7 02:33:14 hqnl0246134 sshd[278649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.53 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-07 02:33:17,112] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373197.0806608, 'message': 'Dec 7 02:33:16 hqnl0246134 sshd[278649]: Failed password for root from 61.177.173.53 port 62298 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0311 seconds
INFO [2022-12-07 02:33:17,114] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373197.0810099, 'message': 'Dec 7 02:33:16 hqnl0246134 sshd[278646]: Failed password for root from 61.177.173.18 port 56389 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0319 seconds
INFO [2022-12-07 02:33:17,975] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:33:17,975] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:33:17,983] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:33:17,994] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
INFO [2022-12-07 02:33:19,106] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373199.0826824, 'message': 'Dec 7 02:33:18 hqnl0246134 sshd[278649]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-07 02:33:20,740] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:33:20,740] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:33:20,750] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:33:20,762] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-07 02:33:21,104] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373201.08507, 'message': 'Dec 7 02:33:20 hqnl0246134 sshd[278649]: Failed password for root from 61.177.173.53 port 62298 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 02:33:23,108] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373203.0862303, 'message': 'Dec 7 02:33:22 hqnl0246134 sshd[278649]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 02:33:25,111] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373205.0888526, 'message': 'Dec 7 02:33:24 hqnl0246134 sshd[278649]: Failed password for root from 61.177.173.53 port 62298 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-07 02:33:27,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373207.091631, 'message': 'Dec 7 02:33:26 hqnl0246134 sshd[278663]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0244 seconds
INFO [2022-12-07 02:33:27,137] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373207.0918603, 'message': 'Dec 7 02:33:26 hqnl0246134 sshd[278663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.53 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 02:33:29,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373209.0936797, 'message': 'Dec 7 02:33:28 hqnl0246134 sshd[278663]: Failed password for root from 61.177.173.53 port 60262 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-07 02:33:31,124] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373211.0947492, 'message': 'Dec 7 02:33:29 hqnl0246134 sshd[278663]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0292 seconds
INFO [2022-12-07 02:33:33,115] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373213.096617, 'message': 'Dec 7 02:33:31 hqnl0246134 sshd[278663]: Failed password for root from 61.177.173.53 port 60262 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 02:33:35,116] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373215.0980396, 'message': 'Dec 7 02:33:33 hqnl0246134 sshd[278663]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.53 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 02:33:37,122] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.53', 'timestamp': 1670373217.1000724, 'message': 'Dec 7 02:33:35 hqnl0246134 sshd[278663]: Failed password for root from 61.177.173.53 port 60262 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-07 02:33:38,508] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:33:38,508] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:33:38,516] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:33:38,527] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
WARNING [2022-12-07 02:33:50,603] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:33:50,603] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:33:51,149] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670373231.118433, 'message': 'Dec 7 02:33:50 hqnl0246134 sshd[278681]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-07 02:33:51,166] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.108', 'timestamp': 1670373231.1187975, 'message': 'Dec 7 02:33:50 hqnl0246134 sshd[278681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.108 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-07 02:33:53,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670373233.1204793, 'message': 'Dec 7 02:33:52 hqnl0246134 sshd[278681]: Failed password for root from 61.177.172.108 port 15494 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:33:55,151] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373235.1221368, 'message': 'Dec 7 02:33:54 hqnl0246134 sshd[278683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-07 02:33:55,152] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670373235.1223347, 'message': 'Dec 7 02:33:54 hqnl0246134 sshd[278681]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-07 02:33:57,139] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373237.1223912, 'message': 'Dec 7 02:33:56 hqnl0246134 sshd[278683]: Failed password for root from 61.177.173.18 port 14933 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:33:59,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670373239.1239355, 'message': 'Dec 7 02:33:57 hqnl0246134 sshd[278681]: Failed password for root from 61.177.172.108 port 15494 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 02:34:01,169] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.108', 'timestamp': 1670373241.1263294, 'message': 'Dec 7 02:33:59 hqnl0246134 sshd[278681]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.108 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0421 seconds
INFO [2022-12-07 02:34:01,170] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373241.126593, 'message': 'Dec 7 02:34:00 hqnl0246134 sshd[278683]: Failed password for root from 61.177.173.18 port 14933 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0426 seconds
INFO [2022-12-07 02:34:03,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.108', 'timestamp': 1670373243.128093, 'message': 'Dec 7 02:34:01 hqnl0246134 sshd[278681]: Failed password for root from 61.177.172.108 port 15494 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0332 seconds
INFO [2022-12-07 02:34:03,162] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373243.1283567, 'message': 'Dec 7 02:34:02 hqnl0246134 sshd[278683]: Failed password for root from 61.177.173.18 port 14933 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0333 seconds
WARNING [2022-12-07 02:34:11,924] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:34:11,947] defence360agent.internals.the_sink: SensorIncidentList(<9 item(s)>) processed in 0.0300 seconds
INFO [2022-12-07 02:34:19,036] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:34:19,037] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:34:19,044] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:34:19,057] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-07 02:34:21,789] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:34:21,789] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:34:21,797] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:34:21,809] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-07 02:34:41,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373281.1943502, 'message': 'Dec 7 02:34:40 hqnl0246134 sshd[278752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0382 seconds
INFO [2022-12-07 02:34:43,215] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373283.195748, 'message': 'Dec 7 02:34:42 hqnl0246134 sshd[278752]: Failed password for root from 61.177.173.18 port 30144 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0197 seconds
WARNING [2022-12-07 02:34:50,606] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:34:50,607] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:34:52,637] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:34:52,638] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:34:52,645] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:34:52,660] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0215 seconds
INFO [2022-12-07 02:34:57,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373297.2134645, 'message': 'Dec 7 02:34:56 hqnl0246134 sshd[278762]: Invalid user inspur from 165.227.166.207 port 49836', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 02:34:57,253] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373297.2137136, 'message': 'Dec 7 02:34:56 hqnl0246134 sshd[278762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:34:59,238] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373299.2157328, 'message': 'Dec 7 02:34:59 hqnl0246134 sshd[278762]: Failed password for invalid user inspur from 165.227.166.207 port 49836 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-07 02:35:03,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373303.2210732, 'message': 'Dec 7 02:35:01 hqnl0246134 sshd[278762]: Disconnected from invalid user inspur 165.227.166.207 port 49836 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0258 seconds
WARNING [2022-12-07 02:35:11,930] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:35:11,949] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0269 seconds
INFO [2022-12-07 02:35:17,911] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:35:17,912] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:35:17,919] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:35:17,931] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0187 seconds
INFO [2022-12-07 02:35:20,581] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:35:20,582] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:35:20,591] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:35:20,602] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-07 02:35:29,319] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373329.2619648, 'message': 'Dec 7 02:35:27 hqnl0246134 sshd[278817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0565 seconds
INFO [2022-12-07 02:35:31,283] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373331.2622836, 'message': 'Dec 7 02:35:29 hqnl0246134 sshd[278817]: Failed password for root from 61.177.173.18 port 52361 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0205 seconds
WARNING [2022-12-07 02:35:50,612] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:35:50,614] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:36:11,938] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:36:11,957] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0281 seconds
INFO [2022-12-07 02:36:13,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373373.3262067, 'message': 'Dec 7 02:36:12 hqnl0246134 sshd[278854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0282 seconds
INFO [2022-12-07 02:36:15,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373375.3306205, 'message': 'Dec 7 02:36:14 hqnl0246134 sshd[278854]: Failed password for root from 61.177.173.18 port 59170 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-07 02:36:17,908] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:36:17,909] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:36:17,917] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:36:17,928] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 02:36:19,359] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373379.3347733, 'message': 'Dec 7 02:36:16 hqnl0246134 sshd[278854]: Failed password for root from 61.177.173.18 port 59170 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-07 02:36:20,730] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:36:20,731] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:36:20,739] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:36:20,752] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-07 02:36:21,360] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373381.3412244, 'message': 'Dec 7 02:36:19 hqnl0246134 sshd[278854]: Failed password for root from 61.177.173.18 port 59170 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 02:36:22,279] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 02:36:22,349] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 02:36:22,350] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 02:36:22,350] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 02:36:22,350] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 02:36:22,351] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 02:36:22,360] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 02:36:22,375] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0238 seconds
WARNING [2022-12-07 02:36:22,381] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 02:36:22,383] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:36:22,401] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0321 seconds
INFO [2022-12-07 02:36:22,403] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0299 seconds
INFO [2022-12-07 02:36:23,866] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:36:23,867] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:36:23,874] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:36:23,885] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
WARNING [2022-12-07 02:36:50,621] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:36:50,623] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:36:52,479] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 02:36:52,480] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 02:36:52,482] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-07 02:36:59,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373419.4035432, 'message': 'Dec 7 02:36:58 hqnl0246134 sshd[278889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-07 02:37:01,428] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373421.404896, 'message': 'Dec 7 02:37:00 hqnl0246134 sshd[278889]: Failed password for root from 61.177.173.18 port 19358 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-07 02:37:03,533] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373423.408424, 'message': 'Dec 7 02:37:02 hqnl0246134 sshd[278900]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.1250 seconds
INFO [2022-12-07 02:37:03,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373423.409453, 'message': 'Dec 7 02:37:02 hqnl0246134 sshd[278889]: Failed password for root from 61.177.173.18 port 19358 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.1254 seconds
INFO [2022-12-07 02:37:03,536] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373423.409599, 'message': 'Dec 7 02:37:03 hqnl0246134 sshd[278909]: Invalid user inst01 from 165.227.166.207 port 60168', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.1254 seconds
INFO [2022-12-07 02:37:03,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373423.4092863, 'message': 'Dec 7 02:37:02 hqnl0246134 sshd[278900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0409 seconds
INFO [2022-12-07 02:37:03,577] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373423.4097245, 'message': 'Dec 7 02:37:03 hqnl0246134 sshd[278909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-07 02:37:05,430] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373425.411646, 'message': 'Dec 7 02:37:03 hqnl0246134 sshd[278900]: Failed password for root from 61.177.173.48 port 33667 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:37:05,450] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373425.4119053, 'message': 'Dec 7 02:37:04 hqnl0246134 sshd[278900]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 02:37:07,497] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373427.4153974, 'message': 'Dec 7 02:37:05 hqnl0246134 sshd[278889]: Failed password for root from 61.177.173.18 port 19358 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0806 seconds
INFO [2022-12-07 02:37:07,498] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373427.4156852, 'message': 'Dec 7 02:37:05 hqnl0246134 sshd[278909]: Failed password for invalid user inst01 from 165.227.166.207 port 60168 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0814 seconds
INFO [2022-12-07 02:37:07,500] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373427.4160562, 'message': 'Dec 7 02:37:06 hqnl0246134 sshd[278900]: Failed password for root from 61.177.173.48 port 33667 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0817 seconds
INFO [2022-12-07 02:37:07,532] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373427.4158633, 'message': 'Dec 7 02:37:06 hqnl0246134 sshd[278909]: Disconnected from invalid user inst01 165.227.166.207 port 60168 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0329 seconds
INFO [2022-12-07 02:37:07,533] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373427.416265, 'message': 'Dec 7 02:37:06 hqnl0246134 sshd[278900]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-07 02:37:09,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373429.4174857, 'message': 'Dec 7 02:37:08 hqnl0246134 sshd[278900]: Failed password for root from 61.177.173.48 port 33667 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 02:37:11,440] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373431.4210672, 'message': 'Dec 7 02:37:10 hqnl0246134 sshd[278920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 02:37:11,459] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373431.4212692, 'message': 'Dec 7 02:37:10 hqnl0246134 sshd[278920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-07 02:37:11,940] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:37:11,964] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0315 seconds
INFO [2022-12-07 02:37:13,445] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373433.4242387, 'message': 'Dec 7 02:37:12 hqnl0246134 sshd[278920]: Failed password for root from 61.177.173.48 port 45732 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 02:37:13,465] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373433.424442, 'message': 'Dec 7 02:37:12 hqnl0246134 sshd[278920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:37:15,447] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373435.428141, 'message': 'Dec 7 02:37:14 hqnl0246134 sshd[278920]: Failed password for root from 61.177.173.48 port 45732 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 02:37:15,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373435.4284296, 'message': 'Dec 7 02:37:14 hqnl0246134 sshd[278920]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:37:17,472] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373437.4324343, 'message': 'Dec 7 02:37:15 hqnl0246134 sshd[278920]: Failed password for root from 61.177.173.48 port 45732 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0400 seconds
INFO [2022-12-07 02:37:17,999] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:37:18,000] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:37:18,007] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:37:18,020] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 02:37:19,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373439.434657, 'message': 'Dec 7 02:37:18 hqnl0246134 sshd[278928]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-07 02:37:19,519] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373439.4350562, 'message': 'Dec 7 02:37:18 hqnl0246134 sshd[278928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.48 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0474 seconds
INFO [2022-12-07 02:37:20,933] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:37:20,933] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:37:20,940] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:37:20,952] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-07 02:37:21,457] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373441.4377177, 'message': 'Dec 7 02:37:20 hqnl0246134 sshd[278928]: Failed password for root from 61.177.173.48 port 60727 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 02:37:23,458] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373443.440848, 'message': 'Dec 7 02:37:22 hqnl0246134 sshd[278928]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:37:25,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373445.4440975, 'message': 'Dec 7 02:37:24 hqnl0246134 sshd[278928]: Failed password for root from 61.177.173.48 port 60727 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 02:37:25,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373445.4443338, 'message': 'Dec 7 02:37:25 hqnl0246134 sshd[278928]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.48 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 02:37:27,479] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.48', 'timestamp': 1670373447.446593, 'message': 'Dec 7 02:37:26 hqnl0246134 sshd[278928]: Failed password for root from 61.177.173.48 port 60727 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0320 seconds
INFO [2022-12-07 02:37:30,078] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:37:30,078] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:37:30,086] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:37:30,100] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-07 02:37:45,506] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373465.474436, 'message': 'Dec 7 02:37:44 hqnl0246134 sshd[278955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 02:37:47,493] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373467.475968, 'message': 'Dec 7 02:37:45 hqnl0246134 sshd[278955]: Failed password for root from 61.177.173.18 port 35295 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
WARNING [2022-12-07 02:37:50,630] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:37:50,631] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:38:11,948] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:38:11,973] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0333 seconds
INFO [2022-12-07 02:38:17,982] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:38:17,983] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:38:17,990] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:38:18,002] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-07 02:38:20,634] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:38:20,634] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:38:20,642] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:38:20,656] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0204 seconds
INFO [2022-12-07 02:38:31,566] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373511.5341868, 'message': 'Dec 7 02:38:30 hqnl0246134 sshd[278989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 02:38:33,556] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373513.5372164, 'message': 'Dec 7 02:38:32 hqnl0246134 sshd[278989]: Failed password for root from 61.177.173.18 port 60720 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 02:38:44,130] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:38:44,131] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:38:44,138] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:38:44,149] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0177 seconds
WARNING [2022-12-07 02:38:50,635] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:38:50,636] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:39:11,629] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373551.5928261, 'message': 'Dec 7 02:39:09 hqnl0246134 sshd[279152]: Invalid user jenkins from 165.227.166.207 port 42172', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0326 seconds
INFO [2022-12-07 02:39:11,648] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373551.5943332, 'message': 'Dec 7 02:39:10 hqnl0246134 sshd[279152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-07 02:39:11,956] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:39:11,979] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0359 seconds
INFO [2022-12-07 02:39:13,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373553.5930703, 'message': 'Dec 7 02:39:11 hqnl0246134 sshd[279152]: Failed password for invalid user jenkins from 165.227.166.207 port 42172 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 02:39:13,628] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373553.593247, 'message': 'Dec 7 02:39:11 hqnl0246134 sshd[279152]: Disconnected from invalid user jenkins 165.227.166.207 port 42172 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:39:17,617] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373557.59737, 'message': 'Dec 7 02:39:16 hqnl0246134 sshd[279155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 02:39:18,067] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:39:18,068] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:39:18,075] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:39:18,087] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 02:39:19,630] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373559.5982149, 'message': 'Dec 7 02:39:17 hqnl0246134 sshd[279155]: Failed password for root from 61.177.173.18 port 17164 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0318 seconds
INFO [2022-12-07 02:39:20,934] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:39:20,934] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:39:20,941] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:39:20,952] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-07 02:39:21,619] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373561.6003978, 'message': 'Dec 7 02:39:20 hqnl0246134 sshd[279155]: Failed password for root from 61.177.173.18 port 17164 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:39:25,628] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373565.6054218, 'message': 'Dec 7 02:39:24 hqnl0246134 sshd[279155]: Failed password for root from 61.177.173.18 port 17164 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0226 seconds
WARNING [2022-12-07 02:39:50,640] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:39:50,641] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:40:03,704] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373603.6789546, 'message': 'Dec 7 02:40:02 hqnl0246134 sshd[279196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0238 seconds
INFO [2022-12-07 02:40:05,700] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373605.6817508, 'message': 'Dec 7 02:40:04 hqnl0246134 sshd[279196]: Failed password for root from 61.177.173.18 port 33295 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-07 02:40:11,958] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:40:11,981] defence360agent.internals.the_sink: SensorIncidentList(<3 item(s)>) processed in 0.0331 seconds
INFO [2022-12-07 02:40:15,462] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:40:15,463] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:40:15,472] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:40:15,491] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0276 seconds
INFO [2022-12-07 02:40:17,996] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:40:17,997] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:40:18,006] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:40:18,020] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0227 seconds
INFO [2022-12-07 02:40:20,621] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:40:20,621] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:40:20,629] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:40:20,641] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-07 02:40:49,769] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373649.7487679, 'message': 'Dec 7 02:40:48 hqnl0246134 sshd[279256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0199 seconds
WARNING [2022-12-07 02:40:50,652] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:40:50,653] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:40:51,771] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373651.7505257, 'message': 'Dec 7 02:40:50 hqnl0246134 sshd[279256]: Failed password for root from 61.177.173.18 port 47510 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0209 seconds
INFO [2022-12-07 02:41:00,177] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 02:41:00,245] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 02:41:00,245] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 02:41:00,245] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 02:41:00,246] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 02:41:00,246] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 02:41:00,259] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 02:41:00,276] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0297 seconds
WARNING [2022-12-07 02:41:00,283] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 02:41:00,285] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:41:00,303] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0324 seconds
INFO [2022-12-07 02:41:00,304] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0308 seconds
INFO [2022-12-07 02:41:11,812] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373671.7872558, 'message': 'Dec 7 02:41:11 hqnl0246134 sshd[279279]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-07 02:41:11,831] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373671.7878172, 'message': 'Dec 7 02:41:11 hqnl0246134 sshd[279279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0182 seconds
WARNING [2022-12-07 02:41:11,958] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:41:11,975] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0246 seconds
INFO [2022-12-07 02:41:13,819] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373673.7906616, 'message': 'Dec 7 02:41:13 hqnl0246134 sshd[279279]: Failed password for root from 61.177.173.46 port 56766 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 02:41:15,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373675.793296, 'message': 'Dec 7 02:41:15 hqnl0246134 sshd[279279]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0285 seconds
INFO [2022-12-07 02:41:15,823] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373675.7935884, 'message': 'Dec 7 02:41:15 hqnl0246134 sshd[279281]: Invalid user kk from 165.227.166.207 port 52462', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0287 seconds
INFO [2022-12-07 02:41:15,840] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373675.793727, 'message': 'Dec 7 02:41:15 hqnl0246134 sshd[279281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0166 seconds
INFO [2022-12-07 02:41:17,829] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373677.797692, 'message': 'Dec 7 02:41:17 hqnl0246134 sshd[279279]: Failed password for root from 61.177.173.46 port 56766 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0313 seconds
INFO [2022-12-07 02:41:17,830] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373677.7979412, 'message': 'Dec 7 02:41:17 hqnl0246134 sshd[279281]: Failed password for invalid user kk from 165.227.166.207 port 52462 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0317 seconds
INFO [2022-12-07 02:41:17,848] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373677.798066, 'message': 'Dec 7 02:41:17 hqnl0246134 sshd[279279]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:41:17,947] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:41:17,948] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:41:17,955] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:41:17,968] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0192 seconds
INFO [2022-12-07 02:41:19,841] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373679.8002632, 'message': 'Dec 7 02:41:17 hqnl0246134 sshd[279281]: Disconnected from invalid user kk 165.227.166.207 port 52462 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0402 seconds
INFO [2022-12-07 02:41:19,842] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373679.800544, 'message': 'Dec 7 02:41:19 hqnl0246134 sshd[279279]: Failed password for root from 61.177.173.46 port 56766 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0401 seconds
INFO [2022-12-07 02:41:20,352] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:41:20,353] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:41:20,367] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:41:20,395] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0344 seconds
INFO [2022-12-07 02:41:20,949] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:41:20,949] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:41:20,962] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:41:20,983] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0322 seconds
INFO [2022-12-07 02:41:21,836] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373681.8021955, 'message': 'Dec 7 02:41:21 hqnl0246134 sshd[279298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-07 02:41:21,885] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373681.8024108, 'message': 'Dec 7 02:41:21 hqnl0246134 sshd[279298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-07 02:41:23,824] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373683.8048115, 'message': 'Dec 7 02:41:23 hqnl0246134 sshd[279298]: Failed password for root from 61.177.173.46 port 30676 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 02:41:25,835] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373685.8062005, 'message': 'Dec 7 02:41:24 hqnl0246134 sshd[279298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0290 seconds
INFO [2022-12-07 02:41:27,828] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373687.8086975, 'message': 'Dec 7 02:41:26 hqnl0246134 sshd[279298]: Failed password for root from 61.177.173.46 port 30676 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 02:41:29,832] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373689.8124075, 'message': 'Dec 7 02:41:28 hqnl0246134 sshd[279298]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:41:29,851] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670373689.8125923, 'message': 'Dec 7 02:41:29 hqnl0246134 sshd[279298]: Failed password for root from 61.177.173.46 port 30676 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 02:41:30,450] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 02:41:30,451] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 02:41:30,452] im360.plugins.client360: Waiting 4 minutes before retry...
INFO [2022-12-07 02:41:35,843] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373695.8220274, 'message': 'Dec 7 02:41:35 hqnl0246134 sshd[279313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 02:41:37,853] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373697.8242984, 'message': 'Dec 7 02:41:37 hqnl0246134 sshd[279313]: Failed password for root from 61.177.173.18 port 13046 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0287 seconds
WARNING [2022-12-07 02:41:50,656] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:41:50,657] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:41:54,144] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-07 02:42:11,963] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:42:11,987] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0335 seconds
INFO [2022-12-07 02:42:17,678] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:42:17,679] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:42:17,686] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:42:17,697] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0171 seconds
INFO [2022-12-07 02:42:20,205] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:42:20,205] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:42:20,212] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:42:20,225] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0186 seconds
INFO [2022-12-07 02:42:21,913] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373741.893312, 'message': 'Dec 7 02:42:21 hqnl0246134 sshd[279352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 02:42:23,915] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373743.8963687, 'message': 'Dec 7 02:42:23 hqnl0246134 sshd[279352]: Failed password for root from 61.177.173.18 port 28007 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 02:42:29,927] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373749.9054122, 'message': 'Dec 7 02:42:27 hqnl0246134 sshd[279352]: Failed password for root from 61.177.173.18 port 28007 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 02:42:29,947] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373749.9057672, 'message': 'Dec 7 02:42:29 hqnl0246134 sshd[279352]: Failed password for root from 61.177.173.18 port 28007 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:42:32,845] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:42:32,845] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:42:32,856] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:42:32,870] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0231 seconds
WARNING [2022-12-07 02:42:50,659] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:42:50,661] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:43:07,982] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373787.9478028, 'message': 'Dec 7 02:43:06 hqnl0246134 sshd[279392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-07 02:43:09,968] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373789.9477942, 'message': 'Dec 7 02:43:09 hqnl0246134 sshd[279392]: Failed password for root from 61.177.173.18 port 37494 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0200 seconds
WARNING [2022-12-07 02:43:11,965] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:43:11,984] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0265 seconds
INFO [2022-12-07 02:43:17,806] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:43:17,806] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:43:17,815] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:43:17,828] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0208 seconds
INFO [2022-12-07 02:43:20,384] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:43:20,385] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:43:20,392] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:43:20,403] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0178 seconds
INFO [2022-12-07 02:43:23,991] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373803.964585, 'message': 'Dec 7 02:43:22 hqnl0246134 sshd[279407]: Invalid user lenovo from 165.227.166.207 port 34528', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0254 seconds
INFO [2022-12-07 02:43:24,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373803.9649742, 'message': 'Dec 7 02:43:22 hqnl0246134 sshd[279407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:43:26,000] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373805.9675887, 'message': 'Dec 7 02:43:24 hqnl0246134 sshd[279407]: Failed password for invalid user lenovo from 165.227.166.207 port 34528 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0323 seconds
INFO [2022-12-07 02:43:26,033] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373805.96793, 'message': 'Dec 7 02:43:24 hqnl0246134 sshd[279407]: Disconnected from invalid user lenovo 165.227.166.207 port 34528 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0322 seconds
WARNING [2022-12-07 02:43:50,666] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:43:50,667] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:43:54,074] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373834.0490284, 'message': 'Dec 7 02:43:52 hqnl0246134 sshd[279420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-07 02:43:54,093] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373834.049571, 'message': 'Dec 7 02:43:53 hqnl0246134 sshd[279420]: Failed password for root from 61.177.173.18 port 49957 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 02:44:01,483] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:44:01,483] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:44:01,497] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:44:01,516] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0314 seconds
WARNING [2022-12-07 02:44:11,967] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:44:11,986] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0257 seconds
INFO [2022-12-07 02:44:17,688] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:44:17,689] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:44:17,697] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:44:17,709] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0193 seconds
INFO [2022-12-07 02:44:20,138] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373860.113814, 'message': 'Dec 7 02:44:18 hqnl0246134 sshd[279450]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0241 seconds
INFO [2022-12-07 02:44:20,165] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373860.1140425, 'message': 'Dec 7 02:44:18 hqnl0246134 sshd[279450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0260 seconds
INFO [2022-12-07 02:44:20,454] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:44:20,454] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:44:20,462] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:44:20,474] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0191 seconds
INFO [2022-12-07 02:44:22,148] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373862.1167119, 'message': 'Dec 7 02:44:20 hqnl0246134 sshd[279450]: Failed password for root from 61.177.172.114 port 50130 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0316 seconds
INFO [2022-12-07 02:44:24,140] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373864.1189709, 'message': 'Dec 7 02:44:22 hqnl0246134 sshd[279450]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-07 02:44:24,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373864.1192198, 'message': 'Dec 7 02:44:23 hqnl0246134 sshd[279450]: Failed password for root from 61.177.172.114 port 50130 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 02:44:26,141] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373866.1221104, 'message': 'Dec 7 02:44:24 hqnl0246134 sshd[279450]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:44:26,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373866.1223333, 'message': 'Dec 7 02:44:26 hqnl0246134 sshd[279450]: Failed password for root from 61.177.172.114 port 50130 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 02:44:28,145] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373868.1252925, 'message': 'Dec 7 02:44:28 hqnl0246134 sshd[279462]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:44:28,164] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373868.1256306, 'message': 'Dec 7 02:44:28 hqnl0246134 sshd[279462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:44:32,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373872.1337473, 'message': 'Dec 7 02:44:30 hqnl0246134 sshd[279462]: Failed password for root from 61.177.172.114 port 25088 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 02:44:32,173] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373872.1341166, 'message': 'Dec 7 02:44:30 hqnl0246134 sshd[279462]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 02:44:34,155] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373874.1374977, 'message': 'Dec 7 02:44:32 hqnl0246134 sshd[279462]: Failed password for root from 61.177.172.114 port 25088 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:44:34,172] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373874.137682, 'message': 'Dec 7 02:44:32 hqnl0246134 sshd[279462]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0164 seconds
INFO [2022-12-07 02:44:36,160] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373876.1410565, 'message': 'Dec 7 02:44:34 hqnl0246134 sshd[279462]: Failed password for root from 61.177.172.114 port 25088 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 02:44:38,179] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373878.1446505, 'message': 'Dec 7 02:44:36 hqnl0246134 sshd[279472]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-07 02:44:38,180] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373878.1450746, 'message': 'Dec 7 02:44:38 hqnl0246134 sshd[279474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-07 02:44:38,199] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373878.144916, 'message': 'Dec 7 02:44:36 hqnl0246134 sshd[279472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 02:44:40,169] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373880.1483972, 'message': 'Dec 7 02:44:38 hqnl0246134 sshd[279472]: Failed password for root from 61.177.172.114 port 29805 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 02:44:42,201] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373882.1503222, 'message': 'Dec 7 02:44:40 hqnl0246134 sshd[279474]: Failed password for root from 61.177.173.18 port 15209 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0503 seconds
INFO [2022-12-07 02:44:42,202] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373882.150601, 'message': 'Dec 7 02:44:40 hqnl0246134 sshd[279472]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0507 seconds
INFO [2022-12-07 02:44:44,174] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373884.154074, 'message': 'Dec 7 02:44:42 hqnl0246134 sshd[279472]: Failed password for root from 61.177.172.114 port 29805 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 02:44:44,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373884.1543286, 'message': 'Dec 7 02:44:42 hqnl0246134 sshd[279472]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:44:46,192] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373886.1563847, 'message': 'Dec 7 02:44:44 hqnl0246134 sshd[279474]: Failed password for root from 61.177.173.18 port 15209 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-07 02:44:46,193] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373886.156627, 'message': 'Dec 7 02:44:44 hqnl0246134 sshd[279472]: Failed password for root from 61.177.172.114 port 29805 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0353 seconds
INFO [2022-12-07 02:44:48,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373888.1651788, 'message': 'Dec 7 02:44:46 hqnl0246134 sshd[279479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-07 02:44:48,210] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373888.1728551, 'message': 'Dec 7 02:44:46 hqnl0246134 sshd[279474]: Failed password for root from 61.177.173.18 port 15209 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-07 02:44:48,222] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373888.1654437, 'message': 'Dec 7 02:44:46 hqnl0246134 sshd[279479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.114 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0215 seconds
INFO [2022-12-07 02:44:48,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373888.1729805, 'message': 'Dec 7 02:44:47 hqnl0246134 sshd[279479]: Failed password for root from 61.177.172.114 port 48994 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:44:50,191] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373890.1655931, 'message': 'Dec 7 02:44:48 hqnl0246134 sshd[279479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0251 seconds
WARNING [2022-12-07 02:44:50,670] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:44:50,671] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:44:52,196] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373892.16833, 'message': 'Dec 7 02:44:51 hqnl0246134 sshd[279479]: Failed password for root from 61.177.172.114 port 48994 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-07 02:44:54,194] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373894.1701806, 'message': 'Dec 7 02:44:52 hqnl0246134 sshd[279479]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.114 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-07 02:44:56,200] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.114', 'timestamp': 1670373896.1725342, 'message': 'Dec 7 02:44:54 hqnl0246134 sshd[279479]: Failed password for root from 61.177.172.114 port 48994 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0272 seconds
WARNING [2022-12-07 02:45:11,975] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:45:12,002] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0355 seconds
INFO [2022-12-07 02:45:17,744] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:45:17,745] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:45:17,753] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:45:17,767] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-07 02:45:20,320] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:45:20,321] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:45:20,327] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:45:20,339] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-07 02:45:26,236] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373926.2181523, 'message': 'Dec 7 02:45:24 hqnl0246134 sshd[279535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:45:28,242] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373928.2207613, 'message': 'Dec 7 02:45:26 hqnl0246134 sshd[279535]: Failed password for root from 61.177.173.18 port 28468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
INFO [2022-12-07 02:45:30,247] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373930.2245975, 'message': 'Dec 7 02:45:28 hqnl0246134 sshd[279538]: Invalid user mm from 165.227.166.207 port 44812', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0224 seconds
INFO [2022-12-07 02:45:30,266] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373930.2248592, 'message': 'Dec 7 02:45:28 hqnl0246134 sshd[279538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:45:30,284] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373930.225075, 'message': 'Dec 7 02:45:29 hqnl0246134 sshd[279538]: Failed password for invalid user mm from 165.227.166.207 port 44812 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:45:32,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670373932.2262514, 'message': 'Dec 7 02:45:30 hqnl0246134 sshd[279538]: Disconnected from invalid user mm 165.227.166.207 port 44812 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-07 02:45:32,270] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373932.226577, 'message': 'Dec 7 02:45:30 hqnl0246134 sshd[279535]: Failed password for root from 61.177.173.18 port 28468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0423 seconds
INFO [2022-12-07 02:45:32,648] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:45:32,649] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:45:32,657] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:45:32,669] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0188 seconds
INFO [2022-12-07 02:45:34,248] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373934.2290616, 'message': 'Dec 7 02:45:33 hqnl0246134 sshd[279535]: Failed password for root from 61.177.173.18 port 28468 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-07 02:45:50,673] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:45:50,675] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:45:58,282] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 02:45:58,357] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 02:45:58,358] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 02:45:58,358] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 02:45:58,358] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 02:45:58,359] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 02:45:58,371] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 02:45:58,388] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0283 seconds
WARNING [2022-12-07 02:45:58,394] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 02:45:58,396] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:45:58,412] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0301 seconds
INFO [2022-12-07 02:45:58,414] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0281 seconds
INFO [2022-12-07 02:46:06,313] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373966.2877078, 'message': 'Dec 7 02:46:05 hqnl0246134 sshd[279576]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0240 seconds
INFO [2022-12-07 02:46:06,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373966.2882433, 'message': 'Dec 7 02:46:05 hqnl0246134 sshd[279576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:46:08,308] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373968.287547, 'message': 'Dec 7 02:46:07 hqnl0246134 sshd[279576]: Failed password for root from 61.177.173.39 port 53294 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 02:46:10,309] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373970.290765, 'message': 'Dec 7 02:46:09 hqnl0246134 sshd[279576]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0181 seconds
WARNING [2022-12-07 02:46:11,981] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:46:12,019] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0488 seconds
INFO [2022-12-07 02:46:12,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373972.2935011, 'message': 'Dec 7 02:46:10 hqnl0246134 sshd[279578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 02:46:12,325] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373972.293691, 'message': 'Dec 7 02:46:11 hqnl0246134 sshd[279576]: Failed password for root from 61.177.173.39 port 53294 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 02:46:12,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373972.293855, 'message': 'Dec 7 02:46:11 hqnl0246134 sshd[279576]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 02:46:14,327] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373974.2978117, 'message': 'Dec 7 02:46:12 hqnl0246134 sshd[279578]: Failed password for root from 61.177.173.18 port 42029 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-07 02:46:14,328] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373974.2980294, 'message': 'Dec 7 02:46:13 hqnl0246134 sshd[279576]: Failed password for root from 61.177.173.39 port 53294 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-07 02:46:16,316] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373976.297635, 'message': 'Dec 7 02:46:15 hqnl0246134 sshd[279581]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 02:46:16,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373976.297826, 'message': 'Dec 7 02:46:15 hqnl0246134 sshd[279581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:46:17,912] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:46:17,913] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:46:17,920] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:46:17,932] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 02:46:18,332] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373978.301282, 'message': 'Dec 7 02:46:16 hqnl0246134 sshd[279578]: Failed password for root from 61.177.173.18 port 42029 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0305 seconds
INFO [2022-12-07 02:46:18,333] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373978.301523, 'message': 'Dec 7 02:46:17 hqnl0246134 sshd[279581]: Failed password for root from 61.177.173.39 port 29632 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 02:46:18,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373978.3016727, 'message': 'Dec 7 02:46:17 hqnl0246134 sshd[279581]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0223 seconds
INFO [2022-12-07 02:46:20,335] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670373980.3045304, 'message': 'Dec 7 02:46:19 hqnl0246134 sshd[279578]: Failed password for root from 61.177.173.18 port 42029 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 02:46:20,336] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373980.304706, 'message': 'Dec 7 02:46:20 hqnl0246134 sshd[279581]: Failed password for root from 61.177.173.39 port 29632 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-07 02:46:22,326] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373982.305969, 'message': 'Dec 7 02:46:22 hqnl0246134 sshd[279581]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-07 02:46:22,503] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:46:22,504] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:46:22,512] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:46:22,524] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0198 seconds
INFO [2022-12-07 02:46:24,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373984.3121235, 'message': 'Dec 7 02:46:23 hqnl0246134 sshd[279581]: Failed password for root from 61.177.173.39 port 29632 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0301 seconds
INFO [2022-12-07 02:46:26,328] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373986.309723, 'message': 'Dec 7 02:46:25 hqnl0246134 sshd[279616]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 02:46:26,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373986.3099241, 'message': 'Dec 7 02:46:25 hqnl0246134 sshd[279616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.39 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:46:28,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373988.3125331, 'message': 'Dec 7 02:46:28 hqnl0246134 sshd[279616]: Failed password for root from 61.177.173.39 port 52279 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0321 seconds
INFO [2022-12-07 02:46:30,346] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373990.3156524, 'message': 'Dec 7 02:46:30 hqnl0246134 sshd[279616]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0300 seconds
INFO [2022-12-07 02:46:34,342] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373994.3207648, 'message': 'Dec 7 02:46:32 hqnl0246134 sshd[279616]: Failed password for root from 61.177.173.39 port 52279 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0206 seconds
INFO [2022-12-07 02:46:36,343] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373996.3236036, 'message': 'Dec 7 02:46:34 hqnl0246134 sshd[279616]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.39 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 02:46:37,271] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 02:46:37,271] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 02:46:37,273] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-07 02:46:38,348] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.39', 'timestamp': 1670373998.327059, 'message': 'Dec 7 02:46:36 hqnl0246134 sshd[279616]: Failed password for root from 61.177.173.39 port 52279 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0214 seconds
INFO [2022-12-07 02:46:39,319] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:46:39,320] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:46:39,326] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:46:39,337] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0169 seconds
WARNING [2022-12-07 02:46:50,678] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:46:50,679] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:47:00,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374020.364138, 'message': 'Dec 7 02:46:58 hqnl0246134 sshd[279638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0229 seconds
INFO [2022-12-07 02:47:02,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374022.3715117, 'message': 'Dec 7 02:47:00 hqnl0246134 sshd[279638]: Failed password for root from 61.177.173.18 port 64086 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0210 seconds
INFO [2022-12-07 02:47:04,401] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374024.3787243, 'message': 'Dec 7 02:47:03 hqnl0246134 sshd[279638]: Failed password for root from 61.177.173.18 port 64086 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0217 seconds
INFO [2022-12-07 02:47:08,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374028.3950424, 'message': 'Dec 7 02:47:07 hqnl0246134 sshd[279638]: Failed password for root from 61.177.173.18 port 64086 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0213 seconds
WARNING [2022-12-07 02:47:11,983] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:47:12,005] defence360agent.internals.the_sink: SensorIncidentList(<6 item(s)>) processed in 0.0310 seconds
INFO [2022-12-07 02:47:18,067] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:47:18,068] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:47:18,075] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:47:18,087] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-07 02:47:20,715] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:47:20,715] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:47:20,722] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:47:20,733] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0176 seconds
INFO [2022-12-07 02:47:38,480] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374058.4603887, 'message': 'Dec 7 02:47:37 hqnl0246134 sshd[279689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=mysql', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0197 seconds
INFO [2022-12-07 02:47:40,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374060.4640458, 'message': 'Dec 7 02:47:39 hqnl0246134 sshd[279689]: Failed password for mysql from 165.227.166.207 port 55110 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:47:42,991] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:47:42,991] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:47:42,998] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:47:43,010] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0173 seconds
INFO [2022-12-07 02:47:46,502] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374066.4848187, 'message': 'Dec 7 02:47:44 hqnl0246134 sshd[279696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:47:48,512] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374068.486056, 'message': 'Dec 7 02:47:47 hqnl0246134 sshd[279696]: Failed password for root from 61.177.173.18 port 17124 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0262 seconds
WARNING [2022-12-07 02:47:50,682] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:47:50,682] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:48:11,988] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:48:12,017] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0378 seconds
INFO [2022-12-07 02:48:17,889] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:48:17,889] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:48:17,898] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:48:17,909] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-07 02:48:20,597] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:48:20,598] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:48:20,613] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:48:20,624] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0218 seconds
INFO [2022-12-07 02:48:32,565] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374112.5432515, 'message': 'Dec 7 02:48:31 hqnl0246134 sshd[279734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0211 seconds
INFO [2022-12-07 02:48:34,563] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374114.545286, 'message': 'Dec 7 02:48:33 hqnl0246134 sshd[279734]: Failed password for root from 61.177.173.18 port 33383 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-07 02:48:50,687] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:48:50,688] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:49:10,624] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374150.5992415, 'message': 'Dec 7 02:49:09 hqnl0246134 sshd[279761]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0236 seconds
INFO [2022-12-07 02:49:10,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374150.599762, 'message': 'Dec 7 02:49:09 hqnl0246134 sshd[279761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
WARNING [2022-12-07 02:49:11,989] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:49:12,009] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0275 seconds
INFO [2022-12-07 02:49:12,618] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374152.599375, 'message': 'Dec 7 02:49:12 hqnl0246134 sshd[279761]: Failed password for root from 61.177.173.50 port 57581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:49:14,622] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374154.6016462, 'message': 'Dec 7 02:49:13 hqnl0246134 sshd[279761]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 02:49:16,633] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374156.6045055, 'message': 'Dec 7 02:49:16 hqnl0246134 sshd[279761]: Failed password for root from 61.177.173.50 port 57581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-07 02:49:18,104] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:49:18,105] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:49:18,112] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:49:18,123] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-07 02:49:18,646] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374158.6149979, 'message': 'Dec 7 02:49:17 hqnl0246134 sshd[279768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0304 seconds
INFO [2022-12-07 02:49:18,647] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374158.6152105, 'message': 'Dec 7 02:49:18 hqnl0246134 sshd[279761]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 02:49:18,665] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374158.6153445, 'message': 'Dec 7 02:49:18 hqnl0246134 sshd[279768]: Failed password for root from 61.177.173.18 port 48596 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 02:49:20,685] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:49:20,685] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:49:20,698] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:49:20,711] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374160.616175, 'message': 'Dec 7 02:49:20 hqnl0246134 sshd[279761]: Failed password for root from 61.177.173.50 port 57581 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0948 seconds
INFO [2022-12-07 02:49:20,716] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0304 seconds
INFO [2022-12-07 02:49:22,637] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374162.617894, 'message': 'Dec 7 02:49:20 hqnl0246134 sshd[279768]: Failed password for root from 61.177.173.18 port 48596 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0187 seconds
INFO [2022-12-07 02:49:23,008] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:49:23,009] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:49:23,016] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:49:23,027] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0175 seconds
INFO [2022-12-07 02:49:24,641] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374164.6217396, 'message': 'Dec 7 02:49:23 hqnl0246134 sshd[279768]: Failed password for root from 61.177.173.18 port 48596 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 02:49:32,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374172.6385167, 'message': 'Dec 7 02:49:32 hqnl0246134 sshd[279783]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0216 seconds
INFO [2022-12-07 02:49:32,678] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374172.6388893, 'message': 'Dec 7 02:49:32 hqnl0246134 sshd[279783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.50 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0168 seconds
INFO [2022-12-07 02:49:36,661] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374176.6423838, 'message': 'Dec 7 02:49:34 hqnl0246134 sshd[279783]: Failed password for root from 61.177.173.50 port 28465 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:49:36,686] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374176.6425815, 'message': 'Dec 7 02:49:36 hqnl0246134 sshd[279783]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0245 seconds
INFO [2022-12-07 02:49:38,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374178.6466568, 'message': 'Dec 7 02:49:38 hqnl0246134 sshd[279783]: Failed password for root from 61.177.173.50 port 28465 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-07 02:49:40,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374180.6478584, 'message': 'Dec 7 02:49:38 hqnl0246134 sshd[279783]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.50 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-07 02:49:40,680] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374180.6481194, 'message': 'Dec 7 02:49:40 hqnl0246134 sshd[279795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 user=mysql', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 02:49:40,698] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.50', 'timestamp': 1670374180.648415, 'message': 'Dec 7 02:49:40 hqnl0246134 sshd[279783]: Failed password for root from 61.177.173.50 port 28465 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 02:49:42,671] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374182.652931, 'message': 'Dec 7 02:49:42 hqnl0246134 sshd[279795]: Failed password for mysql from 165.227.166.207 port 37182 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:49:50,510] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 02:49:50,581] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 02:49:50,582] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 02:49:50,582] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 02:49:50,582] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 02:49:50,583] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 02:49:50,600] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 02:49:50,619] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0361 seconds
WARNING [2022-12-07 02:49:50,626] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 02:49:50,629] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:49:50,646] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0319 seconds
INFO [2022-12-07 02:49:50,647] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0301 seconds
WARNING [2022-12-07 02:49:50,690] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:49:50,691] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:50:02,795] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374202.751189, 'message': 'Dec 7 02:50:02 hqnl0246134 sshd[279803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0427 seconds
INFO [2022-12-07 02:50:04,719] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374204.6938941, 'message': 'Dec 7 02:50:03 hqnl0246134 sshd[279803]: Failed password for root from 61.177.173.18 port 59137 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0254 seconds
WARNING [2022-12-07 02:50:11,992] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:50:12,015] defence360agent.internals.the_sink: SensorIncidentList(<7 item(s)>) processed in 0.0298 seconds
INFO [2022-12-07 02:50:17,954] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:50:17,955] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:50:17,962] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:50:17,974] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-07 02:50:20,617] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:50:20,618] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:50:20,633] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:50:20,652] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0324 seconds
INFO [2022-12-07 02:50:20,711] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 02:50:20,712] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 02:50:20,713] im360.plugins.client360: Waiting 3 minutes before retry...
INFO [2022-12-07 02:50:48,822] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374248.794635, 'message': 'Dec 7 02:50:48 hqnl0246134 sshd[279868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0263 seconds
WARNING [2022-12-07 02:50:50,693] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:50:50,694] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:50:50,813] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374250.7941315, 'message': 'Dec 7 02:50:49 hqnl0246134 sshd[279868]: Failed password for root from 61.177.173.18 port 29623 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 02:50:59,793] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:50:59,794] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:50:59,803] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:50:59,815] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0205 seconds
WARNING [2022-12-07 02:51:11,995] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:51:12,015] defence360agent.internals.the_sink: SensorIncidentList(<2 item(s)>) processed in 0.0269 seconds
INFO [2022-12-07 02:51:17,789] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:51:17,789] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:51:17,796] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:51:17,807] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0164 seconds
INFO [2022-12-07 02:51:20,327] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:51:20,327] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:51:20,334] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:51:20,345] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0170 seconds
INFO [2022-12-07 02:51:35,080] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374294.854459, 'message': 'Dec 7 02:51:33 hqnl0246134 sshd[279911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.2241 seconds
INFO [2022-12-07 02:51:35,109] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374294.8550866, 'message': 'Dec 7 02:51:34 hqnl0246134 sshd[279911]: Failed password for root from 61.177.173.18 port 38578 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-07 02:51:40,141] im360.plugins.db_auto_cleanup: Deleted 0 expired records from whitelist
INFO [2022-12-07 02:51:40,143] im360.plugins.db_auto_cleanup: Deleted 0 expired graylisted/blacklisted IPs (older than 3 days) during auto cleanup
INFO [2022-12-07 02:51:41,014] im360.plugins.pam: PAM module has been enabled for dovecot-pam
INFO [2022-12-07 02:51:46,929] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374306.8858945, 'message': 'Dec 7 02:51:45 hqnl0246134 sshd[279934]: Invalid user nagios from 165.227.166.207 port 47454', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0411 seconds
INFO [2022-12-07 02:51:46,961] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374306.886719, 'message': 'Dec 7 02:51:45 hqnl0246134 sshd[279934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0312 seconds
INFO [2022-12-07 02:51:48,911] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374308.8903008, 'message': 'Dec 7 02:51:47 hqnl0246134 sshd[279934]: Failed password for invalid user nagios from 165.227.166.207 port 47454 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0205 seconds
INFO [2022-12-07 02:51:48,931] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374308.8905208, 'message': 'Dec 7 02:51:48 hqnl0246134 sshd[279934]: Disconnected from invalid user nagios 165.227.166.207 port 47454 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
WARNING [2022-12-07 02:51:50,697] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:51:50,698] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
WARNING [2022-12-07 02:51:54,148] im360.plugins.remote_iplist: Skip iplist sync, since license is invalid
WARNING [2022-12-07 02:52:12,002] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:52:12,025] defence360agent.internals.the_sink: SensorIncidentList(<4 item(s)>) processed in 0.0315 seconds
INFO [2022-12-07 02:52:14,990] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.129.106.43', 'timestamp': 1670374334.9702482, 'message': 'Dec 7 02:52:13 hqnl0246134 sshd[279962]: Invalid user admin from 41.129.106.43 port 56076', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 02:52:15,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '41.129.106.43', 'timestamp': 1670374334.9704816, 'message': 'Dec 7 02:52:13 hqnl0246134 sshd[279962]: pam_imunify(sshd:auth): [IM360_RBL] The IP 41.129.106.43 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:52:15,030] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '41.129.106.43', 'timestamp': 1670374334.9714365, 'message': 'Dec 7 02:52:13 hqnl0246134 sshd[279962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.129.106.43 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 02:52:16,990] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.129.106.43', 'timestamp': 1670374336.972412, 'message': 'Dec 7 02:52:15 hqnl0246134 sshd[279962]: Failed password for invalid user admin from 41.129.106.43 port 56076 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 02:52:17,007] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '41.129.106.43', 'timestamp': 1670374336.9726074, 'message': 'Dec 7 02:52:16 hqnl0246134 sshd[279962]: Disconnected from invalid user admin 41.129.106.43 port 56076 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 02:52:17,854] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:52:17,855] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:52:17,879] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:52:17,902] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0344 seconds
INFO [2022-12-07 02:52:20,685] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:52:20,686] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:52:20,693] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:52:20,708] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0221 seconds
INFO [2022-12-07 02:52:20,996] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374340.977491, 'message': 'Dec 7 02:52:19 hqnl0246134 sshd[279974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 02:52:21,613] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:52:21,613] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:52:21,622] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:52:21,633] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0189 seconds
INFO [2022-12-07 02:52:23,010] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374342.9810405, 'message': 'Dec 7 02:52:22 hqnl0246134 sshd[279974]: Failed password for root from 61.177.173.18 port 61329 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0286 seconds
INFO [2022-12-07 02:52:29,024] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374348.9890661, 'message': 'Dec 7 02:52:26 hqnl0246134 sshd[279974]: Failed password for root from 61.177.173.18 port 61329 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0343 seconds
INFO [2022-12-07 02:52:31,020] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374350.9903114, 'message': 'Dec 7 02:52:30 hqnl0246134 sshd[279974]: Failed password for root from 61.177.173.18 port 61329 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0290 seconds
WARNING [2022-12-07 02:52:50,703] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:52:50,705] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:53:07,083] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374387.0431015, 'message': 'Dec 7 02:53:06 hqnl0246134 sshd[280015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0385 seconds
INFO [2022-12-07 02:53:09,085] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374389.0445616, 'message': 'Dec 7 02:53:08 hqnl0246134 sshd[280015]: Failed password for root from 61.177.173.18 port 15159 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0403 seconds
WARNING [2022-12-07 02:53:12,007] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:53:12,032] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0331 seconds
INFO [2022-12-07 02:53:18,026] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:53:18,026] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:53:18,034] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:53:18,045] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0182 seconds
INFO [2022-12-07 02:53:20,731] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:53:20,731] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:53:20,743] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:53:20,757] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0246 seconds
INFO [2022-12-07 02:53:25,899] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 02:53:25,966] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 02:53:25,967] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 02:53:25,967] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 02:53:25,967] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 02:53:25,967] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 02:53:25,977] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 02:53:25,992] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0245 seconds
WARNING [2022-12-07 02:53:25,999] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 02:53:26,001] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:53:26,017] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0303 seconds
INFO [2022-12-07 02:53:26,019] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0284 seconds
WARNING [2022-12-07 02:53:50,708] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:53:50,709] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:53:51,239] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374431.2106307, 'message': 'Dec 7 02:53:50 hqnl0246134 sshd[280042]: Invalid user nagios from 165.227.166.207 port 57742', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0272 seconds
INFO [2022-12-07 02:53:51,259] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374431.2111337, 'message': 'Dec 7 02:53:50 hqnl0246134 sshd[280042]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.227.166.207 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 02:53:51,279] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374431.2119792, 'message': 'Dec 7 02:53:50 hqnl0246134 sshd[280042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 02:53:53,231] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374433.2131014, 'message': 'Dec 7 02:53:52 hqnl0246134 sshd[280042]: Failed password for invalid user nagios from 165.227.166.207 port 57742 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0182 seconds
INFO [2022-12-07 02:53:53,249] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374433.2133493, 'message': 'Dec 7 02:53:52 hqnl0246134 sshd[280042]: Disconnected from invalid user nagios 165.227.166.207 port 57742 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:53:55,234] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374435.2168024, 'message': 'Dec 7 02:53:55 hqnl0246134 sshd[280046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 02:53:55,578] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:53:55,579] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:53:55,586] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:53:55,597] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-07 02:53:56,099] im360.plugins.client360: Server connection closed
WARNING [2022-12-07 02:53:56,100] im360.plugins.client360: Lost connection to the Server (imunify360.cloudlinux.com).
WARNING [2022-12-07 02:53:56,101] im360.plugins.client360: Waiting 6 minutes before retry...
INFO [2022-12-07 02:53:59,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374439.2200973, 'message': 'Dec 7 02:53:57 hqnl0246134 sshd[280046]: Failed password for root from 61.177.173.18 port 35696 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0466 seconds
INFO [2022-12-07 02:54:03,244] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374443.226095, 'message': 'Dec 7 02:54:00 hqnl0246134 sshd[280046]: Failed password for root from 61.177.173.18 port 35696 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:54:05,267] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374445.2301815, 'message': 'Dec 7 02:54:04 hqnl0246134 sshd[280046]: Failed password for root from 61.177.173.18 port 35696 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0365 seconds
INFO [2022-12-07 02:54:07,252] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '5.253.244.167', 'timestamp': 1670374447.2344317, 'message': 'Dec 7 02:54:06 hqnl0246134 sshd[280073]: pam_imunify(sshd:auth): [IM360_RBL] The IP 5.253.244.167 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:54:07,271] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '5.253.244.167', 'timestamp': 1670374447.234658, 'message': 'Dec 7 02:54:06 hqnl0246134 sshd[280073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.253.244.167 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:54:09,258] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '5.253.244.167', 'timestamp': 1670374449.2379014, 'message': 'Dec 7 02:54:09 hqnl0246134 sshd[280073]: Failed password for root from 5.253.244.167 port 58534 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0198 seconds
WARNING [2022-12-07 02:54:12,009] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:54:12,033] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0313 seconds
INFO [2022-12-07 02:54:17,834] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:54:17,834] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:54:17,842] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:54:17,855] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0200 seconds
INFO [2022-12-07 02:54:20,478] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:54:20,478] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:54:20,486] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:54:20,497] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-07 02:54:43,317] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374483.2913492, 'message': 'Dec 7 02:54:41 hqnl0246134 sshd[280100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0242 seconds
INFO [2022-12-07 02:54:45,312] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374485.295472, 'message': 'Dec 7 02:54:43 hqnl0246134 sshd[280100]: Failed password for root from 61.177.173.18 port 48703 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
WARNING [2022-12-07 02:54:50,713] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:54:50,713] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:54:59,345] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374499.3256729, 'message': 'Dec 7 02:54:58 hqnl0246134 sshd[280105]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 02:54:59,364] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374499.325995, 'message': 'Dec 7 02:54:59 hqnl0246134 sshd[280105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:55:01,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374501.330668, 'message': 'Dec 7 02:55:00 hqnl0246134 sshd[280105]: Failed password for root from 61.177.172.19 port 58650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0247 seconds
INFO [2022-12-07 02:55:01,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374501.3309033, 'message': 'Dec 7 02:55:01 hqnl0246134 sshd[280105]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0222 seconds
INFO [2022-12-07 02:55:05,355] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374505.3338494, 'message': 'Dec 7 02:55:03 hqnl0246134 sshd[280105]: Failed password for root from 61.177.172.19 port 58650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 02:55:07,368] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374507.3366692, 'message': 'Dec 7 02:55:05 hqnl0246134 sshd[280105]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0307 seconds
INFO [2022-12-07 02:55:07,369] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374507.337033, 'message': 'Dec 7 02:55:07 hqnl0246134 sshd[280136]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 02:55:07,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374507.3368883, 'message': 'Dec 7 02:55:06 hqnl0246134 sshd[280105]: Failed password for root from 61.177.172.19 port 58650 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0293 seconds
INFO [2022-12-07 02:55:07,398] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374507.3371632, 'message': 'Dec 7 02:55:07 hqnl0246134 sshd[280136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0291 seconds
INFO [2022-12-07 02:55:09,365] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374509.3379416, 'message': 'Dec 7 02:55:09 hqnl0246134 sshd[280145]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 02:55:09,385] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374509.338123, 'message': 'Dec 7 02:55:09 hqnl0246134 sshd[280145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0195 seconds
INFO [2022-12-07 02:55:11,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374511.3411713, 'message': 'Dec 7 02:55:09 hqnl0246134 sshd[280136]: Failed password for root from 61.177.173.35 port 44817 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-07 02:55:11,379] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374511.341397, 'message': 'Dec 7 02:55:10 hqnl0246134 sshd[280145]: Failed password for root from 61.177.172.19 port 38770 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0369 seconds
INFO [2022-12-07 02:55:11,397] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374511.3415773, 'message': 'Dec 7 02:55:11 hqnl0246134 sshd[280145]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0179 seconds
INFO [2022-12-07 02:55:11,998] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:55:11,999] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:55:12,013] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 02:55:12,016] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:55:12,053] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0523 seconds
INFO [2022-12-07 02:55:12,055] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0519 seconds
INFO [2022-12-07 02:55:13,366] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374513.345601, 'message': 'Dec 7 02:55:11 hqnl0246134 sshd[280136]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:55:15,380] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374515.3459852, 'message': 'Dec 7 02:55:13 hqnl0246134 sshd[280145]: Failed password for root from 61.177.172.19 port 38770 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0338 seconds
INFO [2022-12-07 02:55:15,381] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374515.346183, 'message': 'Dec 7 02:55:13 hqnl0246134 sshd[280136]: Failed password for root from 61.177.173.35 port 44817 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-07 02:55:17,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374517.3478365, 'message': 'Dec 7 02:55:15 hqnl0246134 sshd[280145]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0288 seconds
INFO [2022-12-07 02:55:17,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374517.3480194, 'message': 'Dec 7 02:55:15 hqnl0246134 sshd[280136]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-07 02:55:17,807] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:55:17,807] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:55:17,818] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:55:17,830] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0219 seconds
INFO [2022-12-07 02:55:19,377] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374519.3497896, 'message': 'Dec 7 02:55:17 hqnl0246134 sshd[280145]: Failed password for root from 61.177.172.19 port 38770 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-07 02:55:19,378] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374519.349976, 'message': 'Dec 7 02:55:17 hqnl0246134 sshd[280136]: Failed password for root from 61.177.173.35 port 44817 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-07 02:55:20,481] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:55:20,482] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:55:20,492] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:55:20,505] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0220 seconds
INFO [2022-12-07 02:55:21,373] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374521.353525, 'message': 'Dec 7 02:55:21 hqnl0246134 sshd[280167]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0186 seconds
INFO [2022-12-07 02:55:21,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374521.3539872, 'message': 'Dec 7 02:55:21 hqnl0246134 sshd[280167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:55:23,391] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374523.3560143, 'message': 'Dec 7 02:55:21 hqnl0246134 sshd[280169]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-07 02:55:23,393] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374523.358022, 'message': 'Dec 7 02:55:22 hqnl0246134 sshd[280167]: Failed password for root from 61.177.172.19 port 40654 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0344 seconds
INFO [2022-12-07 02:55:23,411] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374523.3564458, 'message': 'Dec 7 02:55:21 hqnl0246134 sshd[280169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 02:55:23,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374523.3581572, 'message': 'Dec 7 02:55:23 hqnl0246134 sshd[280169]: Failed password for root from 61.177.173.35 port 59181 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:55:25,387] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374525.3596995, 'message': 'Dec 7 02:55:23 hqnl0246134 sshd[280167]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0269 seconds
INFO [2022-12-07 02:55:25,388] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374525.36, 'message': 'Dec 7 02:55:23 hqnl0246134 sshd[280169]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-07 02:55:27,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374527.3624766, 'message': 'Dec 7 02:55:25 hqnl0246134 sshd[280167]: Failed password for root from 61.177.172.19 port 40654 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0589 seconds
INFO [2022-12-07 02:55:27,423] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374527.362744, 'message': 'Dec 7 02:55:26 hqnl0246134 sshd[280169]: Failed password for root from 61.177.173.35 port 59181 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0595 seconds
INFO [2022-12-07 02:55:27,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374527.3629181, 'message': 'Dec 7 02:55:26 hqnl0246134 sshd[280175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0593 seconds
INFO [2022-12-07 02:55:27,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374527.3630345, 'message': 'Dec 7 02:55:26 hqnl0246134 sshd[280173]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0588 seconds
INFO [2022-12-07 02:55:27,442] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374527.3631582, 'message': 'Dec 7 02:55:26 hqnl0246134 sshd[280173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 02:55:29,419] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374529.365185, 'message': 'Dec 7 02:55:27 hqnl0246134 sshd[280167]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0532 seconds
INFO [2022-12-07 02:55:29,420] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374529.3654873, 'message': 'Dec 7 02:55:28 hqnl0246134 sshd[280169]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0537 seconds
INFO [2022-12-07 02:55:29,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374529.3656008, 'message': 'Dec 7 02:55:28 hqnl0246134 sshd[280175]: Failed password for root from 61.177.173.18 port 56350 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0537 seconds
INFO [2022-12-07 02:55:29,421] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374529.365715, 'message': 'Dec 7 02:55:28 hqnl0246134 sshd[280173]: Failed password for root from 61.177.173.52 port 21564 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0533 seconds
INFO [2022-12-07 02:55:31,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374531.368415, 'message': 'Dec 7 02:55:29 hqnl0246134 sshd[280169]: Failed password for root from 61.177.173.35 port 59181 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0441 seconds
INFO [2022-12-07 02:55:31,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374531.3686817, 'message': 'Dec 7 02:55:30 hqnl0246134 sshd[280167]: Failed password for root from 61.177.172.19 port 40654 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0444 seconds
INFO [2022-12-07 02:55:31,414] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374531.368837, 'message': 'Dec 7 02:55:30 hqnl0246134 sshd[280173]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0443 seconds
INFO [2022-12-07 02:55:33,416] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374533.3703399, 'message': 'Dec 7 02:55:32 hqnl0246134 sshd[280177]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0450 seconds
INFO [2022-12-07 02:55:33,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374533.3706806, 'message': 'Dec 7 02:55:32 hqnl0246134 sshd[280173]: Failed password for root from 61.177.173.52 port 21564 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0455 seconds
INFO [2022-12-07 02:55:33,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374533.3708436, 'message': 'Dec 7 02:55:32 hqnl0246134 sshd[280175]: Failed password for root from 61.177.173.18 port 56350 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0455 seconds
INFO [2022-12-07 02:55:33,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374533.3705428, 'message': 'Dec 7 02:55:32 hqnl0246134 sshd[280177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.35 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-07 02:55:33,453] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374533.3709586, 'message': 'Dec 7 02:55:32 hqnl0246134 sshd[280173]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0354 seconds
INFO [2022-12-07 02:55:35,426] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374535.3730276, 'message': 'Dec 7 02:55:33 hqnl0246134 sshd[280179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0523 seconds
INFO [2022-12-07 02:55:35,428] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374535.3747218, 'message': 'Dec 7 02:55:34 hqnl0246134 sshd[280177]: Failed password for root from 61.177.173.35 port 32251 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0511 seconds
INFO [2022-12-07 02:55:35,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374535.3749597, 'message': 'Dec 7 02:55:34 hqnl0246134 sshd[280173]: Failed password for root from 61.177.173.52 port 21564 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0512 seconds
INFO [2022-12-07 02:55:35,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374535.374542, 'message': 'Dec 7 02:55:33 hqnl0246134 sshd[280179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.19 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0459 seconds
INFO [2022-12-07 02:55:35,474] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374535.375479, 'message': 'Dec 7 02:55:34 hqnl0246134 sshd[280175]: Failed password for root from 61.177.173.18 port 56350 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0459 seconds
INFO [2022-12-07 02:55:35,474] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374535.3751311, 'message': 'Dec 7 02:55:34 hqnl0246134 sshd[280177]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0453 seconds
INFO [2022-12-07 02:55:37,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374537.375201, 'message': 'Dec 7 02:55:35 hqnl0246134 sshd[280179]: Failed password for root from 61.177.172.19 port 25970 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0485 seconds
INFO [2022-12-07 02:55:37,426] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374537.3764815, 'message': 'Dec 7 02:55:36 hqnl0246134 sshd[280177]: Failed password for root from 61.177.173.35 port 32251 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0487 seconds
INFO [2022-12-07 02:55:37,427] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374537.3766057, 'message': 'Dec 7 02:55:36 hqnl0246134 sshd[280189]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0489 seconds
INFO [2022-12-07 02:55:37,470] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374537.376374, 'message': 'Dec 7 02:55:35 hqnl0246134 sshd[280179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0452 seconds
INFO [2022-12-07 02:55:37,471] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374537.3768446, 'message': 'Dec 7 02:55:37 hqnl0246134 sshd[280177]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.35 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0446 seconds
INFO [2022-12-07 02:55:37,471] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374537.3767333, 'message': 'Dec 7 02:55:36 hqnl0246134 sshd[280189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0442 seconds
INFO [2022-12-07 02:55:39,424] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374539.377942, 'message': 'Dec 7 02:55:38 hqnl0246134 sshd[280179]: Failed password for root from 61.177.172.19 port 25970 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0453 seconds
INFO [2022-12-07 02:55:39,425] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374539.3781674, 'message': 'Dec 7 02:55:38 hqnl0246134 sshd[280189]: Failed password for root from 61.177.173.52 port 59825 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0457 seconds
INFO [2022-12-07 02:55:39,425] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.35', 'timestamp': 1670374539.3782895, 'message': 'Dec 7 02:55:39 hqnl0246134 sshd[280177]: Failed password for root from 61.177.173.35 port 32251 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0453 seconds
INFO [2022-12-07 02:55:41,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374541.380133, 'message': 'Dec 7 02:55:40 hqnl0246134 sshd[280179]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.172.19 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-07 02:55:41,410] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374541.3803174, 'message': 'Dec 7 02:55:41 hqnl0246134 sshd[280189]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-07 02:55:43,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.172.19', 'timestamp': 1670374543.3838837, 'message': 'Dec 7 02:55:41 hqnl0246134 sshd[280179]: Failed password for root from 61.177.172.19 port 25970 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-07 02:55:43,412] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374543.3841534, 'message': 'Dec 7 02:55:42 hqnl0246134 sshd[280189]: Failed password for root from 61.177.173.52 port 59825 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0276 seconds
INFO [2022-12-07 02:55:43,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374543.3843317, 'message': 'Dec 7 02:55:43 hqnl0246134 sshd[280189]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-07 02:55:45,403] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374545.385876, 'message': 'Dec 7 02:55:45 hqnl0246134 sshd[280189]: Failed password for root from 61.177.173.52 port 59825 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 02:55:47,407] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374547.388889, 'message': 'Dec 7 02:55:47 hqnl0246134 sshd[280192]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0185 seconds
INFO [2022-12-07 02:55:47,425] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374547.3890855, 'message': 'Dec 7 02:55:47 hqnl0246134 sshd[280192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 02:55:49,429] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374549.3899481, 'message': 'Dec 7 02:55:49 hqnl0246134 sshd[280192]: Failed password for root from 61.177.173.52 port 32475 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0386 seconds
WARNING [2022-12-07 02:55:50,716] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:55:50,717] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:55:51,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374551.3901632, 'message': 'Dec 7 02:55:49 hqnl0246134 sshd[280192]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0277 seconds
INFO [2022-12-07 02:55:53,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374553.392579, 'message': 'Dec 7 02:55:51 hqnl0246134 sshd[280192]: Failed password for root from 61.177.173.52 port 32475 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0208 seconds
INFO [2022-12-07 02:55:55,413] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374555.3951333, 'message': 'Dec 7 02:55:53 hqnl0246134 sshd[280192]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:55:57,418] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374557.3987515, 'message': 'Dec 7 02:55:55 hqnl0246134 sshd[280192]: Failed password for root from 61.177.173.52 port 32475 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 02:55:59,422] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374559.401749, 'message': 'Dec 7 02:55:57 hqnl0246134 sshd[280195]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 02:55:59,441] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374559.402085, 'message': 'Dec 7 02:55:57 hqnl0246134 sshd[280195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:56:01,437] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374561.4029377, 'message': 'Dec 7 02:55:59 hqnl0246134 sshd[280197]: Invalid user nisec from 165.227.166.207 port 39808', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0336 seconds
INFO [2022-12-07 02:56:01,439] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374561.4034462, 'message': 'Dec 7 02:56:00 hqnl0246134 sshd[280195]: Failed password for root from 61.177.173.52 port 15147 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0334 seconds
INFO [2022-12-07 02:56:01,460] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374561.4031506, 'message': 'Dec 7 02:55:59 hqnl0246134 sshd[280197]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.227.166.207 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-07 02:56:01,484] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374561.4033341, 'message': 'Dec 7 02:55:59 hqnl0246134 sshd[280197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0226 seconds
INFO [2022-12-07 02:56:01,502] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374561.403604, 'message': 'Dec 7 02:56:00 hqnl0246134 sshd[280197]: Failed password for invalid user nisec from 165.227.166.207 port 39808 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0172 seconds
INFO [2022-12-07 02:56:01,520] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374561.403706, 'message': 'Dec 7 02:56:01 hqnl0246134 sshd[280197]: Disconnected from invalid user nisec 165.227.166.207 port 39808 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0173 seconds
WARNING [2022-12-07 02:56:12,020] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:56:12,109] defence360agent.internals.the_sink: SensorIncidentList(<14 item(s)>) processed in 0.1017 seconds
INFO [2022-12-07 02:56:13,435] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374573.4147758, 'message': 'Dec 7 02:56:13 hqnl0246134 sshd[280217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0192 seconds
INFO [2022-12-07 02:56:15,434] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374575.4163597, 'message': 'Dec 7 02:56:15 hqnl0246134 sshd[280217]: Failed password for root from 61.177.173.18 port 22560 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 02:56:18,017] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:56:18,018] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:56:18,027] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:56:18,040] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0216 seconds
INFO [2022-12-07 02:56:19,461] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 11323, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374579.426768, 'message': 'Dec 7 02:56:18 hqnl0246134 sshd[280217]: Failed password for root from 61.177.173.18 port 22560 ssh2', 'severity': 5, 'name': 'Active Response. SSHD brute force attack (Port is protected)', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-07 02:56:21,705] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:56:21,705] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:56:21,715] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:56:21,728] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0214 seconds
INFO [2022-12-07 02:56:23,478] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374583.425564, 'message': 'Dec 7 02:56:21 hqnl0246134 sshd[280217]: Failed password for root from 61.177.173.18 port 22560 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0520 seconds
INFO [2022-12-07 02:56:23,481] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374583.4304945, 'message': 'Dec 7 02:56:22 hqnl0246134 sshd[280253]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0497 seconds
INFO [2022-12-07 02:56:23,509] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374583.4307275, 'message': 'Dec 7 02:56:22 hqnl0246134 sshd[280253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0278 seconds
INFO [2022-12-07 02:56:24,420] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:56:24,421] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:56:24,429] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:56:24,443] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0213 seconds
INFO [2022-12-07 02:56:25,452] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374585.4262443, 'message': 'Dec 7 02:56:23 hqnl0246134 sshd[280253]: Failed password for root from 61.177.173.52 port 60556 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0252 seconds
INFO [2022-12-07 02:56:25,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374585.426525, 'message': 'Dec 7 02:56:24 hqnl0246134 sshd[280253]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0170 seconds
INFO [2022-12-07 02:56:27,455] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374587.4288695, 'message': 'Dec 7 02:56:26 hqnl0246134 sshd[280253]: Failed password for root from 61.177.173.52 port 60556 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-07 02:56:27,483] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374587.4292073, 'message': 'Dec 7 02:56:27 hqnl0246134 sshd[280253]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0267 seconds
INFO [2022-12-07 02:56:31,455] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374591.4356859, 'message': 'Dec 7 02:56:29 hqnl0246134 sshd[280253]: Failed password for root from 61.177.173.52 port 60556 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0196 seconds
INFO [2022-12-07 02:56:35,466] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374595.4414296, 'message': 'Dec 7 02:56:34 hqnl0246134 sshd[280262]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0239 seconds
INFO [2022-12-07 02:56:35,486] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374595.441799, 'message': 'Dec 7 02:56:34 hqnl0246134 sshd[280262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0200 seconds
INFO [2022-12-07 02:56:37,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374597.4424663, 'message': 'Dec 7 02:56:35 hqnl0246134 sshd[280262]: Failed password for root from 61.177.173.52 port 35424 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0322 seconds
INFO [2022-12-07 02:56:37,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374597.442776, 'message': 'Dec 7 02:56:36 hqnl0246134 sshd[280262]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0306 seconds
INFO [2022-12-07 02:56:39,463] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374599.4443727, 'message': 'Dec 7 02:56:38 hqnl0246134 sshd[280262]: Failed password for root from 61.177.173.52 port 35424 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0189 seconds
INFO [2022-12-07 02:56:39,482] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374599.4445698, 'message': 'Dec 7 02:56:39 hqnl0246134 sshd[280262]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0183 seconds
INFO [2022-12-07 02:56:43,469] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374603.4516506, 'message': 'Dec 7 02:56:41 hqnl0246134 sshd[280262]: Failed password for root from 61.177.173.52 port 35424 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 02:56:45,473] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374605.4548545, 'message': 'Dec 7 02:56:44 hqnl0246134 sshd[280274]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.52 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:56:45,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374605.4550326, 'message': 'Dec 7 02:56:44 hqnl0246134 sshd[280274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.52 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0184 seconds
INFO [2022-12-07 02:56:47,475] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.52', 'timestamp': 1670374607.4573557, 'message': 'Dec 7 02:56:47 hqnl0246134 sshd[280274]: Failed password for root from 61.177.173.52 port 16628 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
WARNING [2022-12-07 02:56:50,720] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:56:50,721] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:56:59,493] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374619.4734457, 'message': 'Dec 7 02:56:57 hqnl0246134 sshd[280277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0193 seconds
INFO [2022-12-07 02:57:01,507] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374621.4736927, 'message': 'Dec 7 02:57:00 hqnl0246134 sshd[280277]: Failed password for root from 61.177.173.18 port 30475 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-07 02:57:01,508] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '81.0.221.253', 'timestamp': 1670374621.4739254, 'message': 'Dec 7 02:57:00 hqnl0246134 sshd[280280]: Invalid user yuan from 81.0.221.253 port 41090', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0330 seconds
INFO [2022-12-07 02:57:01,525] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '81.0.221.253', 'timestamp': 1670374621.4743178, 'message': 'Dec 7 02:57:01 hqnl0246134 sshd[280280]: pam_imunify(sshd:auth): [IM360_RBL] The IP 81.0.221.253 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0167 seconds
INFO [2022-12-07 02:57:01,543] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '81.0.221.253', 'timestamp': 1670374621.4744265, 'message': 'Dec 7 02:57:01 hqnl0246134 sshd[280280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.0.221.253 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0176 seconds
INFO [2022-12-07 02:57:03,491] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '81.0.221.253', 'timestamp': 1670374623.4741669, 'message': 'Dec 7 02:57:02 hqnl0246134 sshd[280280]: Failed password for invalid user yuan from 81.0.221.253 port 41090 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0169 seconds
INFO [2022-12-07 02:57:05,509] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '81.0.221.253', 'timestamp': 1670374625.4780731, 'message': 'Dec 7 02:57:04 hqnl0246134 sshd[280280]: Disconnected from invalid user yuan 81.0.221.253 port 41090 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 02:57:05,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374625.4794598, 'message': 'Dec 7 02:57:04 hqnl0246134 sshd[280277]: Failed password for root from 61.177.173.18 port 30475 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0309 seconds
INFO [2022-12-07 02:57:11,515] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374631.48731, 'message': 'Dec 7 02:57:08 hqnl0246134 sshd[280277]: Failed password for root from 61.177.173.18 port 30475 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0270 seconds
INFO [2022-12-07 02:57:11,515] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374631.4875495, 'message': 'Dec 7 02:57:09 hqnl0246134 sshd[280305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0271 seconds
INFO [2022-12-07 02:57:11,532] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374631.4883733, 'message': 'Dec 7 02:57:09 hqnl0246134 sshd[280305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
WARNING [2022-12-07 02:57:12,022] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:57:12,046] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0330 seconds
INFO [2022-12-07 02:57:13,510] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374633.489272, 'message': 'Dec 7 02:57:12 hqnl0246134 sshd[280305]: Failed password for root from 61.177.173.46 port 35810 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 02:57:15,512] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374635.4920163, 'message': 'Dec 7 02:57:13 hqnl0246134 sshd[280305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0199 seconds
INFO [2022-12-07 02:57:17,516] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374637.4951785, 'message': 'Dec 7 02:57:15 hqnl0246134 sshd[280305]: Failed password for root from 61.177.173.46 port 35810 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0204 seconds
INFO [2022-12-07 02:57:17,534] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374637.4991703, 'message': 'Dec 7 02:57:16 hqnl0246134 sshd[280305]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 02:57:17,851] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:57:17,852] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:57:17,860] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:57:17,872] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0190 seconds
INFO [2022-12-07 02:57:19,526] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374639.4960737, 'message': 'Dec 7 02:57:17 hqnl0246134 sshd[280305]: Failed password for root from 61.177.173.46 port 35810 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0297 seconds
INFO [2022-12-07 02:57:20,620] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:57:20,620] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:57:20,628] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:57:20,639] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0180 seconds
INFO [2022-12-07 02:57:21,521] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374641.4978786, 'message': 'Dec 7 02:57:19 hqnl0246134 sshd[280314]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0233 seconds
INFO [2022-12-07 02:57:21,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374641.4981134, 'message': 'Dec 7 02:57:19 hqnl0246134 sshd[280314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.46 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0165 seconds
INFO [2022-12-07 02:57:23,518] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374643.5006685, 'message': 'Dec 7 02:57:21 hqnl0246134 sshd[280314]: Failed password for root from 61.177.173.46 port 12424 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0175 seconds
INFO [2022-12-07 02:57:23,535] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374643.500931, 'message': 'Dec 7 02:57:22 hqnl0246134 sshd[280314]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0163 seconds
INFO [2022-12-07 02:57:25,540] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374645.505041, 'message': 'Dec 7 02:57:23 hqnl0246134 sshd[280314]: Failed password for root from 61.177.173.46 port 12424 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0347 seconds
INFO [2022-12-07 02:57:25,549] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.179.100', 'timestamp': 1670374645.513009, 'message': 'Dec 7 02:57:25 hqnl0246134 sshd[280321]: Invalid user db2inst1 from 134.209.179.100 port 60158', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0357 seconds
INFO [2022-12-07 02:57:25,575] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374645.5053225, 'message': 'Dec 7 02:57:24 hqnl0246134 sshd[280314]: pam_imunify(sshd:auth): [IM360_RBL] The IP 61.177.173.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0339 seconds
INFO [2022-12-07 02:57:25,579] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '134.209.179.100', 'timestamp': 1670374645.5131853, 'message': 'Dec 7 02:57:25 hqnl0246134 sshd[280321]: pam_imunify(sshd:auth): [IM360_RBL] The IP 134.209.179.100 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0289 seconds
INFO [2022-12-07 02:57:25,596] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '134.209.179.100', 'timestamp': 1670374645.5132935, 'message': 'Dec 7 02:57:25 hqnl0246134 sshd[280321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.179.100 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0173 seconds
INFO [2022-12-07 02:57:27,538] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.46', 'timestamp': 1670374647.5080664, 'message': 'Dec 7 02:57:26 hqnl0246134 sshd[280314]: Failed password for root from 61.177.173.46 port 12424 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0295 seconds
INFO [2022-12-07 02:57:27,539] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.179.100', 'timestamp': 1670374647.5083373, 'message': 'Dec 7 02:57:27 hqnl0246134 sshd[280321]: Failed password for invalid user db2inst1 from 134.209.179.100 port 60158 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0298 seconds
INFO [2022-12-07 02:57:29,304] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:57:29,305] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:57:29,312] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:57:29,324] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0184 seconds
INFO [2022-12-07 02:57:29,528] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '134.209.179.100', 'timestamp': 1670374649.5097826, 'message': 'Dec 7 02:57:29 hqnl0246134 sshd[280321]: Disconnected from invalid user db2inst1 134.209.179.100 port 60158 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0188 seconds
INFO [2022-12-07 02:57:45,555] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374665.5282145, 'message': 'Dec 7 02:57:44 hqnl0246134 sshd[280338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0258 seconds
INFO [2022-12-07 02:57:47,548] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374667.529743, 'message': 'Dec 7 02:57:45 hqnl0246134 sshd[280338]: Failed password for root from 61.177.173.18 port 46456 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0184 seconds
WARNING [2022-12-07 02:57:50,723] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:57:50,724] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:58:07,573] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374687.552379, 'message': 'Dec 7 02:58:06 hqnl0246134 sshd[280365]: Invalid user nvidia from 165.227.166.207 port 50092', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0201 seconds
INFO [2022-12-07 02:58:07,592] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374687.5527222, 'message': 'Dec 7 02:58:06 hqnl0246134 sshd[280365]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.227.166.207 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0180 seconds
INFO [2022-12-07 02:58:07,610] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374687.552908, 'message': 'Dec 7 02:58:06 hqnl0246134 sshd[280365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:58:09,572] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374689.55406, 'message': 'Dec 7 02:58:08 hqnl0246134 sshd[280365]: Failed password for invalid user nvidia from 165.227.166.207 port 50092 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 02:58:09,591] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374689.5542338, 'message': 'Dec 7 02:58:09 hqnl0246134 sshd[280365]: Disconnected from invalid user nvidia 165.227.166.207 port 50092 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0183 seconds
WARNING [2022-12-07 02:58:12,029] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:58:12,055] defence360agent.internals.the_sink: SensorIncidentList(<11 item(s)>) processed in 0.0344 seconds
INFO [2022-12-07 02:58:17,859] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:58:17,859] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:58:17,869] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:58:17,883] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0222 seconds
INFO [2022-12-07 02:58:20,502] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:58:20,502] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:58:20,509] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:58:20,521] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0183 seconds
INFO [2022-12-07 02:58:31,621] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374711.5967798, 'message': 'Dec 7 02:58:30 hqnl0246134 sshd[280382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0237 seconds
INFO [2022-12-07 02:58:33,636] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374713.6017294, 'message': 'Dec 7 02:58:32 hqnl0246134 sshd[280382]: Failed password for root from 61.177.173.18 port 57717 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0340 seconds
INFO [2022-12-07 02:58:41,439] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:58:41,440] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:58:41,448] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:58:41,460] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0194 seconds
WARNING [2022-12-07 02:58:50,728] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:58:50,729] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 02:59:05,659] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '138.68.182.254', 'timestamp': 1670374745.6370118, 'message': 'Dec 7 02:59:04 hqnl0246134 sshd[280412]: pam_imunify(sshd:auth): [IM360_RBL] The IP 138.68.182.254 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0212 seconds
INFO [2022-12-07 02:59:05,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '138.68.182.254', 'timestamp': 1670374745.6374092, 'message': 'Dec 7 02:59:04 hqnl0246134 sshd[280412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.182.254 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0191 seconds
INFO [2022-12-07 02:59:07,656] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '138.68.182.254', 'timestamp': 1670374747.6390238, 'message': 'Dec 7 02:59:06 hqnl0246134 sshd[280412]: Failed password for root from 138.68.182.254 port 52788 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0170 seconds
WARNING [2022-12-07 02:59:12,037] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:59:12,056] defence360agent.internals.the_sink: SensorIncidentList(<5 item(s)>) processed in 0.0262 seconds
INFO [2022-12-07 02:59:13,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '200.196.230.126', 'timestamp': 1670374753.6504188, 'message': 'Dec 7 02:59:12 hqnl0246134 sshd[280422]: pam_imunify(sshd:auth): [IM360_RBL] The IP 200.196.230.126 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0190 seconds
INFO [2022-12-07 02:59:13,688] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '200.196.230.126', 'timestamp': 1670374753.6506586, 'message': 'Dec 7 02:59:12 hqnl0246134 sshd[280422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.230.126 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 02:59:15,670] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '200.196.230.126', 'timestamp': 1670374755.6519172, 'message': 'Dec 7 02:59:14 hqnl0246134 sshd[280422]: Failed password for root from 200.196.230.126 port 40050 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0181 seconds
INFO [2022-12-07 02:59:17,674] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374757.654585, 'message': 'Dec 7 02:59:17 hqnl0246134 sshd[280426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0194 seconds
INFO [2022-12-07 02:59:17,982] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:59:17,983] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:59:17,990] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:59:18,001] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 02:59:20,809] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 02:59:20,810] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 02:59:20,817] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 02:59:20,828] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0174 seconds
INFO [2022-12-07 02:59:21,679] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374761.6585226, 'message': 'Dec 7 02:59:19 hqnl0246134 sshd[280426]: Failed password for root from 61.177.173.18 port 20275 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0203 seconds
INFO [2022-12-07 02:59:25,683] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374765.662352, 'message': 'Dec 7 02:59:24 hqnl0246134 sshd[280426]: Failed password for root from 61.177.173.18 port 20275 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0202 seconds
INFO [2022-12-07 02:59:29,694] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374769.666173, 'message': 'Dec 7 02:59:27 hqnl0246134 sshd[280426]: Failed password for root from 61.177.173.18 port 20275 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0274 seconds
INFO [2022-12-07 02:59:44,351] defence360agent.files: Updating all files
INFO [2022-12-07 02:59:44,702] defence360agent.files: ossec was updated less than 30 minutes ago.
INFO [2022-12-07 02:59:44,703] defence360agent.files: ossec files update finished (not updated)
INFO [2022-12-07 02:59:44,988] defence360agent.files: static-whitelist was updated less than 30 minutes ago.
INFO [2022-12-07 02:59:44,988] defence360agent.files: static-whitelist files update finished (not updated)
INFO [2022-12-07 02:59:45,302] defence360agent.files: realtime-av-conf was updated less than 30 minutes ago.
INFO [2022-12-07 02:59:45,302] defence360agent.files: realtime-av-conf files update finished (not updated)
INFO [2022-12-07 02:59:45,584] defence360agent.files: modsec-rules was updated less than 30 minutes ago.
INFO [2022-12-07 02:59:45,585] defence360agent.files: modsec-rules files update finished (not updated)
INFO [2022-12-07 02:59:45,585] defence360agent.files: Updating php-immunity files via file by file download
INFO [2022-12-07 02:59:45,904] defence360agent.files: Requested gzip but got Content-Encoding=None. Read response as is [identity]. Headers: [('Server', 'nginx'), ('Date', 'Wed, 07 Dec 2022 00:59:45 GMT'), ('Content-Type', 'application/json'), ('Content-Length', '63'), ('Connection', 'close'), ('Accept-Ranges', 'bytes'), ('Content-Security-Policy', 'block-all-mixed-content'), ('ETag', '"e503f99eff37192363e96465ceca47d9"'), ('Last-Modified', 'Mon, 14 Nov 2022 09:56:25 GMT'), ('Strict-Transport-Security', 'max-age=31536000; includeSubDomains'), ('Vary', 'Origin'), ('Vary', 'Accept-Encoding'), ('X-Amz-Replication-Status', 'COMPLETED'), ('X-Amz-Request-Id', '172E5D0489ABFA7C'), ('X-Content-Type-Options', 'nosniff'), ('X-Xss-Protection', '1; mode=block'), ('x-amz-meta-mc-attrs', 'atime:1668418915#621651540/gid:1000/mode:33261/mtime:1595317968#0/uid:1001'), ('x-amz-version-id', '87640513-205a-4f1d-a602-37677fe0cb43'), ('X-use-modsec-release', 'stable'), ('X-use-proactive-release', 'stable'), ('X-use-sigs-release', 'stable'), ('X-use-ossec-release', 'stable'), ('X-Frame-Options', 'DENY'), ('X-Content-Type-Options', 'nosniff'), ('X-XSS-Protection', '1; mode=block')], as curl cmd:
curl -Is -H 'Accept-Encoding: gzip' 'https://files.imunify360.com/static/php-immunity/v1/description.json'
INFO [2022-12-07 02:59:45,906] defence360agent.files: updating php-immunity: nothing to update.
INFO [2022-12-07 02:59:45,907] defence360agent.files: php-immunity files update finished (not updated)
INFO [2022-12-07 02:59:46,499] defence360agent.files: sigs was updated less than 30 minutes ago.
INFO [2022-12-07 02:59:46,499] defence360agent.files: sigs files update finished (not updated)
INFO [2022-12-07 02:59:46,812] defence360agent.files: ip-record was updated less than 30 minutes ago.
INFO [2022-12-07 02:59:46,813] defence360agent.files: ip-record files update finished (not updated)
INFO [2022-12-07 02:59:47,133] defence360agent.files: eula was updated less than 30 minutes ago.
INFO [2022-12-07 02:59:47,133] defence360agent.files: eula files update finished (not updated)
INFO [2022-12-07 02:59:47,532] defence360agent.files: proactive was updated less than 30 minutes ago.
INFO [2022-12-07 02:59:47,533] defence360agent.files: proactive files update finished (not updated)
INFO [2022-12-07 02:59:48,005] defence360agent.files: geo was updated less than 30 minutes ago.
INFO [2022-12-07 02:59:48,007] defence360agent.files: geo files update finished (not updated)
WARNING [2022-12-07 02:59:50,731] im360.subsys.panels.base: Can't get RBL whitelist path. ModSecurity ruleset error: No vendors installed
INFO [2022-12-07 02:59:50,732] im360.subsys.whitelist_rbl: RBL whitelist path is undefined. Creation skipped
INFO [2022-12-07 03:00:07,733] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374807.694998, 'message': 'Dec 7 03:00:05 hqnl0246134 sshd[280491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.18 user=root', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0368 seconds
INFO [2022-12-07 03:00:09,731] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374809.6983867, 'message': 'Dec 7 03:00:08 hqnl0246134 sshd[280491]: Failed password for root from 61.177.173.18 port 41370 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0325 seconds
INFO [2022-12-07 03:00:11,702] im360.plugins.client360: Connecting the Server [await loop.create_connection...]
INFO [2022-12-07 03:00:11,736] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374811.7011874, 'message': 'Dec 7 03:00:10 hqnl0246134 sshd[280505]: Invalid user odoo from 165.227.166.207 port 60390', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0341 seconds
INFO [2022-12-07 03:00:11,766] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374811.7014787, 'message': 'Dec 7 03:00:10 hqnl0246134 sshd[280505]: pam_imunify(sshd:auth): [IM360_RBL] The IP 165.227.166.207 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0296 seconds
INFO [2022-12-07 03:00:11,778] im360.plugins.client360: Connected the Server [connection_made]
INFO [2022-12-07 03:00:11,778] im360.plugins.client360: Connected the Server [loop.create_connection() succeeded]
INFO [2022-12-07 03:00:11,779] im360.plugins.client360: await _sink_future...
INFO [2022-12-07 03:00:11,779] im360.plugins.client360: put ServerConnected() to the bus...
INFO [2022-12-07 03:00:11,779] im360.plugins.client360: await _connection_lost_event...
INFO [2022-12-07 03:00:11,791] im360.plugins.client360: All stored messages are sent.
INFO [2022-12-07 03:00:11,804] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374811.7016988, 'message': 'Dec 7 03:00:10 hqnl0246134 sshd[280505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.207 ', 'severity': 3, 'name': 'User authentication failure.', 'tag': []}) processed in 0.0373 seconds
INFO [2022-12-07 03:00:11,812] defence360agent.internals.the_sink: ServerConnected({}) processed in 0.0325 seconds
WARNING [2022-12-07 03:00:11,818] im360.plugins.client360: message with server_id=None will not be sent to the Server.
WARNING [2022-12-07 03:00:11,820] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 03:00:11,836] defence360agent.internals.the_sink: Ping({'method': 'PING', 'version': '6.7.3-1'}) processed in 0.0293 seconds
INFO [2022-12-07 03:00:11,838] defence360agent.internals.the_sink: SynclistRequest({'method': 'SYNCLIST', 'timestamp': 0.0}) processed in 0.0278 seconds
WARNING [2022-12-07 03:00:12,047] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 03:00:12,077] defence360agent.internals.the_sink: SensorIncidentList(<8 item(s)>) processed in 0.0431 seconds
INFO [2022-12-07 03:00:13,755] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374813.707601, 'message': 'Dec 7 03:00:12 hqnl0246134 sshd[280491]: Failed password for root from 61.177.173.18 port 41370 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0473 seconds
INFO [2022-12-07 03:00:13,756] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374813.707897, 'message': 'Dec 7 03:00:13 hqnl0246134 sshd[280505]: Failed password for invalid user odoo from 165.227.166.207 port 60390 ssh2', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0475 seconds
INFO [2022-12-07 03:00:15,728] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '165.227.166.207', 'timestamp': 1670374815.7102268, 'message': 'Dec 7 03:00:14 hqnl0246134 sshd[280505]: Disconnected from invalid user odoo 165.227.166.207 port 60390 [preauth]', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0174 seconds
INFO [2022-12-07 03:00:17,457] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 03:00:17,457] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 03:00:17,474] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 03:00:17,500] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0309 seconds
INFO [2022-12-07 03:00:17,730] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5716, 'attackers_ip': '61.177.173.18', 'timestamp': 1670374817.7121384, 'message': 'Dec 7 03:00:15 hqnl0246134 sshd[280491]: Failed password for root from 61.177.173.18 port 41370 ssh2', 'severity': 3, 'name': 'SSHD authentication failed.', 'tag': []}) processed in 0.0178 seconds
INFO [2022-12-07 03:00:18,372] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 03:00:18,372] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 03:00:18,383] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 03:00:18,399] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0263 seconds
INFO [2022-12-07 03:00:21,138] defence360agent.contracts.config: Failed to load license: not registered?
INFO [2022-12-07 03:00:21,138] defence360agent.simple_rpc: Response: method - ['rstatus'], data - {'result': 'warnings', 'messages': ['License is invalid for current server']}
WARNING [2022-12-07 03:00:21,146] im360.plugins.client360: message with server_id=None will not be sent to the Server.
INFO [2022-12-07 03:00:21,157] defence360agent.internals.the_sink: CommandInvoke({'method': 'COMMAND_INVOKE', 'command': ['rstatus'], 'params': {}, 'calling_process': ['/opt/alt/python38/bin/python3', '/usr/bin/imunify360-agent', 'rstatus']}) processed in 0.0181 seconds
INFO [2022-12-07 03:00:39,774] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 5710, 'attackers_ip': '90.177.60.46', 'timestamp': 1670374839.7469914, 'message': 'Dec 7 03:00:38 hqnl0246134 sshd[280541]: Invalid user jboss from 90.177.60.46 port 56022', 'severity': 3, 'name': 'Attempt to login using a non-existent user', 'tag': []}) processed in 0.0259 seconds
INFO [2022-12-07 03:00:39,793] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 6003, 'attackers_ip': '90.177.60.46', 'timestamp': 1670374839.7477524, 'message': 'Dec 7 03:00:38 hqnl0246134 sshd[280541]: pam_imunify(sshd:auth): [IM360_RBL] The IP 90.177.60.46 has been locked due to Imunify RBL', 'severity': 5, 'name': 'Imunify PAM. The IP has been locked by RBL', 'tag': []}) processed in 0.0177 seconds
INFO [2022-12-07 03:00:39,810] defence360agent.internals.the_sink: SensorIncident({'method': 'INCIDENT', 'plugin_id': 'ossec', 'rule': 2501, 'attackers_ip': '90.177.60.46', 'timestamp': 1670374839.7479277, 'message': 'Dec 7 03:00:38 hqnl0246134 sshd[280541]: pam_unix(sshd:auth): authentication fail